@conference { ISI:000371484600034, title = {Application of Multi-Agent Markov Decision Processes to Gate Assignment Problem}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {196-201}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {Gate assignment Problem (GAP) is an important subject of airport management to ensure smooth traffic operations. However, flights schedule may undergo some stochastic events such as delays that usually occur and have to be considered in the planning. Our approach considers the representation of gates as collaborative agents trying to complete a set of flights assignment tasks as given by a centralized controller. That will allow giving a new model for the GAP based on Multi Agent Markov Decision Processes (MMDP). The aim of this work is to give to controllers at the airport a robust priory solution instead of taking the risk of online schedule modifications to handle uncertainty. The solution of this problem will be a set of optimal decisions to be taken in every case of traffic disturbance.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Aoun, Oussama and El Afia, Abdellatif}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000371484600022, title = {Efficient Vertical handover scheme on IMS network and cost analysis}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {129-134}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {According to the various mobility, the resource allocation, interference, and the characteristics of heterogeneity and ubiquity of access network based on the next generation network, namely, the network IMS (IP Multimedia subsystem), have imposed several challenges. In regard to mobility management, handover management, and Quality of Service (QoS) provisioning, this paper proposes an adaptive environment based on IMS, between the heterogeneous access technologies, like WiMAX, WLAN, UMTS and LTE/LTE Advanced interfaces. Nevertheless, especially, the problem of handover decision, as resolving it influence, mainly on the handover performance; ANN(Artificial Neural Network) is proposed to solve the problem of decision and selection of best network access based IMS. The objective of proposed approach algorithms, is to maximize handover performance and reliability, with a new generic mobility management architecture, for system resource utilization by reducing handover latency and achieving load balance between different heterogeneous cells and networks}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Allouch, Hamid and Belkasmi, Mostafa}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000371484600023, title = {Elasticity and Scalability Centric Quality Model for the Cloud}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {135-140}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {Cloud computing seems to be the most logical shift in terms of Information Technology after Internet, Social Networking... Despite the potential benefits that cloud computing offers, the model brings new issues, challenges, and needs in term of SLA formalization, Quality of Service (QoS) evaluation due to the heterogeneous resources and to the special features it implies, such as Elasticity and Scalability. In the scope of this paper we focus on the Elasticity and Scalability attributes to assess their impact on the QoS. The paper provides a multi-lenses overview that can help both cloud consumers and potential business application{\textquoteright}s owners to understand, analyze, and evaluate important aspects related to Scalability and Elasticity capabilities. We determine and analyze the key features of these characteristics and derive metrics that evaluate the cloud elasticity-centric capabilities. We present a specific quality model for those two characteristics derived from their sub-attributes.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Alfath, Abdeladim and Baina, Salah and Baina, Karim}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000371484600074, title = {Green opportunistic access for CRN with selfish users using Coalitional game Approach in partition form}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {425-429}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {We study energy conservation and system performance of decentralized cognitive radio network with cognitive users. Every cognitive radio (CR) user needs to sense the channel to send data, if the channel is unoccupied by a licensed user only one winner transmits its data. Hence, all other users waste their energy in sensing the licensed bands and in negotiating the resource access without managing to transmit data packets. We formulate the sensing-energy tradeoff problem for distributed cognitive radio network as a coalition formation game. Our contribution is to apply the coalitional game design to the most important phases of cognitive radio network (CRN): sensing and data transmission. The concept of coalitional game may enforce the cooperative behavior of CR users in order to improve the system performance (energy and delay..). The network is modeled using a coalitional game in partition form with non transferable utility (NTU). After forming coalitions, no CR user in those coalitions aim to change its position. Indeed, the members of this coalition will cooperate both in sensing and access phases to improve system performance. The selfish behavior becomes evident when the cognitive users are constrained to send their data in a short delay and with a minimum of energy consumption. Our proposed algorithm explains how the selfish atittude of the cognitive user leds to join the coalition that increases its individual gain, and tacitly to improve the performance of the entire system.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Belghiti, Imane Daha and Elmachkour, Mouna and Berrada, Ismail and Kobbane, Abdellatif}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000371484600008, title = {Integrating Linked Sensor Data for On-line Analytical Processing On-The-Fly}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {43-47}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {Sensor networks are gaining more and more attention in the current technology landscape. It is undeniable that their use allows a better monitoring of events that occur in the real world. Many sensors have been deployed for monitoring applications such as environmental monitoring, and traffic monitoring. A number of governments, corporates, and academic organizations or agencies hold independently sensor systems that generate a large amount of dynamic information from data sources with various formats of schemas and data. They are making this sensor data openly accessible by publishing it as Linked Sensor Data (LSD) on the Linked Open Data (LOD) cloud. LSD is the concept that defines the publication of public or private organization sensor data without restrictions. This is achieved by transforming raw sensor observations to RDF format and by linking it with other datasets on the LOD cloud. The seamless integration of LSD sources from multiple providers is a great challenge. In this paper, we investigate the possibility of integrating diverse LSD sources using the hybrid ontology approach for on-line analytical processing (OLAP) on-the-fly. With such an ontology-based integration framework, organizations or individuals will have greater opportunity to make their respective analysis based on a large amount of sensor data openly accessible on the Web.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Guilavogui, Koly and Kjiri, Laila and Fredj, Mounia}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000371484600037, title = {MINING USER PATTERNS FOR LOCATION PREDICTION IN MOBILE SOCIAL NETWORKS}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {213-218}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {Understanding human mobility dynamics is of an essential importance to today mobile applications, including context-aware advertising and city wide sensing applications. Recently, Location-based social networks (LBSNs) have attracted important researchers{\textquoteright} efforts, to investigate spatial, temporal and social aspects of user patterns. LBSNs allow users to {\textquoteleft}{\textquoteleft}check-in{{\textquoteright}{\textquoteright}} at geographical locations and share this information with friends. In this paper, analysis of check-ins data provided by Foursquare, the online location-based social network, allows us to construct a set of features that capture: spatial, temporal and similarity characteristics of user mobility. We apply this knowledge to location prediction problem, and combine these features in supervised learning for future location prediction. We find that the supervised classifier based on the combination of multiple features offers reasonable accuracy.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Mourchid, Fatima and Habbani, Ahmed and El koutbi, Mohamed}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000371484600066, title = {Multiple Active Cores-based Shared Multicast Tree for mobile IPv6 environment}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {378-383}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {Due to the progress of network multimedia technology, internet research community proposed many different multicast routing protocols to support efficient real-time multimedia application such as, IPTV, videoconferencing, group games. These applications require a multicast routing protocol in which packets arrive to multicast receivers with minimum delay and delay variation. These applications are more important with arrival of mobile IPv6 protocol with mobile receivers and sources with continuous access. Nevertheless, the design of multicast protocols does not take into account that group members may be mobile. Dynamic group members and sources can rapidly affect quality of both routing protocol scheme and multicast tree used. The key idea of this work is to make the handover of multicast members transparent and a quick recovery mechanism to maintain an optimal multicast tree, by using MACT-MIPv6 architecture based on multicast routing protocol with Shared Multiple Active Cores Multicast Tree to hide the mobility of mobile multicast members from the main multicast delivery tree. Simulation results show that good performance is achieved in terms of handoff latency, end-to-end delay, tree construction delay and others metrics.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {Baddi, Youssef and El Kettani, Mohamed Dafir Ech-Cherif}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000371484600001, title = {Towards a semantic enrichment of configurable process models}, booktitle = {2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}14)}, series = {Colloquium in Information Science and Technology}, year = {2014}, note = {3rd IEEE International Colloquium on Information Science and Technology (CIST), Tetouan, MOROCCO, OCT 20-22, 2014}, pages = {1-6}, publisher = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, organization = {IEEE; IEEE Comp Soc; IEEE Commun Soc; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; UAE IEEE Student Branch; Univ Abdelmalek Essaadi; ENSA Tetouan}, abstract = {In recent years, the concept of Semantic business process management has attracted significant research work, with the emergence of semantic web technologies (SW), which aimed to describe resources in a formal representation with clearly defined semantics in order to be machine-readable. Enriching business process with semantics improves the representation of processes and permits the automation of different tasks such as modeling, configuration, evolution, and promotes more flexible and adaptive solutions according to business requirement changes. Nowadays, the key concept of reuse in Business Process Management is the Configurable Process Model (CPM) solution which is an important approach for reusing and customizing business process models with a set of process variants. However, existing approaches in CPM lack of semantic representation. In this paper, we propose an ontology-based approach for enriching Configurable Process Models with semantics, as a first step towards the enhancement of the CPM evolution process.}, isbn = {978-1-4799-5979-2}, issn = {2327-185X}, author = {El Faquih, Loubna and Sbai, Hanae and Fredj, Mounia}, editor = {ElMohajir, M and AlAchhab, M and Chahhou, M} } @conference { ISI:000371495900010, title = {Measure of Fuzzy Presence of Descriptors on Arabic Text Mining}, booktitle = {2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}12)}, series = {Colloquium in Information Science and Technology}, year = {2011}, note = {IEEE Colloquium on Information Science and Technology (CIST), Fez, MOROCCO, OCT 22-24, 2012}, pages = {58-63}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, abstract = {In the present work, we propose a new model of radical descriptors in Arabic Text Mining. This model will be based on the addition of lexical information contained in the morphological pattern of the Arabic word. We developed a statistical model by Hidden Markov Chain to disambiguate the morphological analysis of corpora, and we propose a new method to measure the relationship between descriptors based on a notion of {\textquoteleft}{\textquoteleft}fuzzy measure of the presence{{\textquoteright}{\textquoteright}} and we adapt the traditional statistical measures to this context, and we outline the key measures of similarity and distances used in Text Mining.}, isbn = {978-1-4673-2725-1}, issn = {2327-185X}, author = {El Hassani, Ibtissam and Kriouile, Abdelaziz and Benghabrit, Youssef}, editor = {ElMohajir, M and Begdouri, A and ElMohajir, BE and Zarghili, A} } @conference { ISI:000371495900003, title = {Model ISR3M for assessing maturity of IS risk management process Case study}, booktitle = {2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}12)}, series = {Colloquium in Information Science and Technology}, year = {2011}, note = {IEEE Colloquium on Information Science and Technology (CIST), Fez, MOROCCO, OCT 22-24, 2012}, pages = {16-21}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, abstract = {We aim through this article to contribute to the development of information system (IS) governance and more specifically of IS risk management (RM). We then propose a maturity model for IS risk management and we implement it on a case study following all the steps in the model designed. Those steps are: defining the list of information systems of the organization, measuring the maturity for each of those IS taking into account the evolution in its life cycle, measuring the consolidated maturity of IS risk management process for the organization.}, isbn = {978-1-4673-2725-1}, issn = {2327-185X}, author = {Elmaallam, Mina and Kriouile, Abdelaziz}, editor = {ElMohajir, M and Begdouri, A and ElMohajir, BE and Zarghili, A} } @conference { ISI:000371495900004, title = {A process pattern for managing evolution of configurable reference process models}, booktitle = {2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}12)}, series = {Colloquium in Information Science and Technology}, year = {2011}, note = {IEEE Colloquium on Information Science and Technology (CIST), Fez, MOROCCO, OCT 22-24, 2012}, pages = {22-25}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, abstract = {During the last years, reference process modeling becomes an efficient approach for reuse in business process modeling (BPM). Many BPM tools provide mechanisms to adapt reference process models in order to meet new needs. However, this adaptation results in a set of variants which have to be managed. One of the most proposed solutions is the configurable process model. Therefore, evolving this configurable process model in terms of activities, a data flows and resources changes becomes a crucial issue. In this paper, we propose a process pattern which guides designers for managing evolution of configurable reference process models.}, isbn = {978-1-4673-2725-1}, issn = {2327-185X}, author = {Sbai, Hanae and Fredj, Mounia and Kjiri, Laila}, editor = {ElMohajir, M and Begdouri, A and ElMohajir, BE and Zarghili, A} } @conference { ISI:000371495900008, title = {Some methods to address the problem of Unbalanced Sentiment Classification in an Arabic context}, booktitle = {2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}12)}, series = {Colloquium in Information Science and Technology}, year = {2011}, note = {IEEE Colloquium on Information Science and Technology (CIST), Fez, MOROCCO, OCT 22-24, 2012}, pages = {43-48}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, abstract = {The rise of social media (such as online web forums and social networking sites) has attracted interests to mining and analyzing opinions available on the web. The online opinion has become the object of studies in many research areas; especially that called {\textquoteleft}{\textquoteleft}Opinion Mining and Sentiment Analysis{{\textquoteright}{\textquoteright}}. Several interesting and advanced works were performed on few languages (in particular English). However, there were very few studies on some languages such as Arabic. This paper presents the study we have carried out to address the problem of unbalanced data sets in supervised sentiment classification in an Arabic context. We propose three different methods to under-sample the majority class documents. Our goal is to compare the effectiveness of the proposed methods with the common random under-sampling. We also aim to evaluate the behavior of the classifier toward different under-sampling rates. We use two different common classifiers, namely Naive Bayes and Support Vector Machines. The experiments are carried out on an Arabic data set that we have built from Aljazeera{\textquoteright}s web site and labeled manually. The results show that Naive Bayes is sensitive to data set size, the more we reduce the data the more the results degrade. However, it is not sensitive to unbalanced data sets on the contrary of Support Vector Machines which is highly sensitive to unbalanced data sets. The results show also that we can rely on the proposed techniques and that they are typically competitive with random under-sampling.}, isbn = {978-1-4673-2725-1}, issn = {2327-185X}, author = {Mountassir, Asmaa and Benbrahim, Houda and Berrada, Ilham}, editor = {ElMohajir, M and Begdouri, A and ElMohajir, BE and Zarghili, A} }