@article {Nakach20223, title = {Random Forest Based Deep Hybrid Architecture for Histopathological Breast Cancer Images Classification}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {13376 LNCS}, year = {2022}, note = {cited By 0}, pages = {3-18}, abstract = {Breast cancer is the most common cancer in women worldwide. While the early diagnosis and treatment can significantly reduce the mortality rate, it is a challenging task for pathologists to accurately estimate the cancerous cells and tissues. Therefore, machine learning techniques are playing a significant role in assisting pathologists and improving the diagnosis results. This paper proposes a hybrid architecture that combines: three of the most recent deep learning techniques for feature extraction (DenseNet_201, Inception_V3, and MobileNet_V2) and random forest to classify breast cancer histological images over the BreakHis dataset with its four magnification factors: 40X, 100X, 200X and 400X. The study evaluated and compared: (1) the developed random forest models with their base learners, (2) the designed random forest models with the same architecture but with a different number of trees, (3) the decision tree classifiers with the best random forest models and (4) the best random forest models of each feature extractor. The empirical evaluations used: four classification performance criteria (accuracy, sensitivity, precision and F1-score), 5-fold cross-validation, Scott Knott statistical test, and Borda Count voting method. The best random forest model achieved an accuracy mean value of 85.88\%, and was constructed using 9 trees, 200X as a magnification factor, and Inception_V3 as a feature extractor. The experimental results demonstrated that combining random forest with deep learning models is effective for the automatic classification of malignant and benign tumors using histopathological images of breast cancer. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Breast Cancer, Classification (of information), Decision trees, Deep learning, Diagnosis, Diseases, early diagnosis, Feature extractor, hybrid, Hybrid architectures, Image classification, Images classification, Learning systems, Magnification factors, Medical imaging, Random forest modeling, Random forests, Transfer learning}, doi = {10.1007/978-3-031-10450-3_1}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135002675\&doi=10.1007\%2f978-3-031-10450-3_1\&partnerID=40\&md5=892757314e050f81e9b0dba117f2d64a}, author = {Nakach, F.-Z. and Zerouaoui, H. and Idri, A.} } @article {ElIdrissi20227604, title = {RDF/OWL storage and management in relational database management systems: A comparative study}, journal = {Journal of King Saud University - Computer and Information Sciences}, volume = {34}, number = {9}, year = {2022}, note = {cited By 0}, pages = {7604-7620}, abstract = {This paper details RDF/OWL storage and management in two popular Relational Database Management Systems (RDBMSs): Oracle and Virtuoso. Popularity, sustainability, and conformance with the SPARQL language are the main reasons for choosing these systems. This work combines empirical and analytical studies guided by a comparative framework developed and motivated in the paper. Several dimensions are considered, including RDF data type preservation, SPARQL query and update processing, reasoning capabilities, custom inferences, blank node management, and other functional and non-functional features. Furthermore, a review of the performance assessments reported in the literature has been conducted. This study{\textquoteright}s results identify the advantages and shortcomings of these RDBMSs for storing and managing RDF/OWL. They can help improve these systems or serve as a guide in choosing an appropriate system to use in a project context. Opportunities for further research efforts are also suggested. {\textcopyright} 2021 The Authors}, doi = {10.1016/j.jksuci.2021.08.018}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85118134675\&doi=10.1016\%2fj.jksuci.2021.08.018\&partnerID=40\&md5=29bdbdbd9af8a67734ae88e4139656f5}, author = {El Idrissi, B. and Baina, S. and Mamouny, A. and Elmaallam, M.} } @article {Benabbes20221017, title = {Recommendation System Issues, Approaches and Challenges Based on User Reviews}, journal = {Journal of Web Engineering}, volume = {21}, number = {4}, year = {2022}, note = {cited By 0}, pages = {1017-1054}, abstract = {With the ever-increasing volume of online information, recommender systems have been effective as a strategy to overcome information overload. They have a wide range of applications in many fields, including e-learning, e-commerce, e-government and scientific research. Recommender systems are search engines that are based on the user{\textquoteright}s browsing history to suggest a product that expresses their interests. Being usually in the form of textual comments and ratings, such reviews are a valuable source of information about users{\textquoteright} perceptions. Recommender systems (RSs) apply various approaches to predict users{\textquoteright} interest on information, products and services among a huge amount of available items. In this paper, we will describe the recommender system, discuss ongoing research in this field, and address the challenges, limitations and the techniques adopted. This paper also discusses how review texts are interpreted to solve some of the major problems with traditional recommendation techniques. To assess the value of a recommender system, qualitative evaluation measures are discussed as well in this research. Based on a series of selected articles published between 2008 and 2020, the study allowed us to conclude that the efficiency of RSs is strongly centered on the control of information context, the operated exploration algorithm, the method, and the type of processed data in addition to the information on users{\textquoteright} trust. {\textcopyright} 2022 River Publishers. All rights reserved.}, doi = {10.13052/jwe1540-9589.2143}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85131073458\&doi=10.13052\%2fjwe1540-9589.2143\&partnerID=40\&md5=56b7da2c9aa6d4c44328fa667db5ef0a}, author = {Benabbes, K. and Housni, K. and El Mezouary, A. and Zellou, A.} } @article {Annoukoubi20221519, title = {Reduction of harmonics emission of a WECS in the electrical grid using multilevel inverters}, journal = {International Journal of Power Electronics and Drive Systems}, volume = {13}, number = {3}, year = {2022}, note = {cited By 0}, pages = {1519-1536}, abstract = {Wind energy conversion system (WECS) is composed of many non-linear power electronic sub systems, which contribute significantly in harmonic emissions that is a threat for the quality of electrical power. Hence, for a better integration of WECS in the electrical grid and in order to satisfy IEEE 519 standards, WECS must inject a quality power with a rate of total harmonics distortion (THD) that is less than 5\%. Multilevel Inverters are an emerging solution for having a perfect sinusoidal output voltage with minimum harmonic content and lower switching losses than the two-level inverter so that only a smaller filter size is required. Thus, in this paper we are presenting a significantly improved results of the reduction of the grid injected current THD using three types of inverters (two-levels, three-levels NPC, and five-levels H-bridge cascade) for a WECS and comparing the THD performances of using each of the studied inverter. All results of THD are verified by a Fast Fourier transform simulation using MATLAB/Simulink. {\textcopyright} 2022, Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/ijpeds.v13.i3.pp1519-1536}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85134994487\&doi=10.11591\%2fijpeds.v13.i3.pp1519-1536\&partnerID=40\&md5=3b1a02b6e4009b23736b72506b19cdaa}, author = {Annoukoubi, M. and Essadki, A. and Laghridat, H. and Nasser, T.} } @article {ElMejjatti2022, title = {Regression analysis-based identification model of key impactful parameters on buried antennas}, journal = {International Journal of Communication Systems}, volume = {35}, number = {4}, year = {2022}, note = {cited By 1}, abstract = {The antenna{\textquoteright}s bandwidth is strongly dependent on its physical properties and the environment where it is located. Nevertheless, for transmitting devices embedded permanently in the soil, the propagation medium{\textquoteright}s properties are unstable due to dielectric permittivity{\textquoteright}s spatial and temporal changes. Relying on soil parameters values, we present three new multivariable regression models allowing a good fit to the dataset curves with antenna{\textquoteright}s resonant frequency variations prediction of about 98\%. Precisely, such models have been obtained with the help of the multiple linear regression analysis method. Additionally, the results revealed that amongst four considered parameters (i.e., volumetric moisture, bulk density, specific density, and temperature), volumetric moisture is the most influencing factor on the antenna operating frequency band with a correlation coefficient of -0.989, whereas it equals 0.04, -0.035, and -0.002 for the temperature, bulk density, and specific density, respectively. {\textcopyright} 2021 John Wiley \& Sons Ltd.}, keywords = {\%moisture, Antenna bandwidth, Antennas, Bulk density, Identification modeling, Internet of underground thing, Linear regression, Moisture, Moisture determination, Multiple linear regression analyses (MLRA), Natural frequencies, Permittivity, Propagation media, Volumetrics, Wireless communications, Wireless underground sensor networks}, doi = {10.1002/dac.5051}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85119955862\&doi=10.1002\%2fdac.5051\&partnerID=40\&md5=551c7d444e649e1e52b647125dd3e638}, author = {El Mejjatti, M. and Habbani, A. and El Bouanani, F.} } @article {Mezouar2022501, title = {The Retirement Supply Chain Improvement Using L-SCOR}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {501-514}, abstract = {In order to design an adaptable business process, the SCOR model was extended to L-SCOR model integrating the concept of adaptability at the two sections {\textquotedblleft}Process{\textquotedblright} and {\textquotedblleft}Metrics{\textquotedblright}. This work represents a case study that gives the chance to apply L-SCOR on the retirement supply chain. This paper started by giving an overall overview about L-SCOR model then detailed the studied supply chain models at two levels of L-SCOR. The second level model expressed the flows between the planning processes and the business process sL3 {\textquotedblleft}Learn Make{\textquotedblright} that describes the management of adaptability for rights liquidation. The fourth level model explains how the recommendation web service will be used for this business process. The paper also detailed the prerequisites for the recommendation web service which implements the Q-Learning algorithm, and discussed the returning Q-table and the optimal strategy for the called activity. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_38}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135009603\&doi=10.1007\%2f978-3-031-07969-6_38\&partnerID=40\&md5=1b13ad88086e61020688b4e24661bd94}, author = {Mezouar, H. and El Afia, A.} } @conference {Sardi2022435, title = {A Reusable Catalog of Requirements for Gamified Mobile Health Applications}, booktitle = {International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE - Proceedings}, year = {2022}, note = {cited By 0}, pages = {435-442}, abstract = {The new era of mobile technologies has revolutionized all fundamental human pursuits in that many sectors have been reshaped and tangibly improved, such as education, finance, and healthcare. Referred to as mHealth, the use of mobile technologies to track and improve health outcomes is a rapidly expanding trend. A plethora of mobile health applications (mHealth apps) are being constantly developed thanks to the rapid adoption of mobile devices. From basic exercise trackers to powerful self-management tools, mHealth apps play several roles towards the provision of better healthcare. To induce playful experiences and boost engagement, gamification has proven to be extremely effective with mHealth apps. This paper presents a catalog of reusable requirements for gamified mHealth apps in terms of gamification, functional suitability, usability, and security, Further improvements are intended to be made continuously to the catalog by adding additional requirements scattered from other standards and information sources. Copyright {\textcopyright} 2022 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved.}, keywords = {Biomedical engineering, Catalog, Gamification, Health outcomes, ISO/IEC, ISO/IEC 25010, Management tool, mHealth, Mobile health application, Mobile Technology, Requirement, Self management}, doi = {10.5220/0011071700003176}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140984297\&doi=10.5220\%2f0011071700003176\&partnerID=40\&md5=dc18bd51fe840506f2a31af133df9fb2}, author = {Sardi, L. and Idri, A. and Redman, L.M. and Alami, H. and Fernandez-Aleman, J.L.} } @article {Kharbouch2022, title = {Reviewing the features and functionalities of contraception mPHRs}, journal = {Health Policy and Technology}, volume = {11}, number = {3}, year = {2022}, note = {cited By 0}, abstract = {Background and objective. Women{\textquoteright}s circumstances and preferences tend to change over times signifying that accessing and choosing a contraceptive method during their reproductive life is crucial. By preventing unintended pregnancies and reducing the need for abortion, effective contraception ensures women{\textquoteright}s well-being and autonomy, improves their social and economic role, and enables them to fully participate in society while supporting the health and development of their communities. The use of mobile applications (apps) for contraception is considered a promising approach by which to facilitate access to a reproductive health service of this nature and spread awareness about contraception. The aim of this paper is, therefore, to assess the features and functionalities of the contraception mPHRs (Mobile Personal Health Records) that are available on both the Android and iOS platforms. Methods. In order to select, extract data from and evaluate the features and functionalities of existing contraception apps, an analysis process based on the well-known Systematic Literature Review (SLR) protocol was conducted for the contraception apps that are available on both the Android and iOS app platforms. The analysis and assessment of selected apps{\textquoteright} features were performed in accordance with a twenty-seven item assessment questionnaire. The latter was developed on the basis of the scientific literature concerning contraception, and a preliminary analysis of the contraception apps currently available. Results. A total of 54 contraception apps were selected, including 38 for Android, 4 for iOS, and 12 for crossed platform apps. The results showed that only 11\% of the apps selected do support the World Health Organization{\textquoteright}s (WHO) medical eligibility criteria for contraception (MEC), and that barely 43\% provide relevant information about contraceptive methods, their efficiency, risks, and contraindications. Conclusion. This study will help users, eHealth apps providers, and developers. Users on the one hand will be able to better select the most appropriate contraceptive apps. On the other hand, both eHealth application providers and developers can thereby: (1) identify the relevant features and functionalities implemented by the top-scoring contraceptive apps, and (2) distinguish contraception-related aspects that require further efforts to be properly addressed and improved. {\textcopyright} 2022}, keywords = {awareness, contraception, Data availability, female, human, information security, medical record, Monitoring, Preferred Reporting Items for Systematic Reviews and Meta-Analyses, questionnaire, recording, reminder system, reproductive health, Review, social support, Systematic Review}, doi = {10.1016/j.hlpt.2022.100633}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85132651990\&doi=10.1016\%2fj.hlpt.2022.100633\&partnerID=40\&md5=b101e386be125c92bddf8bf212de3a39}, author = {Kharbouch, M. and Idri, A. and Fernandez-Aleman, J.L. and Redman, L. and Toval, A. and Stelate, Y.} } @article {Radouane20223507, title = {A ROBUST WATERMARKING SCHEME BASED ON DCT, IWT and SVD WITH OPTIMAL BLOCK}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {100}, number = {11}, year = {2022}, note = {cited By 0}, pages = {3507-3521}, abstract = {Signal processing{\textquoteright}s impact on development of digital media technologies have become a hot topic. The increased of computer network and the growth of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information (text, image, sound, and video). To ensure multimedia security, researchers are focusing on digital image watermarking. With this new concept, the watermark is not just hiding in an image, but it{\textquoteright}s marked indelibly. In this paper a robust method of digital images watermarking based on combination of DCT, IWT and SVD is proposed. At first, Visual cryptography is used to encrypt the watermark image. Then DCT is applied to it and to the host image. IWT and SVD are applied on DCT coefficients of both watermark and host images. After that, the watermarking process is done by embedding singular values of watermark image to the singular values of host image. Moreover, the obtained watermarked images are subjected to different attacks to improve the robustness of the proposed scheme. Finally, the extraction process is based on watermarked image and the reverse method of embedding process to reconstruct the original watermark. The performance is evaluated under various attacks and experimental results show that our algorithm provides a high level of robustness and imperceptibility than the state-of-the-art methods. {\textcopyright} 2022 Little Lion Scientific.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85133519929\&partnerID=40\&md5=7957ed0e26c3399d0ba554b9a2f98aa5}, author = {Radouane, M. and Zouggari, N.I. and Amraoui, A. and Amraoui, M.} } @article {Bourja2021915, title = {Real Time Vehicle Detection, Tracking, and Inter-vehicle Distance Estimation based on Stereovision and Deep Learning using Yolov3}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {12}, number = {8}, year = {2021}, note = {cited By 1}, pages = {915-923}, abstract = {Abstract{\textemdash}In this paper, we propose a robust real-time vehicle tracking and inter-vehicle distance estimation algorithm based on stereovision. Traffic images are captured by a stereoscopic system installed on the road, and then we detect moving vehicles with the YOLO V3 Deep Neural Network algorithm. Thus, the real-time video goes through an algorithm for stereoscopy-based measurement in order to estimate distance between detected vehicles. However, detecting the real-time objects have always been a challenging task because of occlusion, scale, illumination etc. Thus, many convolutional neural network models based on object detection were developed in recent years. But they cannot be used for real-time object analysis because of slow speed of recognition. The model which is performing excellent currently is the unified object detection model which is You Only Look Once (YOLO). But in our experiment, we have found that despite of having a very good detection precision, YOLO still has some limitations. YOLO processes every image separately even in a continuous video or frames. Because of this much important identification can be lost. So, after the vehicle detection and tracking, inter-vehicle distance estimation is done. {\textcopyright} 2021. International Journal of Advanced Computer Science and Applications. All Rights Reserved.}, keywords = {Bounding-box, Convolution, Convolutional neural network, Convolutional neural networks, Deep neural networks, Distance estimation, Estimation algorithm, Object detection, Object recognition, Real- time, Stereo image processing, Stereoimages, Stereovision, Tracking, Vehicles, Vehicles detection, YOLOv3 deep neural network}, doi = {10.14569/IJACSA.2021.01208101}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85118990281\&doi=10.14569\%2fIJACSA.2021.01208101\&partnerID=40\&md5=225926d9445a4fed55a125a55e519b2f}, author = {Bourja, O. and Derrouz, H. and Abdelali, H.A. and Maach, A. and Thami, R.O.H. and Bourzeix, F.} } @article {Moumen20211634, title = {Real-time Arabic scene text detection using fully convolutional neural networks}, journal = {International Journal of Electrical and Computer Engineering}, volume = {11}, number = {2}, year = {2021}, note = {cited By 1}, pages = {1634-1640}, abstract = {The aim of this research is to propose a fully convolutional approach to address the problem of real-time scene text detection for Arabic language. Text detection is performed using a two-steps multi-scale approach. The first step uses light-weighted fully convolutional network: TextBlockDetector FCN, an adaptation of VGG-16 to eliminate non-textual elements, localize wide scale text and give text scale estimation. The second step determines narrow scale range of text using fully convolutional network for maximum performance. To evaluate the system, we confront the results of the framework to the results obtained with single VGG-16 fully deployed for text detection in one-shot; in addition to previous results in the state-of-the-art. For training and testing, we initiate a dataset of 575 images manually processed along with data augmentation to enrich training process. The system scores a precision of 0.651 vs 0.64 in the state-of-the-art and an FPS of 24.3 vs 31.7 for a VGG-16 fully deployed. {\textcopyright} 2021 Institute of Advanced Engineering and Science. All rights reserved.}, doi = {10.11591/ijece.v11i2.pp1634-1640}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097836850\&doi=10.11591\%2fijece.v11i2.pp1634-1640\&partnerID=40\&md5=18f6883629a31b869bc0f2225a4cbf29}, author = {Moumen, R. and Chiheb, R. and Faizi, R.} } @conference {Remli2021328, title = {Reference Architecture for Efficient Computer Integrated Manufacturing}, booktitle = {International Conference on Enterprise Information Systems, ICEIS - Proceedings}, volume = {1}, year = {2021}, note = {cited By 0}, pages = {328-334}, abstract = {The technological progress combined with the rapidly changing customer demands are pushing for continuous changes in manufacturing environments. This led industrial companies into seeking the optimization of their processes through Computer Integrated Manufacturing (CIM). The main purpose of the latter is to link the shop floor systems to the high business layer ones. Based on a literature review that we have conducted earlier on CIM architectures, we have identified the different aspects related to CIM and detected the limitations of the existing approaches. With the aim of overcoming these limitations, we present in this paper a reference architecture for CIM based on the ISA-95 standard. We also explain how the proposed architecture was applied on a case study from the automotive industry. Copyright {\textcopyright} 2021 by SCITEPRESS {\textendash} Science and Technology Publications, Lda. All rights reserved.}, keywords = {Automotive industry, Computer integrated manufacturing, Computer-integrated manufacturing, Customer demands, Industrial companies, Manufacturing environments, Optimisations, Reference architecture, Shopfloors, Smart manufacturing, Systems architecture, Technological progress}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137946996\&partnerID=40\&md5=3dc1bfa95e09b3a460540e7f31304823}, author = {Remli, A. and Khtira, A. and El Asri, B.} } @article {ElFhel2021324, title = {A Requirements Catalog of Mobile Geographic Information System for Data Collection}, journal = {Advances in Intelligent Systems and Computing}, volume = {1366 AISC}, year = {2021}, note = {cited By 2}, pages = {324-336}, abstract = {Mobile Geographic Information System (mGIS) for data collection are designed to capture, analyze and manage geographical data. The aim of this paper is to define a requirements catalog for mGIS for data collection based on the main software engineering standards, GIS standards and literature. The catalog contains functional requirements in addition to requirements about usability, internationalization (i18n), performance efficiency, reliability and sustainability. This catalog can be useful for stakeholders and developers to evaluate their apps and/or identify potential requirements for new mGIS apps for data collection. {\textcopyright} 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Data acquisition, Data collection, Functional requirement, Geographic information systems, Geographical data, Information management, Information systems, Information use, Mobile geographic information systems, Performance efficiency, Software engineering, Software engineering standards}, doi = {10.1007/978-3-030-72651-5_32}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85107324425\&doi=10.1007\%2f978-3-030-72651-5_32\&partnerID=40\&md5=16bcf6a546df5b7bf9d750897b7ad643}, author = {El Fhel, B. and Sardi, L. and Idri, A.} } @conference {ElAkrouchi2021, title = {Review on adopting concept extraction in weak signals detection in competitive intelligence}, booktitle = {ACM International Conference Proceeding Series}, year = {2021}, note = {cited By 0}, abstract = {The dynamic nature of competition in the business environment makes a company{\textquoteright}s ability to secure future change more critical to its survival. Consequently, efficient exploitation of valuable intel is globally acknowledged as an essential foundation of competitive advantage, leading to Competitive Intelligence. Besides, one of the crucial keys to successful competitive information securing is studying the future. Thus, predicting what may happen in the uncertain future is a leading-edge technology leading to an extensive need for foresight analysis. Foresight study uses various methods to recognize future developments and make plans that anticipate possible future changes. One of the leading techniques used in foresight is detecting and understanding Weak Signals. But knowing the nature of these signals, automatically scanning them is still considered a difficult task. For this, we examine the Concept Extraction technique as a main step to detect weak signals from documents automatically. In this paper, we will explain the concept extraction methods used so far, and we present in detail all the main methods and approaches and their application in detecting weak signals. {\textcopyright} 2021 Association for Computing Machinery.}, keywords = {Business environments, Competition, Competitive advantage, Competitive intelligence, Concept extraction, Data mining, Dynamic nature, Extraction, Leading edge technology, Possible futures, Signal detection, Topic Modeling, Weak signal detection, Weak signals}, doi = {10.1145/3485557.3485560}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85121505750\&doi=10.1145\%2f3485557.3485560\&partnerID=40\&md5=01161f382ecb38a8faf2883a2bc37003}, author = {El Akrouchi, M. and Benbrahim, H. and Kassou, I.} } @article {Zerouaoui2021, title = {Reviewing Machine Learning and Image Processing Based Decision-Making Systems for Breast Cancer Imaging}, journal = {Journal of Medical Systems}, volume = {45}, number = {1}, year = {2021}, note = {cited By 19}, abstract = {Breast cancer (BC) is the leading cause of death among women worldwide. It affects in general women older than 40~years old. Medical images analysis is one of the most promising research areas since it provides facilities for diagnosis and decision-making of several diseases such as BC. This paper conducts a Structured Literature Review (SLR) of the use of Machine Learning (ML) and Image Processing (IP) techniques to deal with BC imaging. A set of 530 papers published between 2000 and August 2019 were selected and analyzed according to ten criteria: year and publication channel, empirical type, research type, medical task, machine learning techniques, datasets used, validation methods, performance measures and image processing techniques which include image pre-processing, segmentation, feature extraction and feature selection. Results showed that diagnosis was the most used medical task and that Deep Learning techniques (DL) were largely used to perform classification. Furthermore, we found out that classification was the most ML objective investigated followed by prediction and clustering. Most of the selected studies used Mammograms as imaging modalities rather than Ultrasound or Magnetic Resonance Imaging with the use of public or private datasets with MIAS as the most frequently investigated public dataset. As for image processing techniques, the majority of the selected studies pre-process their input images by reducing the noise and normalizing the colors, and some of them use segmentation to extract the region of interest with the thresholding method. For feature extraction, we note that researchers extracted the relevant features using classical feature extraction techniques (e.g. Texture features, Shape features, etc.) or DL techniques (e. g. VGG16, VGG19, ResNet, etc.), and finally few papers used feature selection techniques in particular the filter methods. {\textcopyright} 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature.}, keywords = {Article, breast, Breast Cancer, cancer diagnosis, classifier, Computer-Assisted, Convolutional neural network, Decision making, Deep learning, deep neural network, diagnostic accuracy, diagnostic imaging, echography, Feature extraction, feature selection, female, human, Humans, image processing, image segmentation, Machine learning, Magnetic Resonance Imaging, mammography, multilayer perceptron, nuclear magnetic resonance imaging}, doi = {10.1007/s10916-020-01689-1}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100125842\&doi=10.1007\%2fs10916-020-01689-1\&partnerID=40\&md5=3074b3d443373f75f5a3c1c6134512ee}, author = {Zerouaoui, H. and Idri, A.} } @article {Bousarhane2021128, title = {Road signs recognition: State-of-the-art and perspectives}, journal = {International Journal of Data Analysis Techniques and Strategies}, volume = {13}, number = {1-2}, year = {2021}, note = {cited By 3}, pages = {128-150}, abstract = {Making cars safer is a crucial element of saving lives on roads. In case of inattention or distraction, drivers need a performant system that is capable of assisting and alerting them when a road sign appears in their field of vision. To create such type of systems, we need to know first the major difficulties that still face traffic signs recognition, as presented in the first and second sections of this paper. We should also study the different methods proposed by researchers to overcome each of these challenges, as proposed in the third section. Evaluation metrics and criteria for proving the effectiveness of these approaches represents also an important element which section three of this article presents. Ameliorating the existing methods is crucial to ensure the effectiveness of the recognition process, especially by using deep learning algorithms and optimisation techniques, as discussed in the last section of this paper. Copyright {\textcopyright} 2021 Inderscience Enterprises Ltd.}, doi = {10.1504/IJDATS.2021.114672}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85105378999\&doi=10.1504\%2fIJDATS.2021.114672\&partnerID=40\&md5=4e6615f2c65809991f341981b8972375}, author = {Bousarhane, B. and Bensiali, S. and Bouzidi, D.} } @conference {Retmi20211667, title = {Role of Digitalization in the Hospital Supply Chain Performance Improvement: Digitalization of Hospital Pharmacy}, booktitle = {Proceedings of the International Conference on Industrial Engineering and Operations Management}, year = {2021}, note = {cited By 0}, pages = {1667-1675}, abstract = {The hospital is a different supply chain made up of different structures and flows. Due to the Covid-19 pandemic, the hospital has overcome several major challenges in recent times, which have prompted it to accelerate the digitization of its supply chain to improve the quality of hospital care and services. This article looks at a specific point, that of performance in the hospital supply chain, and asks the following question: What is the role of digitalization in improving the performance of the hospital supply chain?. {\textcopyright} IEOM Society International.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85126203150\&partnerID=40\&md5=815020aadcba2907820de968a3beebd8}, author = {Retmi, K. and Tamir, M. and Ouzayd, F.} } @conference {Lamrhari2020, title = {Random Forest-based Approach for Classifying Customers in Social CRM}, booktitle = {2020 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2020}, year = {2020}, note = {cited By 0}, abstract = {Social Customer Relationship Management (social CRM) has become one of the central points for many companies seeking to improve their customer experience. It comprises a set of processes that allows decision-makers to analyze customer data in order to launch an efficient customer-centric and cost-effective marketing strategy. However, targeting all potential customers with one general marketing strategy seems to be inefficient. While targeting each potential customer with a specific strategy can be cost demanding. Thus, it is essential to group customers into specific classes and target each class according to its respective customer needs. In this paper, we develop a Random Forest- based approach to classify potential customers into three main categories namely, prospects, satisfied and unsatisfied customers. The proposed model has been trained, tested, and compared to some state-of-the-art classifiers viz., Artificial Neural Network (ANN), Support Vector Machine (SVM), and K-Nearest Neighbor (KNN) based on several metrics including accuracy, sensitivity, specificity, false positive rate, and false negative rate. The reported results were satisfactory with an accuracy of 98.46\%, a sensitivity of 97.69\%, and a specificity of 98.84\%. {\textcopyright} 2020 IEEE.}, keywords = {Commerce, Cost effectiveness, Customer experience, Customer relationship management, Decision making, Decision trees, False negative rate, False positive rates, Industrial management, K nearest neighbor (KNN), Marketing strategy, Nearest neighbor search, Neural networks, Potential customers, Public relations, Random forests, Sales, State of the art, Strategic planning, Support vector machines}, doi = {10.1109/ICTMOD49425.2020.9380602}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103738578\&doi=10.1109\%2fICTMOD49425.2020.9380602\&partnerID=40\&md5=c672980200a36b34b0ae6df0842ef948}, author = {Lamrhari, S. and Elghazi, H. and El Faker, A.} } @conference {Ben-Aboud20201324, title = {A research-oriented low-cost air pollution monitoring IoT platform}, booktitle = {2020 International Wireless Communications and Mobile Computing, IWCMC 2020}, year = {2020}, note = {cited By 1}, pages = {1324-1329}, abstract = {This paper presents an IoT platform designed for air pollution monitoring. It aiming to facilitate the testing of different data collection strategies, to simplify the air quality monitoring process, to provide the citizens with real-time information about air pollution, to allow citizens to participate in the air quality monitoring process, and to help the authorities identify zones of high air pollution and take the most appropriate measures to improve air quality. The sensor nodes have been developed using low-cost off-the-shelf hardware. Both nomadic and mobile sensor nodes have been developed. A novel sensor management middleware has been designed and developed to have the flexibility to remotely control the operational settings of the sensor nodes and to reduce the volume of transmitted data. Finally, two applications have been developed and implemented for data visualization. The first is a mobile friendly air pollution meter. The second offers a spatial visualization of air pollution levels using a Geographic Information System (GIS). The developed platform has been tested in multiple measurement campaigns. The results of one of these campaigns (conducted in Hay Nahda II, Rabat, Morocco) is presented in this paper to showcase the platform. {\textcopyright} 2020 IEEE.}, keywords = {Air pollution monitoring, Air quality, Air quality monitoring, Costs, Data collection strategies, Data visualization, Information use, Internet of things, Middleware, Mobile computing, Mobile sensor node, Multiple measurements, Off-the-shelf hardwares, Pollution detection, Real-time information, Sensor nodes, Spatial visualization, Visualization}, doi = {10.1109/IWCMC48107.2020.9148176}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089690465\&doi=10.1109\%2fIWCMC48107.2020.9148176\&partnerID=40\&md5=6b9c355d625a664f7d5ac062470cf5f0}, author = {Ben-Aboud, Y. and Ghogho, M. and Kobbane, A.} } @article {Echihabi2020402, title = {Return of the lernaean hydra: Experimental evaluation of data series approximate similarity search}, journal = {Proceedings of the VLDB Endowment}, volume = {13}, number = {3}, year = {2020}, note = {cited By 25}, pages = {402-419}, abstract = {Data series are a special type of multidimensional data present in numerous domains, where similarity search is a key operation that has been extensively studied in the data series literature. In parallel, the multidimensional community has studied approximate similarity search techniques. We propose a taxonomy of similarity search techniques that reconciles the terminology used in these two domains, we describe modifications to data series indexing techniques enabling them to answer approximate similarity queries with quality guarantees, and we conduct a thorough experimental evaluation to compare approximate similarity search techniques under a unified framework, on synthetic and real datasets in memory and on disk. Although data series differ from generic multidimensional vectors (series usually exhibit correlation between neighboring values), our results show that data series techniques answer approximate queries with strong guarantees and an excellent empirical performance, on data series and vectors alike. These techniques outperform the state-of-the-art approximate techniques for vectors when operating on disk, and remain competitive in memory.}, keywords = {Approximate query, Empirical performance, Experimental evaluation, Indexing techniques, Multi-dimensional vectors, Multidimensional data, Quality control, Query processing, Similarity search, Unified framework}, doi = {10.14778/3368289.3368303}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85092075628\&doi=10.14778\%2f3368289.3368303\&partnerID=40\&md5=c84591d6c7c3001ccc91a3584e71e4ff}, author = {Echihabi, K. and Zoumpatianos, K. and Palpanas, T. and Benbrahim, H.} } @conference {Miloudi2020251, title = {A Review of Open Source Software Maintenance Effort Estimation}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, pages = {251-256}, abstract = {Open Source Software (OSS) is gaining interests of software engineering community as well as practitioners from industry with the growth of the internet. Studies in estimating maintenance effort (MEE) of such software product have been published in the literature in order to provide better estimation. The aim of this study is to provide a review of studies related to maintenance effort estimation for open source software (OSSMEE). To this end, a set of 60 primary empirical studies are selected from six electronic databases and a discussion is provided according to eight research questions (RQs) related to: publication year, publication source, datasets (OSS projects), metrics (independent variables), techniques, maintenance effort (dependent variable), validation methods, and accuracy criteria used in the empirical validation. This study has found that popular OSS projects have been used, Linear Regression, Na{\"\i}ve Bayes and k Nearest Neighbors were frequently used, and bug resolution was the most used regarding the estimation of maintenance effort for the future releases. A set of gaps are identified and recommendations for researchers are also provided. {\textcopyright} 2020 ACM.}, keywords = {Computer software maintenance, Dependent variables, Electronic database, Empirical validation, Engineering community, Independent variables, Intelligent systems, K-nearest neighbors, Maintenance efforts, Nearest neighbor search, Open source software, Open systems, Research questions, Sodium compounds}, doi = {10.1145/3419604.3419809}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096413214\&doi=10.1145\%2f3419604.3419809\&partnerID=40\&md5=7ad5b9eacb605d7875e2123cfec6ddeb}, author = {Miloudi, C. and Cheikhi, L. and Idri, A.} } @article {Bouras2020237, title = {A review of the most adopted fault tolerance approaches for sram based fpga real time critical embedded system}, journal = {Journal of Advanced Research in Dynamical and Control Systems}, volume = {12}, number = {3 Special Issue}, year = {2020}, note = {cited By 0}, pages = {237-241}, abstract = {Since the downscaling in technology FPGAs became widely used in space embedded systems, due to their high computing capability, flexibility and easiness of implementation. Especially, SRAM-based FPGAs are now more adopted and implemented; as processing unit; in digital systems like the ADCS, in nanosatellite. However, this continuous downscaling made radiation-induced errors become a major concern. Particularly for SRAMs-based FPGAs, because they are more sensitive to radiations and more prone to soft errors. Regarding this matter, many approaches were developed and adopted in literature. Our objective is to optimize the reliability of the ADCS system, by improving the reliability of its SRAM based-FPGA. Therefore, in this paper we briefly describe the SRAM based FPGA configuration memory. Also, we present the different faults tolerance approaches proposed in the literature, and we evaluate these approaches by illuminating their advantages and disadvantages. {\textcopyright} 2020, Institute of Advanced Scientific Research, Inc.. All rights reserved.}, doi = {10.5373/JARDCS/V12SP3/20201258}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85082941306\&doi=10.5373\%2fJARDCS\%2fV12SP3\%2f20201258\&partnerID=40\&md5=996763606f1d62a920796c21a385771b}, author = {Bouras, M. and Berbia, H.} } @article {Ezzat202065, title = {Reviewing Data Analytics Techniques in Breast Cancer Treatment}, journal = {Advances in Intelligent Systems and Computing}, volume = {1161 AISC}, year = {2020}, note = {cited By 1}, pages = {65-75}, abstract = {Data mining (DM) or Data Analytics is the process of extracting new valuable information from large quantities of data; it is reshaping many industries including the medical one. Its contribution to medicine is very important particularly in oncology. Breast cancer is the most common type of cancer in the world and it occurs almost entirely in women, but men can get attacked too. Researchers over the world are trying every day to improve, prevention, detection and treatment of Breast Cancer (BC) in order to provide more effective treatments to patients. In this vein, the present paper carried out a systematic map of the use of data mining technique in breast cancer treatment. The aim was to analyse and synthetize studies on DM applied to breast cancer treatment. In this regard, 44 relevant articles published between 1991 and 2019 were selected and classified according to three criteria: year and channel of publication, research type through DM contribution in BC treatment and DM techniques. Of course, there are not many articles for treatment, because the researchers have been interested in the diagnosis with the different classification techniques, and it may be because of the importance of early diagnosis to avoid danger. Results show that papers were published in different channels (especially journals or conferences), researchers follow the DM pipeline to deal with a BC treatment, the challenge is to reduce the number of non-classified patients, and affect them in the most appropriate group to follow the suitable treatment, and classification was the most used task of DM applied to BC treatment. {\textcopyright} 2020, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Breast Cancer, Breast cancer treatment, Classification technique, Computer aided diagnosis, Data Analytics, Data mining, Diseases, early diagnosis, Information systems, Information use, Medical computing, Patient treatment, Systematic maps}, doi = {10.1007/978-3-030-45697-9_7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085470786\&doi=10.1007\%2f978-3-030-45697-9_7\&partnerID=40\&md5=cc91fa4ca2e05ed50ac292abaf968494}, author = {EZZAT, M. and Idri, A.} } @article {Benlakhdar20201659, title = {A robust model using SIFT and gamma mixture model for texture images classification: Perspectives for medical applications}, journal = {Biomedical and Pharmacology Journal}, volume = {13}, number = {4}, year = {2020}, note = {cited By 0}, pages = {1659-1669}, abstract = {The texture analysis of medical images is a powerful calculation tool for the discrimination between pathological and healthy tissue in different organs in medical images. Our paper proposes a novel approach named, GGD-GMM, based on statistical modeling in wavelet domain to describe texture images. Firstly, we propose a robust algorithm based on the combination of the wavelet transform and Scale Invariant Feature Transform (SIFT). Secondly, we implement the aforementioned algorithm and fit the result by using the finite Gamma Mixture Model (GMM). The results, obtained for two benchmark datasets, show that our proposed algorithm has a good relevance as it provides higher classification accuracy compared to some other well known models. Moreover, it displays others advantages relied to Noise-resistant and rotation invariant. Our algorithm could be useful for the analysis of several medical issues. {\textcopyright} 2020 This is an Open Access article licensed under a Creative Commons license: Attribution 4.0 International (CC-BY). Published by Oriental Scientific Publishing Company}, keywords = {Article, curvelet transform, human, human experiment, noise, rotation, scale invariant feature transform}, doi = {10.13005/BPJ/2041}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100517546\&doi=10.13005\%2fBPJ\%2f2041\&partnerID=40\&md5=8997e98fae845d62807a15ca1c749766}, author = {Benlakhdar, S. and Rziza, M. and Thami, R.O.H.} } @article {Katkout2020, title = {Robust Multiobjective Model Predictive Control with Computation Delay Compensation for Electric Vehicle Applications Using PMSM with Multilevel Inverter}, journal = {Mathematical Problems in Engineering}, volume = {2020}, year = {2020}, note = {cited By 2}, abstract = {The Three-Level Neutral-Point-Clamped (3L-NPC) inverter fed Permanent Magnet Synchronous Motor (PMSM) drive is an attractive configuration for high performance Electric Vehicle (EV) applications. For such configuration, due to their high performances, the Finite-Control-Set Model Predictive Control (FCS-MPC) is a very attractive control solution. The FCS-MPC scheme is based on the prediction of the future behavior of the controlled variables using the dynamic model of PMSM and the discrete nature of the 3L-NPC inverter. However, the parametric uncertainties and time-varying parameters affect the FCS-MPC algorithm performances. In this paper, robust FCS-MPC controls based on "dynamic error correction" (DEC) and "modified revised prediction" (MRP) are proposed to improve the FCS-MPC robustness without affecting the controller performances and complexity. The proposed strategies are improved also by multiobjective (MO) algorithm optimization and computation delay compensation. The simulation results included prove the performance in robustness and efficiency of the proposed robust FCS-MPC-DEC. {\textcopyright} 2020 Abdiddaim Katkout et al.}, keywords = {Algorithm optimization, Controller performance, Electric inverters, Electric vehicles, Error correction, High performance electric vehicles, Model predictive control, Multi-objective modeling, Parametric uncertainties, Permanent magnet synchronous motor drives, Permanent magnets, Predictive control systems, Robustness (control systems), Synchronous motors, Three-level neutral point clamped, Time varying parameter}, doi = {10.1155/2020/7015865}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085550129\&doi=10.1155\%2f2020\%2f7015865\&partnerID=40\&md5=a8af2bbc90a7acb6f7216d05eda69e31}, author = {Katkout, A. and Nasser, T. and Essadki, A.} } @conference {ElKaid20192, title = {Reduce False Positive Alerts for Elderly Person Fall Video-Detection Algorithm by convolutional neural network model}, booktitle = {Procedia Computer Science}, volume = {148}, year = {2019}, note = {cited By 0}, pages = {2-11}, doi = {10.1016/j.procs.2019.01.004}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062654984\&doi=10.1016\%2fj.procs.2019.01.004\&partnerID=40\&md5=a3f2ec1800bb3b810f23558c22f75095}, author = {El Kaid, A. and Baina, K. and Ba{\"\i}na, J.} } @article {Chakib2019359, title = {Robust ADRC control of a doubly fed induction generator based wind energy conversion system}, journal = {Lecture Notes in Electrical Engineering}, volume = {519}, year = {2019}, note = {cited By 0}, pages = {359-368}, doi = {10.1007/978-981-13-1405-6_44}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051797189\&doi=10.1007\%2f978-981-13-1405-6_44\&partnerID=40\&md5=2a302a1a265fe62df52bb43456d6e3f1}, author = {Chakib, M. and Essadki, A. and Nasser, T.} } @article {ElAfia2019337, title = {Runtime prediction of optimizers using improved support vector machine}, journal = {Lecture Notes in Networks and Systems}, volume = {49}, year = {2019}, note = {cited By 0}, pages = {337-350}, doi = {10.1007/978-3-319-97719-5_21}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063278208\&doi=10.1007\%2f978-3-319-97719-5_21\&partnerID=40\&md5=3326fe51db036a4ca8af1da02286aba7}, author = {El Afia, A. and Sarhani, M.} } @article {Zbakh2018160, title = {Recent advances in big data management-PART 1}, journal = {Recent Patents on Computer Science}, volume = {11}, number = {3}, year = {2018}, pages = {160}, doi = {10.2174/221327591103181030122822}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061479245\&doi=10.2174\%2f221327591103181030122822\&partnerID=40\&md5=ba4e1781f7acc93166ab576d2616ac51}, author = {Zbakh, M. and Ma, K.} } @conference {Amraoui20181, title = {Reducing network topology over smart digital mobile environment using linear programming approach}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, pages = {1-8}, doi = {10.1145/3289100.3289101}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058617163\&doi=10.1145\%2f3289100.3289101\&partnerID=40\&md5=2611403282d988e759c8721f91c739e5}, author = {Amraoui, H. and Habbani, A. and Hajami, A.} } @conference {Kerzazi2018, title = {Release engineering: From structural to functional view}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3289402.3289547}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062787123\&doi=10.1145\%2f3289402.3289547\&partnerID=40\&md5=9cbe63a1729a1e49aae60abf735872b1}, author = {Kerzazi, N. and El Asri, I.} } @article {CruzZapata2018, title = {Reusable Software Usability Specifications for mHealth Applications}, journal = {Journal of Medical Systems}, volume = {42}, number = {3}, year = {2018}, note = {cited By 0}, abstract = {One of the key factors for the adoption of mobile technologies, and in particular of mobile health applications, is usability. A usable application will be easier to use and understand by users, and will improve user{\textquoteright}s interaction with it. This paper proposes a software requirements catalog for usable mobile health applications, which can be used for the development of new applications, or the evaluation of existing ones. The catalog is based on the main identified sources in literature on usability and mobile health applications. Our catalog was organized according to the ISO/IEC/IEEE 29148:2011 standard and follows the SIREN methodology to create reusable catalogs. The applicability of the catalog was verified by the creation of an audit method, which was used to perform the evaluation of a real app, S Health, application created by Samsung Electronics Co. The usability requirements catalog, along with the audit method, identified several usability flaws on the evaluated app, which scored 83\%. Some flaws were detected in the app related to the navigation pattern. Some more issues related to the startup experience, empty screens or writing style were also found. The way a user navigates through an application improves or deteriorates user{\textquoteright}s experience with the application. We proposed a reusable usability catalog and an audit method. This proposal was used to evaluate a mobile health application. An audit report was created with the usability issues identified on the evaluated application. {\textcopyright} 2018, Springer Science+Business Media, LLC, part of Springer Nature.}, doi = {10.1007/s10916-018-0902-0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85040984885\&doi=10.1007\%2fs10916-018-0902-0\&partnerID=40\&md5=32ddf999ef891e8986a8a19c7271249a}, author = {Cruz Zapata, B. and Fernandez-Aleman, J.L. and Toval, A. and Idri, A.} } @conference {Rhazale2018, title = {A review of the governement information systems of organizational interoperability}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3230905.3230939}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053484486\&doi=10.1145\%2f3230905.3230939\&partnerID=40\&md5=a7a4b006fcc1fd6825835b97c2fd6b67}, author = {Rhazale, A. and Bounabat, B.} } @conference {Mourchid2017, title = {Random walk based co-occurrence prediction in location-based social networks}, booktitle = {IEEE International Conference on Communications}, year = {2017}, note = {cited By 0}, abstract = {In this paper, we propose a new version of the LBRW (Learning based Random Walk), LBRW-Co, for predicting users co-occurrence based on mobility homophily and social links. More precisely, we analyze and mine jointly spatio-temporal and social features with the aim to predict and rank users co-occurrences. Experiments are performed on the Foursquare LBSN with accurate and refined measurements. Experimental results demonstrate that our LBRW-Co model have substantial advantages over baseline approaches in predicting and ranking co-occurrence interactions. {\textcopyright} 2017 IEEE.}, doi = {10.1109/ICC.2017.7997209}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028326862\&doi=10.1109\%2fICC.2017.7997209\&partnerID=40\&md5=f865adbae7afd91e045cf307bb52ae7f}, author = {Mourchid, F. and Kobbane, A. and Ben Othman, J. and El Koutbi, M.} } @article {Niharmine20173087, title = {Recognition of handwritten tifinagh characters using gradient direction features}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {95}, number = {13}, year = {2017}, note = {cited By 0}, pages = {3087-3095}, abstract = {Optical Character Recognition system goal is to convert handwritten characters input images to an editable text. Many OCR techniques have been developed by researchers for Latin and Arabic languages. Amazigh language still have few works in this area. This paper emphasizes a new methodology to recognize the Tifinagh characters using zoning gradient features with a high accuracy and recognition rate. The new methodology is based on gradient direction as features and artificial neural networks as a classifier. The novelty of the new proposed system is the high accuracy and the training time which is very small compared with other classifiers. {\textcopyright} 2005 {\textendash} ongoing JATIT \& LLS.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85024366252\&partnerID=40\&md5=012b6056b533d3ac46e12de7824b5b98}, author = {Niharmine, L. and Outtaj, B. and Azouaoui, A.} } @conference {ElMaleky2017451, title = {Reconfigurable T-shaped antenna for S-band applications}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {451-455}, abstract = {This paper present a reconfigurable T-shaped antenna how can operate easily at seven frequencies in S-band, the switching technique consist of an equivalent approach to PIN Diode it is to change the state of the distribution of current by insert a simple micro strip line in different positions, the simulated and de measured prototype frequency is respectively 3.12 GHz, 3.2 GHz, 3.31 GHz, 3.44 GHz, 3.56 GHz, 3.76 GHz, 4 GHz. The antenna is fabricated using FR4 substrate with relative permittivity of 4.4 and pert tangent of 0.02. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905560}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019076990\&doi=10.1109\%2fICMCS.2016.7905560\&partnerID=40\&md5=1c70f996a2f8b128e94a389883fb7b80}, author = {El Maleky, O. and Ben Abdelouahab, F. and Essaaidi, M. and Ajana, L.} } @conference {Berkani2017, title = {A reduced complexity decoder using compact genetic algorithm for linear block codes}, booktitle = {2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings}, year = {2017}, note = {cited By 0}, abstract = {The compact Genetic Algorithm decoder has been introduced in [9] as an efficient decoding method of linear block codes. It requires less storage memory than Genetic Algorithms based decoders. One of its major weakness is the big number of necessary iterations to reach convergence in comparison with Genetic Algorithms (GA) based decoders. We propose, in this work, new ideas allowing us to reduce the number of iterations from about 105 to just about 103 which reduces the complexity of decoding. This, without decreasing the decoding performance. We introduce a new stopping criterion based on the soft weight of the probability vector p, a new initialization method of p and we tried to combine both methods all together. Both performance study and the calculation of the average number of iterations ensure the effectiveness of the proposed decoder. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ACOSIS.2016.7843925}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015167666\&doi=10.1109\%2fACOSIS.2016.7843925\&partnerID=40\&md5=5a7c05dbd39172dd4eae18956ce8e95e}, author = {Berkani, A. and Belkasmi, M.} } @conference {Ouhbi2017557, title = {Requirements for a mobile personal health record to improve cardiovascular healthcare services}, booktitle = {Proceedings of the ACM Symposium on Applied Computing}, volume = {Part F128005}, year = {2017}, note = {cited By 1}, pages = {557-562}, abstract = {Analyzing health records of patients suffering from chronic diseases such as cardiovascular disease can help understanding their conditions and therefore improving healthcare services offered to them. To improve the cardiology healthcare quality and efficiency in the Autonomic Nervous System centre in Avicenne Hospital in Rabat in Morocco, a mobile personal health record (mPHR) along with an electronic health record have been developed. This paper presents our mPHR{\textquoteright}s functional requirements used in the product development. It also presents some aspects of quality evaluation of the mPHR. An experiment has been conducted to assess and improve the mPHR{\textquoteright}s quality using the ISO/IEC 25010 standard. Copyright 2017 ACM.}, doi = {10.1145/3019612.3019725}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020871426\&doi=10.1145\%2f3019612.3019725\&partnerID=40\&md5=6cf797c1b1a37c7309de64935405f2e8}, author = {Ouhbi, S. and Idri, A. and Hakmi, R. and Benjelloun, H. and Fernandez-Aleman, J.L. and Toval, A.} } @conference {Ouhbi2017285, title = {A reusable requirements catalog for internationalized and sustainable blood donation apps}, booktitle = {ENASE 2017 - Proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering}, year = {2017}, note = {cited By 0}, pages = {285-292}, abstract = {Blood donation mobile applications are efficient tools to increase awareness about the importance of blood donation acts and to attract blood donors. The aim of this paper is to define a reusable requirements repository (catalog) for blood donation applications based on the main related software engineering standards, e-health technology standards and literature. The catalog contains requirements regarding internationalization to bridge the cultural and language barriers among blood donors. It includes also requirements for sustainable blood donation applications which cover the individual, social, environmental, and technical dimensions of sustainability. This catalog can be very useful to develop, evaluate and audit blood donation applications and it can be adapted to other m-health applications. {\textcopyright} 2017 by SCITEPRESS - Science and Technology Publications, Lda. All Rights Reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85025445810\&partnerID=40\&md5=b3c2b8763e5f5a729522529e5ca3e148}, author = {Ouhbi, S. and Fernandez-Aleman, J.L. and Idri, A. and Toval, A. and Pozo, J.R. and Bajta, M.E.} } @article {Boualouch20171, title = {A robust power control of a DFIG used in wind turbine conversion system}, journal = {International Energy Journal}, volume = {17}, number = {1}, year = {2017}, note = {cited By 0}, pages = {1-10}, abstract = {This paper presents a robust power control of a doubly fed induction generator (DFIG) used in Wind Energy Conversion Systems (WECS) based on the active disturbance rejection control (ADRC) connected to the grid power. In this article we present the performance and robustness of ADRC compared to other controllers regulators such as the polynomial controller RST applied to powers control for DFIG. The proposed control strategy employs ADRC based on Extended State Observer (ESO) scheme to directly calculate the required rotor control voltage in order to eliminate the instantaneous errors of active and reactive powers. Listed in this paper are the advantage, performance and robustness of the Active Disturbance Rejection Control. First, we present a model of wind turbine and DFIG machine, then a synthesis of the controllers and their application in the DFIG power control. Simulation results on a 1.5MW grid-connected DFIG system are provided by MATLAB/Simulink.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020533490\&partnerID=40\&md5=17085b8fbcb00bb5ac36b9fdfab0db0c}, author = {Boualouch, A. and Nasser, T. and Essadki, A. and Boukhriss, A. and Frigui, A.} } @conference { ISI:000391354500040, title = {Rectangular Dielectric Resonator Antenna (RDRA) for Anti-collision Short Range Radar (SRR) Application}, booktitle = {2016 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT)}, year = {2016}, note = {2nd International Conference on Electrical and Information Technologies (ICEIT), Tangier, MOROCCO, MAY 04-07, 2016}, pages = {237-239}, abstract = {This paper presents the design of Rectangular Dielectric Resonator Antenna (RDRA) feed by a micro-strip line for anti-collision radar SRR application at 24 GHz. The proposed RDRA operates at a frequency of 24 GHz with a high dielectric constant of 41. The simulated RDRA has a high radiation efficiency (88.4 \%). The return loss, radiation pattern and gain of the proposed antenna are evaluated. The simulation process was carried out using Computer Simulation Technology (CST) Microwave Studio.}, isbn = {978-1-4673-8469-8}, author = {Haddad, Abderrahim and Aoutoul, Mohssin and Rais, Khalid and Essaaidi, Mohamed}, editor = {Essaaidi, M and ElHani, S} } @conference {Haddad2016237, title = {Rectangular Dielectric Resonator Antenna (RDRA) for anti-collision short range radar (SRR) application}, booktitle = {Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016}, year = {2016}, note = {cited By 0}, pages = {237-239}, abstract = {This paper presents the design of Rectangular Dielectric Resonator Antenna (RDRA) feed by a micro-strip line for anti-collision radar SRR application at 24 GHz. The proposed RDRA operates at a frequency of 24 GHz with a high dielectric constant of 41. The simulated RDRA has a high radiation efficiency (88.4 \%). The return loss, radiation pattern and gain of the proposed antenna are evaluated. The simulation process was carried out using Computer Simulation Technology (CST) Microwave Studio. {\textcopyright} 2016 IEEE.}, doi = {10.1109/EITech.2016.7519597}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84992188168\&doi=10.1109\%2fEITech.2016.7519597\&partnerID=40\&md5=459bdb70786bf969bb54ead0761fd18e}, author = {Haddad, A.a and Aoutoul, M.b and Rais, K.a and Essaaidi, M.c} } @conference {Bounagui2016, title = {Requirements definition for a holistic approach of cloud computing governance}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, volume = {2016-July}, year = {2016}, note = {cited By 0}, abstract = {With the appearance of virtualization, the spread of internet, the development of broadband networks, and also the advent of externalization and application rental; cloud computing (CC) has emerged as being the next generation of distributed computing paradigm. Based on {\textquoteright}pay-for-what-you-use{\textquoteright} model, CC offers significant benefits including costs reduction, on demand provisioning, rapid elasticity, resources pooling, etc. But despite all its potential gains, the model also introduces many challenges from which the major concern that hampers its adoption is the lack of an integrated approach for CC governance. With regard to this matter, the main contributions of this paper is first, to analyze the existing standards and research works considering different aspects of IT governance; and second, to identify, analyze, and organize the main CC governance requirements that constitute the cornerstone for the development of an integrated approach for CC governance. {\textcopyright} 2015 IEEE.}, doi = {10.1109/AICCSA.2015.7507245}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84980328080\&doi=10.1109\%2fAICCSA.2015.7507245\&partnerID=40\&md5=abde0b8a81646802c167b52fb4e581d1}, author = {Bounagui, Y.a and Hafiddi, H.a b and Mezrioui, A.a} } @conference {Ouhbi2016, title = {Requirements specification of an e-health solution to improve cardiovascular healthcare services in Morocco}, booktitle = {SITA 2016 - 11th International Conference on Intelligent Systems: Theories and Applications}, year = {2016}, note = {cited By 0}, abstract = {Cardiovascular disease is the leading cause of deaths in the world. By analyzing data from health records this chronic disease can be better understood. This paper presents the software requirements specification (SRS) of an e-health solution to improve the cardiology healthcare quality and efficiency in Morocco. Based on this SRS, a mobile personal health record along with an electronic health record have been developed for the Autonomic Nervous System centre in Avicenne Hospital in Rabat. Requirements and characteristics of the mobile solution are detailed in this study. Moreover, an empirical evaluation has been conducted to assess and improve the quality of the mobile personal health record using the ISO/IEC 25010 standard. {\textcopyright} 2016 IEEE.}, doi = {10.1109/SITA.2016.7772309}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010407980\&doi=10.1109\%2fSITA.2016.7772309\&partnerID=40\&md5=005f49eb037586504f1262f955f907b1}, author = {Ouhbi, S.a and Idri, A.a and Hakmi, R.a and Benjelloun, H.b and Fernandez-Aleman, J.L.c and Toval, A.c} } @conference { ISI:000391420300054, title = {Requirements Specification of an e-Health Solution to Improve Cardiovascular Healthcare Services in Morocco}, booktitle = {2016 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, series = {International Conference on Intelligent Systems, Theories and Applications}, year = {2016}, note = {11th International Conference on Intelligent Systems - Theories and Applications (SITA), Mohammedia, MOROCCO, OCT 19-20, 2016}, publisher = {IEEE; Univ Hassan Casablanca; IEEE Morocco Sect; Fac Sci Tech Mohammedia}, organization = {IEEE; Univ Hassan Casablanca; IEEE Morocco Sect; Fac Sci Tech Mohammedia}, abstract = {Cardiovascular disease is the leading cause of deaths in the world. By analyzing data from health records this chronic disease can be better understood. This paper presents the software requirements specification (SRS) of an e-health solution to improve the cardiology healthcare quality and efficiency in Morocco. Based on this SRS, a mobile personal health record along with an electronic health record have been developed for the Autonomic Nervous System centre in Avicenne Hospital in Rabat. Requirements and characteristics of the mobile solution are detailed in this study. Moreover, an empirical evaluation has been conducted to assess and improve the quality of the mobile personal health record using the ISO/IEC 25010 standard.}, isbn = {978-1-5090-5781-8}, issn = {2378-2528}, author = {Ouhbi, Sofia and Idri, Ali and Hakmi, Rachid and Benjelloun, Halima and Luis Fernandez-Aleman, Jose and Toval, Ambrosio} } @article { ISI:000389146000005, title = {RESOLVING CONFLICTING PRIVACY POLICIES IN M-HEALTH BASED ON PRIORITIZATION}, journal = {Scalable Computing-Practice and Experience}, volume = {17}, number = {3, SI}, year = {2016}, month = {SEP}, pages = {207-226}, abstract = {Mobile health has recently gained a lot of attention. Biological, environmental and behavioral data collected from mobile devices can be analyzed and transmitted directly to the person, family or health professionals for immediate and individualized care. However, due to multiplicity of mobile applications and the heterogeneity of actors involved in patient{\textquoteright}s care, conflicts among the privacy policies defined by the different actors can take place. Thus, we present in this paper an approach to resolve the problem of conflicting privacy policies in e-health/m-health environments using AHP (Analytic Hierarchy Process) prioritization technique. Conflicts detection and resolution are facilitated by the adoption of S4P formal privacy policy language used as a standardized language. Finally, a case study is suggested to illustrate how our solution can be applied to resolve such conflicts.}, issn = {1895-1767}, doi = {10.12694/scpe.v17i3.1181}, author = {Sadki, Souad and El Bakkali, Hanan} } @article {Sadki2016207, title = {Resolving conflicting privacy policies in M-health based on prioritization}, journal = {Scalable Computing}, volume = {17}, number = {3}, year = {2016}, note = {cited By 1}, pages = {207-226}, abstract = {Mobile health has recently gained a lot of attention. Biological, environmental and behavioral data collected from mobile devices can be analyzed and transmitted directly to the person, family or health professionals for immediate and individualized care. However, due to multiplicity of mobile applications and the heterogeneity of actors involved in patient{\textquoteright}s care, conflicts among the privacy policies defined by the different actors can take place. Thus, we present in this paper an approach to resolve the problem of conflicting privacy policies in e-health/m-health environments using AHP (Analytic Hierarchy Process) prioritization technique. Conflicts detection and resolution are facilitated by the adoption of S4P formal privacy policy language used as a standardized language. Finally, a case study is suggested to illustrate how our solution can be applied to resolve such conflicts. {\textcopyright} 2016 SCPE.}, doi = {10.12694/scpe.v17i3.1181}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84986308427\&doi=10.12694\%2fscpe.v17i3.1181\&partnerID=40\&md5=3bd7feaa7560d5e70202fd7c24907f06}, author = {Sadki, S. and El Bakkali, H.} } @article {11714990220160901, title = {RESOLVING CONFLICTING PRIVACY POLICIES IN M-HEALTH BASED ON PRIORITIZATION.}, journal = {Scalable Computing: Practice \& Experience}, volume = {17}, number = {3}, year = {2016}, pages = {207 - 226}, abstract = {Mobile health has recently gained a lot of attention. Biological, environmental and behavioral data collected from mobile devices can be analyzed and transmitted directly to the person, family or health professionals for immediate and individualized care. However, due to multiplicity of mobile applications and the heterogeneity of actors involved in patient{\textquoteright}s care, conflicts among the privacy policies defined by the different actors can take place. Thus, we present in this paper an approach to resolve the problem of conflicting privacy policies in e-health/m-health environments using AHP (Analytic Hierarchy Process) prioritization technique. Conflicts detection and resolution are facilitated by the adoption of S4P formal privacy policy language used as a standardized language. Finally, a case study is suggested to illustrate how our solution can be applied to resolve such conflicts. [ABSTRACT FROM AUTHOR]}, keywords = {AHP, Conflicting policies, Data security, Medical policy, Privacy policy, Privacy preference, S4P, Wireless communication systems in medical care}, issn = {18951767}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=117149902\&site=ehost-live}, author = {Sadki, Souad and El Bakkali, Hanan} } @article {Anter20162128, title = {Retrieving and materializing data in hybrid mediators}, journal = {International Journal of Applied Engineering Research}, volume = {11}, number = {3}, year = {2016}, note = {cited By 0}, pages = {2128-2134}, abstract = {With the emergence of the new generation of information technologies and telecommunications, the mass of information produced by individuals and enterprises has increased in a considerable manner. Thus, and in order to manage this diversity of information, the integration systems were proposed. Among these, we find the hybrid information integration systems. They allow materializing a part of data in a local database, while integrating virtually the other part. As these materialized one is organized as views, it becomes necessary to propose algorithms for this objective. Among the most interesting ones, there is k-schema. It allows organize the attributes into a set of views, while affecting an attribute to a single view. This choice causes the not loading some of data that are highly requested by users, and at the same time, it loads other that are rarely requested. In this paper, we propose a new algorithm in this end. In this latter, it is authorized to assign a same attribute to several views. We also proposed new functions for calculating the dependencies between attributes. {\textcopyright} Research India Publications.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84973470278\&partnerID=40\&md5=140f0f35ca53260f11d97b5958f6ee8c}, author = {Anter, S. and Zellou, A. and Idri, A.} } @conference {Chaouni2016, title = {A Rules-based system for model composition}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, volume = {2016-July}, year = {2016}, note = {cited By 0}, abstract = {Model composition is one of the challenges of software systems modeling. As models are usually created independently, they present many types of heterogeneity (syntactic, semantic, local structural and global structural). These heterogeneities cause conflicts when composing models, and may introduce problems and inconsistencies in the resulting model. Indeed, when composing models, to consider that two elements are different when they are equivalent will introduce redundancy. Worst, considering two elements as equivalent when they are different will result in information lost. The purpose of this work is to present an approach of model composition for dealing with conflicts. Our hybrid approach integrates thus all aspects: semantic, syntactic, local structural and global structural in order to detect the right equivalences and right differences. We use ontologies to treat the semantic aspect of the model comparison. We propose a rule-based system called Co-Models. These rules are proposed formally. Finally, our approach is implemented and validated through a use case from banking domain. {\textcopyright} 2015 IEEE.}, doi = {10.1109/AICCSA.2015.7507217}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84980319574\&doi=10.1109\%2fAICCSA.2015.7507217\&partnerID=40\&md5=2884b5ed453e53a7d4c05f5aaac0781c}, author = {Chaouni, S.B.a and Fredj, M.b and Mouline, S.c} } @conference {Idri2015976, title = {RBFN network based models for estimating software development effort: A cross-validation study}, booktitle = {Proceedings - 2015 IEEE Symposium Series on Computational Intelligence, SSCI 2015}, year = {2015}, note = {cited By 0}, pages = {976-983}, abstract = {Software effort estimation is very crucial and there is always a need to improve its accuracy as much as possible. Several estimation techniques have been developed in this regard and it is difficult to determine which model gives more accurate estimation on which dataset. Among all proposed methods, the Radial Basis Function Neural (RBFN) networks models have presented promising results in software effort estimation. The main objective of this research is to evaluate the RBFN networks construction based on both hard and fuzzy C-means clustering algorithms using cross-validation approach. The objective of this replication study is to investigate if the RBFN-based models learned from the training data are able to estimate accurately the efforts of yet unseen data. This evaluation uses two historical datasets, namely COCOMO81 and ISBSG R8. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SSCI.2015.142}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964949962\&doi=10.1109\%2fSSCI.2015.142\&partnerID=40\&md5=af0dde3af393745967961e241dd05385}, author = {Idri, A.a and Hassani, A.a and Abran, A.b} } @conference { ISI:000380431500128, title = {RBFN Networks-based Models for Estimating Software Development Effort: A Cross-validation Study}, booktitle = {2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI)}, year = {2015}, note = {IEEE Symposium Series Computational Intelligence, Cape Town, SOUTH AFRICA, DEC 07-10, 2015}, pages = {925-932}, publisher = {IEEE; IEEE Computational Intelligence Soc; IEEE BigData}, organization = {IEEE; IEEE Computational Intelligence Soc; IEEE BigData}, abstract = {Software effort estimation is very crucial and there is always a need to improve its accuracy as much as possible. Several estimation techniques have been developed in this regard and it is difficult to determine which model gives more accurate estimation on which dataset. Among all proposed methods, the Radial Basis Function Neural (RBFN) networks models have presented promising results in software effort estimation. The main objective of this research is to evaluate the RBFN networks construction based on both hard and fuzzy C-means clustering algorithms using cross-validation approach. The objective of this replication study is to investigate if the RBFN-based models learned from the training data are able to estimate accurately the efforts of yet unseen data. This evaluation uses two historical datasets, namely COCOMO81 and ISBSG R8.}, isbn = {978-1-4799-7560-0}, doi = {10.1109/SSCI.2015.136}, author = {Idri, Ali and Hassani, Aya and Abran, Alain} } @conference { ISI:000380431500135, title = {RBFN Networks-based Models for Estimating Software Development Effort: A Cross-validation Study}, booktitle = {2015 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI)}, year = {2015}, note = {IEEE Symposium Series Computational Intelligence, Cape Town, SOUTH AFRICA, DEC 07-10, 2015}, pages = {976-983}, publisher = {IEEE; IEEE Computational Intelligence Soc; IEEE BigData}, organization = {IEEE; IEEE Computational Intelligence Soc; IEEE BigData}, abstract = {Software effort estimation is very crucial and there is always a need to improve its accuracy as much as possible. Several estimation techniques have been developed in this regard and it is difficult to determine which model gives more accurate estimation on which dataset. Among all proposed methods, the Radial Basis Function Neural (RBFN) networks models have presented promising results in software effort estimation. The main objective of this research is to evaluate the RBFN networks construction based on both hard and fuzzy C-means clustering algorithms using cross-validation approach. The objective of this replication study is to investigate if the RBFN-based models learned from the training data are able to estimate accurately the efforts of yet unseen data. This evaluation uses two historical datasets, namely COCOMO81 and ISBSG R8.}, isbn = {978-1-4799-7560-0}, doi = {10.1109/SSCI.2015.142}, author = {Idri, Ali and Hassani, Aya and Abran, Alain} } @conference {Idri2015925, title = {RBFN networks-based models for estimating software development effort: A cross-validation study}, booktitle = {Proceedings - 2015 IEEE Symposium Series on Computational Intelligence, SSCI 2015}, year = {2015}, note = {cited By 0}, pages = {925-932}, abstract = {Software effort estimation is very crucial and there is always a need to improve its accuracy as much as possible. Several estimation techniques have been developed in this regard and it is difficult to determine which model gives more accurate estimation on which dataset. Among all proposed methods, the Radial Basis Function Neural (RBFN) networks models have presented promising results in software effort estimation. The main objective of this research is to evaluate the RBFN networks construction based on both hard and fuzzy C-means clustering algorithms using cross-validation approach. The objective of this replication study is to investigate if the RBFN-based models learned from the training data are able to estimate accurately the efforts of yet unseen data. This evaluation uses two historical datasets, namely COCOMO81 and ISBSG R8. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SSCI.2015.136}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964998599\&doi=10.1109\%2fSSCI.2015.136\&partnerID=40\&md5=ff08a732a997a0619f3c654c70abf5eb}, author = {Idri, A.a and Hassani, A.b and Abran, A.a} } @article {10260344020150601, title = {Requirements engineering education: a systematic mapping study.}, journal = {Requirements Engineering}, volume = {20}, number = {2}, year = {2015}, pages = {119 - 138}, abstract = {Requirements engineering (RE) has attracted a great deal of attention from researchers and practitioners in recent years. Requirements engineering education (REE) is therefore an important undertaking if the field is to have professionals who are capable of successfully accomplishing software projects. This increasing interest demands that academia should provide software engineering students with a solid foundation in the subject matter. This paper aims to identify and to present the current research on REE that is available at present, and to select useful approaches and needs for future research. A systematic mapping study was therefore performed to classify the selected studies into five classification criteria: research type, empirical type, contribution type, RE activity, and curricula. A total of 79 papers were selected and classified according to these criteria. The results of this systematic mapping study are discussed, and a list of advice obtained from the REE literature fo}, keywords = {Computer software, education, Engineering {\textendash} Study \& teaching, Mappings (Mathematics), Requirements engineering, Software engineering, Software requirements, Systematic mapping study}, issn = {09473602}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=102603440\&site=ehost-live}, author = {Ouhbi, Sofia and Idri, Ali and Fern{\'a}ndez-Alem{\'a}n, Jos{\'e} and Toval, Ambrosio} } @article {Ouhbi2015119, title = {Requirements engineering education: a systematic mapping study}, journal = {Requirements Engineering}, volume = {20}, number = {2}, year = {2015}, note = {cited By 9}, pages = {119-138}, abstract = {Requirements engineering (RE) has attracted a great deal of attention from researchers and practitioners in recent years. Requirements engineering education (REE) is therefore an important undertaking if the field is to have professionals who are capable of successfully accomplishing software projects. This increasing interest demands that academia should provide software engineering students with a solid foundation in the subject matter. This paper aims to identify and to present the current research on REE that is available at present, and to select useful approaches and needs for future research. A systematic mapping study was therefore performed to classify the selected studies into five classification criteria: research type, empirical type, contribution type, RE activity, and curricula. A total of 79 papers were selected and classified according to these criteria. The results of this systematic mapping study are discussed, and a list of advice obtained from the REE literature for instructors is provided. {\textcopyright} 2013, Springer-Verlag London.}, doi = {10.1007/s00766-013-0192-5}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84929521157\&doi=10.1007\%2fs00766-013-0192-5\&partnerID=40\&md5=f7fd57be932075ffb64b6bcab6101843}, author = {Ouhbi, S.a and Idri, A.a and Fern{\'a}ndez-Alem{\'a}n, J.L.b and Toval, A.b} } @article { ISI:000357593500001, title = {Requirements engineering education: a systematic mapping study}, journal = {REQUIREMENTS ENGINEERING}, volume = {20}, number = {2}, year = {2015}, month = {JUN}, pages = {119-138}, abstract = {Requirements engineering (RE) has attracted a great deal of attention from researchers and practitioners in recent years. Requirements engineering education (REE) is therefore an important undertaking if the field is to have professionals who are capable of successfully accomplishing software projects. This increasing interest demands that academia should provide software engineering students with a solid foundation in the subject matter. This paper aims to identify and to present the current research on REE that is available at present, and to select useful approaches and needs for future research. A systematic mapping study was therefore performed to classify the selected studies into five classification criteria: research type, empirical type, contribution type, RE activity, and curricula. A total of 79 papers were selected and classified according to these criteria. The results of this systematic mapping study are discussed, and a list of advice obtained from the REE literature for instructors is provided.}, issn = {0947-3602}, doi = {10.1007/s00766-013-0192-5}, author = {Ouhbi, Sofia and Idri, Ali and Luis Fernandez-Aleman, Jose and Toval, Ambrosio} } @conference {Mcharfi2015463, title = {Return on investment of software product line traceability in the short, mid and long term}, booktitle = {ICEIS 2015 - 17th International Conference on Enterprise Information Systems, Proceedings}, volume = {2}, year = {2015}, note = {cited By 1}, pages = {463-468}, abstract = {Several works discuss tracing in Software Product Lines from a technical and architectural points of view, by proposing methods to implement traceability in the system. However, before discussing this field of traceability, we first need to prove the profitability of integrating such approach in the Product Line. Therefore, we bring in this paper a quantitative analysis on how traceability can impact the Return on Investment of a Software Product Line, and in which conditions, in terms of number of products and SPL phase, can tracing be profitable. We compare the results of a generic Software Product Line estimation model, COPLIMO, and our model METra-SPL. Our analysis shows that introducing traceability costs when constructing the Product Line, but can be profit making in the long term, especially in maintenance phase, starting from 2 products to generate. Copyright {\textcopyright} 2015 SCITEPRESS - Science and Technology Publications.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84939540877\&partnerID=40\&md5=096733b1c1fcce03456eb2b99341140b}, author = {Mcharfi, Z. and El Asri, B. and Dehmouch, I. and Baya, A. and Kriouile, A.} } @conference {Aoun2014762, title = {A robust crew pairing based on multi-agent Markov decision processes}, booktitle = {2014 2nd World Conference on Complex Systems, WCCS 2014}, year = {2014}, note = {cited By 0}, pages = {762-768}, abstract = {Airline scheduling is a real challenge in the context of the airline industry; this includes a lot of planning and operational decision problems and deals with a large number of interdependent resources. A prominent problem in airline scheduling is crew scheduling, specially pairings or Tour-of-Duty planning problem. The objective is to ensure optimal allocation of crews to flights by specifying the set of pairings that minimize the planned cost. The widely used algorithms assume no disruptions. However, airline operations often undergo stochastic disturbances that have to be taken into account in order to minimize the real operating cost. Recently, great interest has been given to robust crew scheduling with consideration of the stochastic nature of disturbances like technical breakdowns or bad weather conditions. In this paper, we develop a stochastic model of crew pairing problem based on Multi-agent Markov Decision Processes (MMDP); thus, the problem will be treated as finding the optimal policy to adopt in stochastic cases of disturbances. Also, a computational study is conducted to ensure validity of our proposed model. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICoCS.2014.7060940}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84929193249\&doi=10.1109\%2fICoCS.2014.7060940\&partnerID=40\&md5=24e45c65c00ba3e4dc4825bd5909386b}, author = {Aoun, O. and El Afia, A.} } @conference { ISI:000380387700063, title = {A Robust Crew Pairing based on Multi-Agent Markov Decision Processes}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {762-768}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Airline scheduling is a real challenge in the context of the airline industry; this includes a lot of planning and operational decision problems and deals with a large number of interdependent resources. A prominent problem in airline scheduling is crew scheduling, specially pairings or Tour-of-Duty planning problem. The objective is to ensure optimal allocation of crews to flights by specifying the set of pairings that minimize the planned cost. The widely used algorithms assume no disruptions. However, airline operations often undergo stochastic disturbances that have to be taken into account in order to minimize the real operating cost. Recently, great interest has been given to robust crew scheduling with consideration of the stochastic nature of disturbances like technical breakdowns or bad weather conditions. In this paper, we develop a stochastic model of crew pairing problem based on Multi-agent Markov Decision Processes (MMDP); thus, the problem will be treated as finding the optimal policy to adopt in stochastic cases of disturbances. Also, a computational study is conducted to ensure validity of our proposed model.}, isbn = {978-1-4799-4647-1}, author = {Aoun, Oussama and El Afia, Abdellatif} } @conference {Chanyour2014274, title = {Routing based on network coding and clustering in DTMN}, booktitle = {2014 2nd World Conference on Complex Systems, WCCS 2014}, year = {2014}, note = {cited By 0}, pages = {274-279}, abstract = {Network coding is a novel technique that aims to improve routing schemes{\textquoteright} throughput. Besides, clustering is used to cope with the scalability problem among high scale networks. This paper combines the use of both techniques to address routing problem in Delay Tolerant Mobile Networks (DTMN). By the mean of its routing, the cluster based routing protocol we use offers opportunities for principal network coding operation, mainly the coding and decoding operations. Once a routed packet is received by the cluster head, it codes it regarding its destination cluster. The last cluster head performs decoding operation to deliver packets to their destination. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICoCS.2014.7060962}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84929144319\&doi=10.1109\%2fICoCS.2014.7060962\&partnerID=40\&md5=84d1f44e74172c044f700eb2a47a7999}, author = {Chanyour, T.a and Saadane, R.b and Belkasmi, M.a} } @conference { ISI:000380387700085, title = {Routing based on Network Coding and Clustering in DTMN}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {274-279}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Network coding is a novel technique that aims to improve routing schemes{\textquoteright} throughput. Besides, clustering is used to cope with the scalability problem among high scale networks. This paper combines the use of both techniques to address routing problem in Delay Tolerant Mobile Networks (DTMN). By the mean of its routing, the cluster based routing protocol we use offers opportunities for principal network coding operation, mainly the coding and decoding operations. Once a routed packet is received by the cluster head, it codes it regarding its destination cluster. The last cluster head performs decoding operation to deliver packets to their destination.}, isbn = {978-1-4799-4647-1}, author = {Chanyour, Tarik and Saadane, Rachid and Belkasmi, Mostafa} } @conference {Hdioud2013, title = {A real-time people tracking system based on trajectory estimation using single field of camera view}, booktitle = {International Conference on Computer Applications Technology, ICCAT 2013}, year = {2013}, note = {cited By 1}, abstract = {Object detection is a crucial step for video surveillance systems. In this paper, we propose to detect moving objects in video sequences. Under the assumption that our camera is fixed, we use first subtracting the background to extract moving objects. From the detected foreground we applied the Harris corner detector to identify points of interest on the moving object. The analysis of connected components detected by subtracting the background allows grouped the pixels of moving objects in order to extract the center of gravity to draw the trajectory of the objects present in the scene. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ICCAT.2013.6522038}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84879848181\&doi=10.1109\%2fICCAT.2013.6522038\&partnerID=40\&md5=2a15bc75e155d914dfa1c1ff16398266}, author = {Hdioud, B.a and Ezzahout, A.a and Hadi, Y.a b and Haj Thami, R.O.a} } @conference { ISI:000324871900083, title = {A Real-Time People Tracking System Based on Trajectory Estimation Using Single Field of Camera View}, booktitle = {2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT)}, year = {2013}, note = {International Conference on Computer Applications Technology (ICCAT), Sousse, TUNISIA, JAN 20-22, 2013}, publisher = {IEEE Tunisia Sect; Dar Al Uloom Univ; N\&N Global Technologies; Future Technologies \& Innovat}, organization = {IEEE Tunisia Sect; Dar Al Uloom Univ; N\&N Global Technologies; Future Technologies \& Innovat}, abstract = {Object detection is a crucial step for video surveillance systems. In this paper, we propose to detect moving objects in video sequences. Under the assumption that our camera is fixed, we use first subtracting the background to extract moving objects. From the detected foreground we applied the Harris corner detector to identify points of interest on the moving object. The analysis of connected components detected by subtracting the background allows grouped the pixels of moving objects in order to extract the center of gravity to draw the trajectory of the objects present in the scene.}, isbn = {978-1-4673-5285-7}, author = {Hdioud, Boutaina and Ezzahout, Abderrahmane and Hadi, Youssef and Haj, Rachid Oulad and Thami} } @article {Mountassir201330, title = {Representing text documents in training document spaces: A novel model for document representation}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {56}, number = {1}, year = {2013}, note = {cited By 0}, pages = {30-39}, abstract = {In this paper, we propose a novel model for Document Representation in an attempt to address the problem of huge dimensionality and vector sparseness that are commonly faced in Text Classification tasks. The proposed model consists of representing text documents in the space of training documents at a first stage. Afterward, the generated vectors are projected in a new space where the number of dimensions corresponds to the number of categories. To evaluate the effectiveness of our model, we focus on a problem of binary classification. We conduct our experiments on Arabic and English data sets of Opinion Mining. We use as classifiers Support Vector Machines (SVM) and k-Nearest Neighbors (k-NN) which are known by their effectiveness in classical Text Classification tasks. We compare the performance of our model with that of the classical Vector Space Model (VSM) by the consideration of three evaluative criteria, namely dimensionality of the generated vectors, time (of learning and testing) taken by the classifiers, and classification results in terms of accuracy. Our experiments show that the effectiveness of our model (in comparison with the classical VSM) depends on the used classifier. Results yielded by k-NN when applying our model are better or as those obtained when applying the classical VSM. For SVM, results yielded when applying our model are in general, slightly lower than those obtained when using VSM. However, the gain in terms of time and dimensionality reduction is so promising since they are dramatically decreased by the application of our model. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84885352218\&partnerID=40\&md5=21216dd814d8bc9aa5e4bfb7a08e6be8}, author = {Mountassir, A. and Benbrahim, H. and Berrada, I.} } @conference { ISI:000328097500045, title = {ROLE OF MODEL OF EXCELLENCE TO IMPROVE D-LEARNING PROJECTS}, booktitle = {QUALITY AND EFFICIENCY IN E-LEARNING, VOL 1}, series = {eLearning and Software for Education}, year = {2013}, note = {9th International Conference eLearning and Software for Education, Bucharest, ROMANIA, APR 25-26, 2013}, pages = {284-290}, publisher = {Games \& Learn Alliance; intuitext Grup SOFTWIN; ASCENDIA DESIGN; SAP; INSOFT Dev \& Consult; MAGUAY; Adv Technol Syst; PLAGIAT}, organization = {Games \& Learn Alliance; intuitext Grup SOFTWIN; ASCENDIA DESIGN; SAP; INSOFT Dev \& Consult; MAGUAY; Adv Technol Syst; PLAGIAT}, abstract = {Learning has always been a fertile ground for research aiming at facilitating access to information and content sharing, with the view towards knowledge, know-how and self-management skills. To this end, researchers interested in learning have striven to use technological innovation for the benefit of learning, we believe that the D-learning-project, added to the technological and pedagogical components involved, must take into account the guiding principles of Project Management as an unequivocally proven managerial practice. However, it is also possible to explore other niches that can ensure the success of this type of project. Total Quality Management (TQM) as a practice seems to be a managerial practice whose foundations are perfectly compatible with the characteristics of a D-learning project.}, issn = {2066-026X}, author = {Daoudi, Najima and Lemsalmi, Ikram}, editor = {Roceanu, I and Beligan, D and Ciolan, L and Radu, C} } @conference {Lachhab2012, title = {Real time context-independent phone recognition using a simplified statistical training algorithm}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, volume = {2012-May}, year = {2012}, note = {cited By 0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85004001398\&partnerID=40\&md5=f2cac6c3a94f59b2c63be47cbfb16359}, author = {Lachhab, O. and Di Martino, J. and Elhaj, E.H.I. and Hammouch, A.} } @article {8699111820120101, title = {Reduced Complexity Iterative Decoding of 3D-Product Block Codes Based on Genetic Algorithms.}, journal = {Journal of Electrical \& Computer Engineering}, year = {2012}, pages = {1 - 8}, abstract = {Two iterative decoding algorithms of 3D-product block codes (3D-PBC) based on genetic algorithms (GAs) are presented. The first algorithm uses the Chase-Pyndiah SISO, and the second one uses the list-based SISO decoding algorithm (LBDA) based on order-i reprocessing. We applied these algorithms over AWGN channel to symmetric 3D-PBC constructed from BCH codes. The simulation results show that the first algorithm outperforms the Chase-Pyndiah one and is only 1.38 dB away from the Shannon capacity limit at BER of 10-5 for BCH (31, 21, 5){\textthreesuperior} and 1.4 dB for BCH (16, 11, 4){\textthreesuperior}. The simulations of the LBDA-based GA on the BCH (16, 11, 4){\textthreesuperior} show that its performances outperform the first algorithm and is about 1.33 dB from the Shannon limit. Furthermore, these algorithms can be applied to any arbitrary 3D binary product block codes, without the need of a hard-in hardout decoder. We show also that the two proposed decoders are less complex than both Chase-Pyndiah algorithm for codes with large corr}, keywords = {Computational complexity, Computer simulation, Genetic algorithms, Iterative decoding, Performance evaluation, Three-dimensional imaging}, issn = {20900147}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=86991118\&site=ehost-live}, author = {Ahmadi, Abdeslam and Bouanani, Faissal El and Ben-Azza, Hussain and Benghabrit, Youssef} } @conference {Bouirouga2011, title = {Recognition of adult video by combining skin detection features with motion information}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 1}, doi = {10.1109/ICMCS.2011.5945570}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961239374\&doi=10.1109\%2fICMCS.2011.5945570\&partnerID=40\&md5=96e36065eca2afa2f2e3a18e0d2b4fe5}, author = {Bouirouga, H. and Lrit, S.E. and Jilbab, A. and Aboutajdine, D.} } @conference {Benamar2011, title = {Reducing dogleg routing in mobile IPv6 by the enhancement of home agents deployment}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 0}, doi = {10.1109/ICMCS.2011.5945668}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961225679\&doi=10.1109\%2fICMCS.2011.5945668\&partnerID=40\&md5=34e5208800d44416aca76bbb4db54727}, author = {Benamar, M. and Koutbi, M.E. and Benamar, N. and Mezrioui, A.} } @article {5938723720101201, title = {REPUTATION-BASED MAJORITY VOTING FOR MALICIOUS GRID RESOURCES TOLERANCE.}, journal = {Scalable Computing: Practice \& Experience}, volume = {11}, number = {4}, year = {2010}, pages = {385 - 392}, abstract = {Recently, distributed computing infrastructures such as grid computing, have witnessed huge developments which have a very important impact on computationally intensive scientific, industrial and engineering problems. Collaborative computing, resources access and sharing facilitated by grid computing systems amplifies concerns about cyber attacks and misbehaviors of grid resources (resources provider). In many cases, an organization may send out jobs for remote execution on untrustworthy machines. Since resource sharing and cooperation among different administrative domains are among the central goals of grid computing, it is necessary to guarantee that, among the shared resources, there are no malicious resources interested in invalidating or corrupting the job results. In order to guarantee reliable jobs execution in grid systems, we have developed a new approach for malicious grid resources tolerance using reputation to improve the efficiency of majority voting mechanisms. The grid}, keywords = {Computational grids (Computer systems), Distributed computing, Grid computing, Internet service providers, majority voting, malicious resources, Plurality voting, reputation, Service level agreements, tolerance, Web services}, issn = {18951767}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=59387237\&site=ehost-live}, author = {Bendahmane, Ahmed and Essaaidi, Mohammad and El Moussaoui, Ahmed and Younes, Ali} } @conference {Tembine2010, title = {Robust power allocation games under channel uncertainty and time delays}, booktitle = {2010 IFIP Wireless Days, WD 2010}, year = {2010}, note = {cited By 0}, doi = {10.1109/WD.2010.5657740}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-78751549432\&doi=10.1109\%2fWD.2010.5657740\&partnerID=40\&md5=d221e9e9441f6d59228be21fe99203da}, author = {Tembine, H. and Kobbane, A. and El Koutbi, M.} } @conference {Hanane2009637, title = {RB-WAC: New approach for access control in workflows}, booktitle = {2009 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009}, year = {2009}, note = {cited By 1}, pages = {637-640}, doi = {10.1109/AICCSA.2009.5069394}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-70349918261\&doi=10.1109\%2fAICCSA.2009.5069394\&partnerID=40\&md5=df22dca791291829c2a2c925799f6c97}, author = {Hanane, E.B. and Hamid, H.} } @conference { ISI:000271458300107, title = {RB-WAC: New Approach for Access Control in Workflows}, booktitle = {2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2}, year = {2009}, note = {7th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-09), Rabat, MOROCCO, MAY 10-OCT 13, 2009}, pages = {637-640}, publisher = {ACS; IEEE}, organization = {ACS; IEEE}, abstract = {Today, workflow systems which aim the automation of a business process involving the coordinated execution of multiple tasks performed by different entities have experienced an increase use. Unfortunately, little Workflow Management Systems (WFMS) take into account access control constraints such as Separation of Duties (SoD). In this paper, we present a new approach, RB-WAC (Role-based Workflow Access Control), to participate in amending the above shortcomings. This approach which is based on the standard of access control RBAC, introduces new rules to detect potential conflicts related to a workflow instance and also suggests the use of the concept of priority in order to resolve these conflicts.}, isbn = {978-1-4244-3807-5}, author = {Hanane, El Bakkali and Hamid, Hatim} } @article {4562825420091002, title = {Resource Optimization of Mobile Intelligent System With Heart MPLS Network.}, journal = {International Journal of Interactive Mobile Technologies}, volume = {3}, number = {S2}, year = {2009}, pages = {58 - 64}, abstract = {In this paper, we introduce the original Mobile Intelligent System (MIS) in embedded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environment for human beings, in order to collect data by various sensors and transmits them by routing to a unit of distant process. For the sake of improving the performance of transmission, we propose a global schema of QoS management using DiffServ/MPLS backbones. We provide an evaluation of several scenarios for combining QoS IP networks with MIS access network. We conclude with a study on interoperability between QoS patterns in access and backbone networks. [ABSTRACT FROM AUTHOR]}, keywords = {Artificial intelligence, Computer architecture, DiffServ and MPLS, Information networks, intelligent sensors, Mobile communication systems, Quality of service, Routing (Computer network management) {\textendash} Equipment \& supplies, wireless sensor network}, issn = {18657923}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=45628254\&site=ehost-live}, author = {Oubaha, Jawad and Habbani, Ahmed and Elkoutbi, Mohammed} } @conference { ISI:000261578001077, title = {A Recent Survey on Key Management Schemes in MANET}, booktitle = {2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5}, year = {2008}, note = {3rd International Conference on Information and Communication Technologies, Damascus, SYRIA, APR 07-11, 2008}, pages = {2031-2036}, abstract = {An ad hoe mobile network (MANET), is a collection of wireless mobile hosts that form a temporary network without the aid of any centralized administration or support. In such a network, each mobile node operates not only as a host but also as a router, forwarding packets for other mobile nodes in the network that may be multiple hops away from each other. With those network Characteristics, security has become a primary concern for researchers to meet scientific challenges to market opportunities in term or confidentiality, authentication, integrity, availability, access control, and non-repudiation. In the same way and as a powerful tool in achieving security, the Key Management becomes a corner stone in MANET security by proposing an appropriate secure schema for handling cryptographic keying materials. The Key Management scope includes key generation, key distribution, and key maintenance. In this paper, we aim to evaluate and to present a recent overview on different research works on Key Management in MANETs.}, isbn = {978-1-4244-1751-3}, author = {Aziz, Baayer and Nourdine, Enneya and Mohamed, El Koutbi} }