@conference {Illi2022152, title = {On the Secrecy Analysis of a RIS-aided Wireless Communication System Subject to Phase Quantization Errors}, booktitle = {2022 International Balkan Conference on Communications and Networking, BalkanCom 2022}, year = {2022}, note = {cited By 0}, pages = {152-156}, abstract = {In this paper, we analyze the physical layer security of a jamming-aided wireless communication system assisted by a reconfigurable intelligent surface (RIS). Our setup consists of a source node communicating with a destination node with the help of a RIS, and under the presence of a malicious passive eavesdropper attempting to overhear the genuine transmission. Furthermore, an external cooperative jammer is incorporated to reinforce the system{\textquoteright}s secrecy by broadcasting an artificial noise to disrupt the eavesdropper; such a noise can be removed at the destination. Finally, we assume that the tunable RIS phases based on the channel estimates are subject to quantization errors. By virtue of the well-adopted Gamma and Exponential distributions approximations, an approximate expression for the system{\textquoteright}s intercept probability (IP) is derived in terms of the main setup parameters. The results show that the greater the number of reflective elements (REs) and jamming power, the better the secrecy, while the number of quantization bits has less impact when exceeding 3 bits. In particular, an IP of 10-3 can be reached with 50 REs even when the legitimate link{\textquoteright}s average signal-to-noise ratio (SNR) is 15 dB below the wiretap channel{\textquoteright}s average SNR. Monte Carlo simulations endorse the derived analytical results. {\textcopyright} 2022 IEEE.}, keywords = {Cooperative communication, Cooperative jamming, Destination nodes, Eavesdropping, Errors, Intelligent systems, Intercept probability, Jamming, Monte Carlo methods, Network layers, Phase quantization errors, Physical layer security, Probability distributions, Reconfigurable, Reconfigurable intelligent surface, Signal to noise ratio, Source nodes, Wireless communication system}, doi = {10.1109/BalkanCom55633.2022.9900815}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136129114\&doi=10.1109\%2fBalkanCom55633.2022.9900815\&partnerID=40\&md5=021859cbb6665cc6388da51264628ce6}, author = {Illi, E. and Qaraqe, M.K. and El Bouanani, F. and Al-Kuwari, S.M.} } @article {Bouanani2022, title = {On the Secrecy Analysis of Dual-Hop SWIPT-based Multi-Source Underlay Cognitive Radio Networks}, journal = {IEEE Transactions on Cognitive Communications and Networking}, year = {2022}, note = {cited By 0}, pages = {1-1}, abstract = {This paper investigates the intercept probability (IP) performance for a dual-hop multi-secondary user (SU) underlay cognitive-radio networks. Whereby, the relay R is self-powered by harvesting energy from secondary sources using the time switching variant (TS) of simultaneous wireless information and power transfer (SWIPT) protocol. Single-antenna SUs are transmitting data to multi-antennas end-user D, performing maximal-ratio combining (MRC) diversity technique, through R in presence of (i) a primary network composed of a primary transmitter (PUt) and receiver (PUr) pair, and (ii) a passive eavesdropper at each hop (i.e., E1 and E2), attempting to overhear the communication. Moreover, we suppose that the second eavesdropper has multiple antennas and employs the MRC technique, that the relay employs the Decode-and-Forward relaying protocol, that the two hops are subject to the Rayleigh fading model, and that the channel state information is fully known at both D and E2. Because of the underlying strategy, the SUs are constantly modifying their transmit powers to prevent interference with primary users. A closed-form expression of the IP is obtained by taking into consideration the correlation between the secrecy capacities for both hops. The impact of other essential factors on IP, such as the transmit power of sources, the fading severity parameter, and the maximum tolerable interference power (MTIP), is also investigated. Specifically, we want to know if the energy harvester (i.e., relay) might improve the security of such a system even more for low MTIP or transmit power of SUs. Monte Carlo simulations verify all of the obtained results, and valuable insights into the secrecy of the considered system are achieved. IEEE}, keywords = {Channel state information, Cognitive radio, Cognitive radio network, Communication channels (information theory), Dual-hop networks, Eavesdropping, Energy harvesting, Information and power transfers, Intelligent systems, Intercept probability, Intercept probability network, Interference, Internet protocols, Monte Carlo methods, Network layers, Network security, Physical layer security, Radio systems, Rayleigh fading, Receiver, Relay, Secure communication, Signal receivers, Signal to noise ratio, Simultaneous wireless information and power transfer, Underlay cognitive radio network, Underlay cognitive radios}, doi = {10.1109/TCCN.2022.3217780}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85141508701\&doi=10.1109\%2fTCCN.2022.3217780\&partnerID=40\&md5=79af2dcf046827ee8c634d461186ab82}, author = {Bouanani, F.E. and Lahmar, I. and Ismaili, Z.E.A.A. and Qaraqe, K.A.} } @article {ElHaddouti2022575, title = {A Secure and Trusted Fog Computing Approach based on Blockchain and Identity Federation for a Granular Access Control in IoT Environments}, journal = {International Journal of Advanced Computer Science and Applications}, volume = {13}, number = {3}, year = {2022}, note = {cited By 0}, pages = {575-584}, abstract = {Fog computing is a new computing paradigm that is an extension of the standard cloud computing model, which can be adopted as a cost effective strategy for managing connected objects, by enabling real-time computing and communication for analytical and decision making. Nonetheless, even though Fog-based Internet of Things networks optimize the standard architecture by moving computing, storage, communication, and control decision closer to the edge network, the technology becomes open to malicious attackers and remains many business risks that are not yet resolved. In fact, access control, privacy as well as trust risks present major challenges in Internet of Things environments based on Fog computing due to the large scale distributed nature of devices at the Fog layer. In addition, the traditional authentication methods are not adequate in Fog-based Internet of Things contexts since they consume significantly more computation power and incur high latency. To deal with these gaps, we present in this paper a secure and trusted Fog Computing approach based on Blockchain and Identity Federation technologies for a granular access control in IoT environments. The proposed scheme uses Smart Contract concept and Attribute-Based Access Control model to ensure the level of security and scalability required for data integrity without resorting to a central authority to make an access decision {\textcopyright} 2022. International Journal of Advanced Computer Science and Applications.All Rights Reserved.}, keywords = {Access control, Block-chain, Cloud-computing, Computing model, Computing paradigm, Cost effective strategies, Cost effectiveness, Decision making, Decisions makings, Digital storage, Fog, Fog computing, Identity federation, Internet of things, IOT, Real-time communication, Real-time computing, Smart contract, Trusted computing}, doi = {10.14569/IJACSA.2022.0130368}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85129902962\&doi=10.14569\%2fIJACSA.2022.0130368\&partnerID=40\&md5=65966293c50d57a061513c913c7b5bb3}, author = {El Haddouti, S. and El Kettani, M.D.E.-C.} } @conference {Elhachimi2022, title = {Secure Internet of Thing using Blockchain Technology}, booktitle = {2022 7th International Conference on Smart and Sustainable Technologies, SpliTech 2022}, year = {2022}, note = {cited By 0}, abstract = {With their vast range of uses, Internet of things (IoT) and its applications are becoming more popular. However, the security and privacy of the IoT-based applications remains a worry. The majority of the privacy and security issues of the interconnected, diverse resource-constrained IoT devices are unable to be solved efficiently by traditional security protocols. Blockchain technology has emerged as a distributed ledger technology or data structure that can manage many intelligent IoT transactions and ensure greater security to data management. In this paper, we propose a light-weight authentication system based Blockchain approach that provides network and communication security. Due to Blockchain decentralized nature and transparency, the proposed approach ensures high-level data security, improves system operation efficiency and system performances. {\textcopyright} 2022 University of Split, FESB.}, keywords = {Authentication systems, Block-chain, Blockchain, Data privacy, Distributed ledger, Information management, Internet of thing security, Internet of things, ITS applications, Light weight, Network security, Privacy and security, Privacy issue, Security and privacy, Security issues, Security protocols}, doi = {10.23919/SpliTech55088.2022.9854376}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85138143921\&doi=10.23919\%2fSpliTech55088.2022.9854376\&partnerID=40\&md5=166e29d5aefdeeb4fac8936bf1150d04}, author = {Elhachimi, J. and Kobbane, A.} } @article {ElHaddaoui2022529, title = {On the Sensitivity of LSTMs to Hyperparameters and Word Embeddings in the Context of Sentiment Analysis}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {529-542}, abstract = {Recurrent neural networks are still providing excellent results in sentiment analysis tasks, variants such as LSTM and Bidirectional LSTM have become a reference for building fast and accurate predictive models. However, such performance is difficult to obtain due to the complexity of the models and the hyperparameters choice. LSTM based models can easily overfit to the studied domain, and tuning the hyperparameters to get the desired model is the keystone of the training process. In this work, we provide a study on the sensitivity of a selection of LSTM based models to various hyperparameters and we highlight important aspects to consider while using similar models in the context of sentiment analysis. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_40}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135093996\&doi=10.1007\%2f978-3-031-07969-6_40\&partnerID=40\&md5=695a2003d02e28d6d72df06cca749381}, author = {El Haddaoui, B. and Chiheb, R. and Faizi, R. and El Afia, A.} } @article {Faizi202252, title = {A Sentiment Analysis Based Approach for Exploring Student Feedback}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {13449 LNCS}, year = {2022}, note = {cited By 0}, pages = {52-59}, abstract = {Student feedback is commonly used as a reliable source of information to evaluate learning outcomes and teaching quality. This feedback has proven to provide faculty not only with valuable insights into how students are learning, but also with an ideal opportunity to reflect on teaching resources and instructional strategies. However, given the increasing massive amounts of feedback that is available online, collecting and analyzing this data manually is not usually an easy task. The aim of this work is, therefore, to put forward a sentiment analysis classifier that is capable of categorizing student feedback as being either positive or negative. To this end, students{\textquoteright} reviews posted about online courses were automatically extracted, preprocessed and then fed into various machine learning algorithms. The findings of this analysis revealed that the Support Vector Machines (SVM) algorithm achieves the highest accuracy score (93.35\%) and, thus, outperforms other implemented models. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, keywords = {Analysis-based approaches, Education computing, Learning algorithms, Learning outcome, Machine-learning, Outcome quality, Quality control, Sentiment analysis, Sources of informations, Student feedback, Students, Support vector machines, Support vectors machine, Teaching quality, Teaching resources}, doi = {10.1007/978-3-031-15273-3_6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137997385\&doi=10.1007\%2f978-3-031-15273-3_6\&partnerID=40\&md5=feac3688f39fab9ad1f85464953459ec}, author = {Faizi, R. and El Fkihi, S.} } @article {Faizi2022549, title = {A Sentiment-Based Approach to Predict Learners{\textquoteright} Perceptions Towards YouTube Educational Videos}, journal = {Lecture Notes in Networks and Systems}, volume = {419 LNNS}, year = {2022}, note = {cited By 1}, pages = {549-556}, abstract = {Given the increasing proliferation of educational resources on YouTube, this social media platform has become an optimal space to which students usually resort to improve their learning in various subjects. It has also turned into an online community in which all users can voice their opinion about videos they have watched. However, getting the perceptions of learners on these learning materials is not always an easy task. Our objective in this paper is, therefore, to propose a machine learning approach that can classify learners{\textquoteright} feedback as being positive or negative. For this purpose, textual data was retrieved from YouTube educational videos, pre-processed and then classified using different machine learning algorithms. Results of the present study demonstrated that the Support Vector Machines algorithm performs better than other models. In fact, with an accuracy score of 92.82\% on combinations of unigrams and bigrams and 92.67\% for associations of unigrams and trigrams, this supervised machine learning approach outperforms other implemented models, namely Na{\"\i}ve Bayes, Random Forest and Logistic Regression. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-030-96299-9_52}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85126255114\&doi=10.1007\%2f978-3-030-96299-9_52\&partnerID=40\&md5=488d0e3f5f3597e45e73566a94ba74a7}, author = {Faizi, R.} } @article {Abouaomar2022, title = {Service Function Chaining in MEC: A Mean-Field Game and Reinforcement Learning Approach}, journal = {IEEE Systems Journal}, year = {2022}, note = {cited By 0}, pages = {1-12}, abstract = {Multiaccess edge computing (MEC) and network virtualization technologies are important enablers for fifth generation networks to deliver diverse services. Services are often provided as fully connected virtual network functions (VNFs), through service function chaining (SFC). However, the problem of allocating SFC resources at the edge still faces many challenges related to the way VNFs are placed, chained, and scheduled. In this article, to solve these problems, we propose a game theory-based approach with the objective to reduce service latency in the context of SFC at the edge. The problem of allocating SFC resources can be divided into two subproblems: 1) the VNF placement and routing subproblem, and 2) the VNF scheduling subproblem. For the former subproblem, we formulate it as a mean-field game in which VNFs are contending over edge resources aiming at reducing the resource consumption of MEC nodes and reducing latency for users. We also propose a reinforcement learning-based technique, where the Ishikawa{\textendash}Mann learning algorithm is used. For the later subproblem, we formulate it as a matching game between VFNs and edge resources to find the execution order of the VNFs while reducing the latency. To efficiently solve it, we propose a modified version of the many-to-one deferred acceptance algorithm (DAA), called the enhanced multistep DAA. To illustrate the performance of the proposed approaches, we perform extensive simulations. The results show that the approaches achieve up to 40\% less resource consumption, and up to 38\% less latency than the benchmarked state-of-the-art methods. IEEE}, keywords = {Computation theory, Computer games, Edge computing, Game, Game theory, Learning algorithms, Network function virtualization, Problem solving, Processor scheduling, Reinforcement learning, Resource allocation, Resource allocation/provisioning, Resource Management, Resources allocation, Routings, Scheduling, Service function chaining, Service functions, Transfer functions, Virtual reality, Virtualizations}, doi = {10.1109/JSYST.2022.3171232}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85131721006\&doi=10.1109\%2fJSYST.2022.3171232\&partnerID=40\&md5=e7ecad4d011f9a66bf06f1e9f3f4d176}, author = {Abouaomar, A. and Cherkaoui, S. and Mlika, Z. and Kobbane, A.} } @article {Rachih202243, title = {Simulation optimization of an inventory control model for a reverse logistics system}, journal = {Decision Science Letters}, volume = {11}, number = {1}, year = {2022}, note = {cited By 3}, pages = {43-54}, abstract = {Nowadays, companies are recognizing their primordial roles and responsibilities towards the protection of the environment and save the natural resources. They are focusing on some contemporary activities such as Reverse Logistics which is economically and environmentally viable. However, the integration of such an initiative needs flows restructuring and supply chain management in order to increase sustainability and maximize profits. Under this background, this paper addresses an inventory control model for a reverse logistics system that deals with two separated types of demand, for new products and remanufactured products, with different selling prices. The model consists of a single shared machine between production and remanufacturing operations, while the machine is subject to random failures and repairs. Three stock points respectively for returns, new products and remanufactured products are investigated. Meanwhile, in this paper, a modeling of the problem with Discrete-Event simulation using Arena{\textregistered} was conducted. Regarding the purpose of finding, a near-optimal inventory control policy that minimizes the total cost, an optimization of the model based on Tabu Search and Genetic Algorithms was established. Computational examples and sensitivity analysis were performed in order to compare the results and the robustness of each proposed algorithm. Then the results of the two methods were compared with those of OptQuest{\textregistered} optimization tool. {\textcopyright} 2022 by the authors; doi:.}, doi = {10.5267/j.dsl.2021.9.001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122133768\&doi=10.5267\%2fj.dsl.2021.9.001\&partnerID=40\&md5=d46c9884d1a5aa28b8b6d404febf6820}, author = {Rachih, H. and Mhada, F.Z. and Chiheb, R.} } @article {BenRabia2022, title = {Simulation-based analytics: A systematic literature review}, journal = {Simulation Modelling Practice and Theory}, volume = {117}, year = {2022}, note = {cited By 1}, abstract = {Over time, Decision Support Systems have helped decision makers solve complex problems through Operational Research and Simulation. Nowadays, data explosion is having a profound effect on the ways in which many sectors operate. This advent of massive data gives rise to new concepts and requires new methods and analysis tools. In this paper, we highlight the role of simulation in Business Analytics. In a framework-based analytics, simulation is a technique that can be incorporated into predictive or prescriptive stage. For that, we have posed research questions to limit results to what give a comprehensive description of models, techniques and architectures used in the hybridization between simulation and business analytics. The presented analyses confirm that simulation remains an indispensable mechanism for adding value to analytics project and the coupling between the two techniques is in its embryonic phase. A conclusion presented prospects and future improvements found during the writing of the research. {\textcopyright} 2022 Elsevier B.V.}, keywords = {Artificial intelligence, Big data, Business analytics, Competitive intelligence, Data Analytics, Data driven decision, Data-driven decision making, Decision making, Decision support systems, Decisions makings, Model-driven, Model-driven decision making, Predictive analytics, Simulation \& analytic ops, Systematic literature review, What-if Analysis}, doi = {10.1016/j.simpat.2022.102511}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125647406\&doi=10.1016\%2fj.simpat.2022.102511\&partnerID=40\&md5=b8a2d6f53d7e2a53c6c1e7675770c74b}, author = {Ben Rabia, M.A. and Bellabdaoui, A.} } @article {El-Ateif2022, title = {Single-modality and joint fusion deep learning for diabetic retinopathy diagnosis}, journal = {Scientific African}, volume = {17}, year = {2022}, note = {cited By 0}, abstract = {The current study evaluated and compared single-modality and joint fusion deep learning approaches for automatic binary classification of diabetic retinopathy (DR) using seven convolutional neural network models (VGG19, ResNet50V2, DenseNet121, InceptionV3, InceptionResNetV2, Xception, and MobileNetV2) over two datasets: APTOS 2019 blindness detection and Messidor-2. The empirical evaluations used (1) six performance metrics (accuracy, sensitivity, specificity, precision, F1-score, and area under the curve), (2) the Scott-Knott Effect Size difference (SK ESD) statistical test to rank and cluster the models based on accuracy, and (3) the Borda count voting method to rank the best models figuring in the first SK ESD cluster, based on sensitivity, specificity, precision, F1-score, and area under the curve. Results showed that the single-modality DenseNet121 and InceptionV3 were the top-performing and less sensitive approaches, with an accuracy of 90.63\% and 75.25\%, respectively. The joint fusion strategy outperformed single-modality techniques across the two datasets, regardless of the modality used, because of the additional information provided by the preprocessed modality to the Fundus. The Fundus modality was the most favorable modality for DR diagnosis using the seven models. Furthermore, the joint fusion VGG19 model performed best with an accuracy of 97.49\% and 91.20\% over APTOS19 and Messidor-2, respectively; as the VGG19 model was fine-tuned in comparison to the remaining six models. In comparison with state-of-the-art models, Attention Fusion, and Cascaded Framework, joint fusion VGG19 ranks below the Attention Fusion network and outperforms the Cascaded Framework on the Messidor dataset by 5.6\% and 8\%, respectively. {\textcopyright} 2022 The Authors}, doi = {10.1016/j.sciaf.2022.e01280}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85134929351\&doi=10.1016\%2fj.sciaf.2022.e01280\&partnerID=40\&md5=9519f7afe80a2afb76cceae701940911}, author = {El-Ateif, S. and Idri, A.} } @article {Yousfi2022, title = {Smart big data framework for insight discovery}, journal = {Journal of King Saud University - Computer and Information Sciences}, year = {2022}, note = {cited By 2}, abstract = {Big Data deal with new challenges such as data variety, data veracity (correct, incorrect, misleading, etc.) and data completeness (provide a single part of the overall information.). In fact, the knowledge discovered from a single source that can offer incorrect or incomplete data, may have a negative impact on the quality of decisions based on it. Therefore, integrating data coming from multiple sources allows verifying the veracity and ensuring the completeness of the results and thus improving the quality of analysis and enhancing business decisions. In this paper, we present a smart framework that falls within the Big Data value chain process and aims to improve the quality of analytical results by focusing two main concerns regarding Big Data Integration; data completeness and data veracity. The framework integrates Big Data in order to build a complete global and correct insight from heterogeneous sources. The paper presents two implementations of the framework in the context of urban and highway traffic management systems. {\textcopyright} 2021}, doi = {10.1016/j.jksuci.2021.12.009}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122932927\&doi=10.1016\%2fj.jksuci.2021.12.009\&partnerID=40\&md5=16742da4bfac0205224464c7c43d3855}, author = {Yousfi, S. and Chiadmi, D. and Rhanoui, M.} } @conference {Reda2022, title = {SMDQM-Social Media Data Quality Assessment Model}, booktitle = {2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology, IRASET 2022}, year = {2022}, note = {cited By 0}, abstract = {Social media has taken a dominant place in people{\textquoteright}s lives since it become more than just a mode of communication between individuals. They regularly share their daily activities, experiences, and exchange interests and opinions on social media sites, leading to a flood of information that can be used by consumers. However, the reduced posting barriers, no operational costs and easy-to-use interactive interfaces have combined to create a variety of data quality issues in social media, making it difficult to obtain relevant, timely and accurate data. Given the increasing use of social media by users to obtain news and information first hand, they are required to filter a significant volume of data to reach the most satisfying to their request, therefore we can say that the process is more qualitative than quantitative. This paper proposes a new classification of data quality dimensions towards a social media data quality model called SMDQM(Social Media Data Quality Model), for this the quality of social media data is discussed, then we present the steps involved to create our model SMDQM. This attempt will be established by considering and discussing a state of the art in the field of social media and data quality. {\textcopyright} 2022 IEEE.}, keywords = {Assessment, Daily activity, data quality, Data quality assessment, Data quality models, Data reduction, Interactive interfaces, Quality assessment model, Quality modeling, social media, Social media datum, Social networking (online)}, doi = {10.1109/IRASET52964.2022.9738330}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127964567\&doi=10.1109\%2fIRASET52964.2022.9738330\&partnerID=40\&md5=566d4361e0b4742bd3c69530f2eaf99f}, author = {Reda, O. and Zellou, A.} } @article {Lamrhari2022, title = {A social CRM analytic framework for improving customer retention, acquisition, and conversion}, journal = {Technological Forecasting and Social Change}, volume = {174}, year = {2022}, note = {cited By 4}, abstract = {Social Customer Relationship Management (social CRM) has become one of the central points for many companies seeking to improve their customer experience. It comprises a set of processes that allows decision-makers to analyze customer data, in order to launch an efficient, customer-centric, and cost-effective marketing strategy. Nonetheless, the inclusion of social media data in CRM introduces new challenges, as it requires advanced analytical approaches to extract actionable insight from such a huge amount of data. Thus, in this paper, we propose a social CRM analytic framework, which includes various analytical approaches, aiming at improving customer retention, acquisition, and conversion. This framework has been tested on various datasets and extensively evaluated based on several performance metrics. The obtained results suggest that the proposed framework can effectively extract relevant information and support decision-making processes. From an academics perspective, the study contributes to an understanding of customers{\textquoteright} experiences throughout their engagement on social media and focuses on long-term relationships with customers. From a managerial perspective, companies should leverage the insight generated through every customer engagement on social media to drive effective marketing strategies. {\textcopyright} 2021}, keywords = {Acquisition, Conversion, Cost effectiveness, Customer acquisition, Customer conversion, Customer relationship management, Customer retention, Customer satisfaction, Customers{\textquoteright} satisfaction, Decision making, Digital storage, Machine learning, management, marketing, Public relations, Sales, Sentiment analysis, Social CRM, social media, Social networking (online), Strategic planning}, doi = {10.1016/j.techfore.2021.121275}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85118116967\&doi=10.1016\%2fj.techfore.2021.121275\&partnerID=40\&md5=10ffdb7f551bf1e135c01fb362d1a559}, author = {Lamrhari, S. and Ghazi, H.E. and Oubrich, M. and Faker, A.E.} } @article {ElJai2022, title = {Socio-economic analysis of short-term trends of COVID-19: modeling and data analytics}, journal = {BMC Public Health}, volume = {22}, number = {1}, year = {2022}, note = {cited By 0}, abstract = {Background: COVID-19 caused a worldwide outbreak leading the majority of human activities to a rough breakdown. Many stakeholders proposed multiple interventions to slow down the disease and number of papers were devoted to the understanding the pandemic, but to a less extend some were oriented socio-economic analysis. In this paper, a socio-economic analysis is proposed to investigate the early-age effect of socio-economic factors on COVID-19 spread. Methods: Fifty-two countries were selected for this study. A cascade algorithm was developed to extract the R0 number and the day J*; these latter should decrease as the pandemic flattens. Subsequently, R0 and J* were modeled according to socio-economic factors using multilinear stepwise-regression. Results: The findings demonstrated that low values of days before lockdown should flatten the pandemic by reducing J*. Hopefully, DBLD is only parameter to be tuned in the short-term; the other socio-economic parameters cannot easily be handled as they are annually updated. Furthermore, it was highlighted that the elderly is also a major influencing factor especially because it is involved in the interactions terms in R0 model. Simulations proved that the health care system could improve the pandemic damping for low elderly. In contrast, above a given elderly, the reproduction number R0 cannot be reduced even for developed countries (showing high HCI values), meaning that the disease{\textquoteright}s severity cannot be smoothed regardless the performance of the corresponding health care system; non-pharmaceutical interventions are then expected to be more efficient than corrective measures. Discussion: The relationship between the socio-economic factors and the pandemic parameters R0 and J* exhibits complex relations compared to the models that are proposed in the literature. The quadratic regression model proposed~here has discriminated the most influencing parameters within the following approximated order, DLBL, HCI, Elderly, Tav, CO2, and WC as first order, interaction, and second order terms. Conclusions: This modeling allowed the emergence of interaction terms that don{\textquoteright}t appear in similar studies; this led to emphasize more complex relationship between the infection spread and the socio-economic factors. Future works will focus on enriching the datasets and the optimization of the controlled parameters to short-term slowdown of similar pandemics. {\textcopyright} 2022, The Author(s).}, keywords = {aged, communicable disease control, COVID-19, Data Science, epidemiology, human, Humans, SARS-CoV-2, Socioeconomic Factors, socioeconomics}, doi = {10.1186/s12889-022-13788-4}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85136870489\&doi=10.1186\%2fs12889-022-13788-4\&partnerID=40\&md5=319bf3cc0bc571a1c7ddf78cab18333b}, author = {El Jai, M. and Zhar, M. and Ouazar, D. and Akhrif, I. and Saidou, N.} } @article {Aloqaily20221283, title = {Special Issue on Internet of Things: Intelligent Networks, Communication and Mobility (AdHocNets 2020)}, journal = {Mobile Networks and Applications}, volume = {27}, number = {3}, year = {2022}, note = {cited By 0}, pages = {1283-1285}, doi = {10.1007/s11036-022-01951-5}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85125040615\&doi=10.1007\%2fs11036-022-01951-5\&partnerID=40\&md5=54584bce4af47a9f2a8ead852da1944d}, author = {Aloqaily, M. and Abdellatif, K. and Yan, F.} } @article {Benlakhdar20221599, title = {Statistical modeling of directional data using a robust hierarchical von mises distribution model: perspectives for wind energy}, journal = {Computational Statistics}, volume = {37}, number = {4}, year = {2022}, note = {cited By 0}, pages = {1599-1619}, abstract = {For describing wind direction, a variety of statistical distributions has been suggested that provides information about the wind regime at a particular location and aids the development of efficient wind energy generation. In this paper a systematic approach for data classification putting a special emphasis on the von Mises mixtures is presented. A von Mises mixture model is broad enough to cover, on one hand, symmetry and asymmetry, on the other hand, unimodality and multimodality of circular data. We developed an improved mathematical model of the classical von Mises mixture method, rests on number of principles which gives its internal coherence and originality. In principle, our hierarchical model of von Mises distributions is flexible to precisely modeled complex directional data sets. We define a new specific expectation{\textendash}maximization (S-EM) algorithm for estimating the parameters of the model. The simulation showed that satisfactory fit of complex directional data could be obtained (error generally < 1\%). Furthermore, the Bayesian Information Criterion is used to judge the goodness of fit and the suitability for this model versus common distributions found in the literature. The findings prove that our hierarchical model of von Mises distributions is relevant for modeling the complex directional data with several modes and/or prevailing data directions. {\textcopyright} 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.}, doi = {10.1007/s00180-021-01173-5}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122431362\&doi=10.1007\%2fs00180-021-01173-5\&partnerID=40\&md5=1983e074fcfeb1ae4f99796700245614}, author = {Benlakhdar, S. and Rziza, M. and Thami, R.O.H.} } @article {Hammouchi2022, title = {STRisk: A Socio-Technical Approach to Assess Hacking Breaches Risk}, journal = {IEEE Transactions on Dependable and Secure Computing}, year = {2022}, note = {cited By 0}, abstract = {Data breaches have begun to take on new dimensions and their prediction is becoming of great importance to organizations. Prior work has addressed this issue mainly from a technical perspective and neglected other interfering aspects such as the social media dimension. To fill this gap, we propose a STRisk predictive system where we expand the scope of the prediction task by bringing into play the social media dimension. We study over 3800 US organizations including both victim and non-victim organizations. For each organization, we design a profile composed of a variety of externally measured technical indicators and social factors. In addition, to account for unreported incidents, we consider the non-victim sample to be noisy and propose a noise correction approach to correct mislabeled organizations. We then build several machine learning models to predict whether an organization is exposed to experience a hacking breach. By exploiting both technical and social features, we achieve an Area Under Curve (AUC) score exceeding 98\%, which is 12\% higher than the AUC achieved using only technical features. Furthermore, our feature importance analysis reveals that open ports and expired certificates are the best technical predictors, while spreadability and agreeability are the best social predictors. IEEE}, keywords = {Blogs, Cybe risk assessment, Cybe risk prediction, Data breach, Forecasting, Hacking breach, Learning systems, Malware, Noise measurements, Personal computing, Predictive models, Risk assessment, Risk predictions, Risks assessments, Security, Social networking (online)}, doi = {10.1109/TDSC.2022.3149208}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85124712380\&doi=10.1109\%2fTDSC.2022.3149208\&partnerID=40\&md5=f6b798bf0fc97476d3214d3efbc3597a}, author = {Hammouchi, H. and Nejjari, N. and Mezzour, G. and Ghogho, M. and Benbrahim, H.} } @article {Boukbab2022401, title = {Student{\textquoteright}s Behaviors Analysis in Classroom Context Using IoT: A Systematic Mapping Study}, journal = {Lecture Notes in Networks and Systems}, volume = {469 LNNS}, year = {2022}, note = {cited By 0}, pages = {401-412}, abstract = {In the era of emerging technologies, an impressive number of Internet of Things (IoT) applications are emerging every day. One of the intriguing solutions is to help students improve their learning by guiding them and recommending precise and concise learning content. Thus, in this paper, through a systematic mapping study, we aim to present a general overview on student{\textquoteright}s behaviors analysis in the classroom using IoT technology for the purpose to quantify and measure these behaviors, therefore establishing a global view of student{\textquoteright}s performance. 20 relevant papers were extracted from different scientific databases, and published between 2006 and 2020. The main objective is to provide a historical and geographical classification of research that combines IoT with Student{\textquoteright}s behaviors in the classroom, the most challenging areas, and the resulting artifacts. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-04819-7_39}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85131130128\&doi=10.1007\%2f978-3-031-04819-7_39\&partnerID=40\&md5=d3b5b8101651f884719dad1b6a274a8b}, author = {Boukbab, M. and Nafil, K.} } @article {Boumait2022251, title = {Survey IOT Systems Security Based on Machine Learning}, journal = {Lecture Notes in Networks and Systems}, volume = {455 LNNS}, year = {2022}, note = {cited By 0}, pages = {251-258}, abstract = {IoT technologies are essential for creating a variety of smart applications in the real world that will improve people{\textquoteright}s lives. The focus of this study is on the security of IoT systems using machine learning. It{\textquoteright}s about a thorough examination of the security challenges and threats that applications face. It{\textquoteright}s a survey of machine learning techniques that can be utilized to boost IoT system confidence and security. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-02447-4_26}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130368202\&doi=10.1007\%2f978-3-031-02447-4_26\&partnerID=40\&md5=7e46544676b219af8cfdbafd0edc735a}, author = {Boumait, E.M. and Habbani, A. and Souidi, M. and Didi, Z.} } @article {Ajallouda202231, title = {A Systematic Literature Review of Keyphrases Extraction Approaches}, journal = {International Journal of Interactive Mobile Technologies}, volume = {16}, number = {16}, year = {2022}, note = {cited By 0}, pages = {31-58}, abstract = {The keyphrases of a document are the textual units that characterize its content such as the topics it addresses, its ideas, their field, etc. Thousands of books, articles and web pages are published every day. Manually extracting keyphrases is a tedious task and takes a lot of time. Automatic keyphrases extraction is an area of text mining that aims to identify the most useful and important phrases that give meaning to the content of a document. Keyphrases can be used in many Natural Language Processing (NLP) applications, such as text summarization, text clustering and text classification. This article provides a Systematic Literature Review (SLR) to investigate, analyze, and discuss existing relevant contributions and efforts that use new concepts and tools to improve keyphrase extraction. We have studied the supervised and unsupervised approaches to extracting keyphrases published in the period 2015{\textendash}2022. We have also identified the steps most commonly used by the different approaches. Additionally, we looked at the criteria that should be evaluated to improve the accuracy of keyphrases extraction. Each selected approach was evaluated for its ability to extract keyphrases. Our findings highlight the importance of keyphrase extraction, and provide researchers and practitioners with information about proposed solutions and their limitations, which contributes to extract keyphrases in a powerful and meaningful way effective {\textcopyright} 2022, International Journal of Interactive Mobile Technologies.All Rights Reserved.}, doi = {10.3991/ijim.v16i16.33081}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137632849\&doi=10.3991\%2fijim.v16i16.33081\&partnerID=40\&md5=cf158a54305193c3291a26b2c49d765f}, author = {Ajallouda, L. and Fagroud, F.Z. and Zellou, A. and Benlahmar, E.H.} } @article {Mezouar2022317, title = {A Systematic Literature Review of Machine Learning Applications in Software Engineering}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 0}, pages = {317-331}, abstract = {Machine Learning (ML) has been a concern in Software Engineering (SE) over the past years. However, how to use ML and what it can offer for SE is still subject to debate among researchers. This paper investigates the application of ML in SE. The goal is to identify the used algorithms, the addressed topics and the main findings. It performs a Systematic Literature Review (SLR) of peer-reviewed studies published between 1995 and 2020. Data extracted from the studies show that ML algorithms are of great practical value in the different activities of software development process, especially {\textquotedblleft}Software specification{\textquotedblright} and {\textquotedblleft}Software validation{\textquotedblright} since {\textquotedblleft}Software bug prediction{\textquotedblright} and {\textquotedblleft}Software quality improvement{\textquotedblright} are the most recurring research topics. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_24}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135059882\&doi=10.1007\%2f978-3-031-07969-6_24\&partnerID=40\&md5=744dceb379fd3656a37a9965da30e49f}, author = {Mezouar, H. and Afia, A.E.} } @article {ElMajdoubi2022, title = {The Systematic Literature Review of Privacy-Preserving Solutions in Smart Healthcare Environment}, journal = {Security and Communication Networks}, volume = {2022}, year = {2022}, note = {cited By 0}, abstract = {The rapid development of the Internet of Medical Things (IoMT) technology has resulted in various advances in the smart healthcare field; it improves healthcare systems to offer more complicated real-time services and provides an efficient patient motioning system. However, despite the brilliant side of IoMT, several concerns continue to undercut its adoption. In fact, collecting, transmitting, storing, and using data in IoMT applications raises issues regarding privacy and data protection, especially with the multitude of stakeholders involved during the whole data life cycle. Motivated from these facts, this article is devoted to perform a Systematic Literature Review (SLR) of privacy-preserving solutions used in the smart healthcare ecosystem. The recent research papers disseminated between 2017 and 2021 are selected from multiple databases and a standardized SLR method is conducted. A total of 100 papers were reviewed and a critical analysis was conducted on the selected papers. Moreover, this review study attempts to highlight the limitation of the current approaches and aims to find possible solutions to them. Thus, a detailed analysis was carried out on the selected papers in terms of the privacy techniques they deployed, the data life cycle phase they addressed, the stakeholders needs they met, and the privacy principles they covered according to privacy laws and regulations. Finally, we summarize our results showing privacy-preserving trends and identifying recommendations to involve privacy principles coverage in smart healthcare applications. {\textcopyright} 2022 Driss El Majdoubi et al.}, keywords = {Critical analysis, Data life cycle, Health care, Healthcare environments, Healthcare systems, Information services, Laws and legislation, Life cycle, Paper, Privacy preserving solutions, Privacy principle, Privacy-preserving techniques, Real time service, Real time systems, Recent researches, Research papers, Systematic literature review}, doi = {10.1155/2022/5642026}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127472073\&doi=10.1155\%2f2022\%2f5642026\&partnerID=40\&md5=8fdf8807c5263ec2fe00933f24b13e2a}, author = {El Majdoubi, D. and El Bakkali, H. and Sadki, S. and Maqour, Z. and Leghmid, A.} } @article {Rima202244, title = {Systematic Literature Review on Open Educational Resources Recommender Systems}, journal = {International Journal of Interactive Mobile Technologies}, volume = {16}, number = {18}, year = {2022}, note = {cited By 0}, pages = {44-77}, abstract = {In recent years, open educational resources (OER) gained in popularity among education and learning stakeholders. These resources are widely available on the internet, and recommender systems (RS) are commonly utilized to overcome the abundance of OER. This study aims to evaluate the advances in OER recommenders to identify the frequently used recommendation approaches, explore the technical background, highlight gaps in the existing research, and position our future research alongside the current studies. This paper comprises 413 papers published between 2005 and 2022. It is a systematic literature review with a deductive approach using the grounded theory technique, combining quantitative and qualitative analysis by adopting open coding (inductive and deductive) for content analysis. We employed Google Scholar as a search engine to crawl data, and findings are presented according to the (Bernard, H. Russell.2000) process. The review constitutes a reference for researchers in this field and the future developers of OER recommender systems. It reveals an emerging interest in the area; nevertheless, studies have not yet covered hybrid interactive recommendation systems, Chabot-based, teacher and course creators oriented. Further and future research is needed {\textcopyright} 2022, International Journal of Interactive Mobile Technologies.All Rights Reserved.}, doi = {10.3991/ijim.v16i18.32197}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85140018978\&doi=10.3991\%2fijim.v16i18.32197\&partnerID=40\&md5=25930ac249e8251c64164a00f3801ad1}, author = {Rima, S. and Meriem, H. and Najima, D. and Rachida, A.} } @article {Idlahcen2022466, title = {Systematic Map of Data Mining for Gynecologic Oncology}, journal = {Lecture Notes in Networks and Systems}, volume = {468 LNNS}, year = {2022}, note = {cited By 0}, pages = {466-475}, abstract = {Gynecologic cancers are a significant cause of morbidity and mortality among women both in developed and low- middle- income countries. To alleviate the burden, the application of Data Mining (DM) in gynecologic oncology is needed in clinical environments. This study presents a systematic mapping to explore in detail the breadth of the available literature on the use of DM in gynecologic oncology. The mapping questions and the PICO framework served to determine the search string of this systematic map. The resultant was conducted on five well-known databases, PubMed, IEEE Xplore, ScienceDirect, Springer Link, and Google Scholar, to catch relevant articles published between 2011, and mid of 2021. Of the 2,807 potential records, 169 studies fulfilled the inclusion/exclusion criteria and were in-depth analyzed. The findings revealed that DM efforts peaked considerably from 2019 in terms of cervical cancer screening and diagnosis. Further studies are needed to investigate a wider range of research questions as gynecologic oncology is a very rich field with a collection of distinct features cancers which, in turn, allow Machine Learning (ML) opportunities. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-04826-5_47}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130252805\&doi=10.1007\%2f978-3-031-04826-5_47\&partnerID=40\&md5=62c013d4962d32086190ef98c3ae36e7}, author = {Idlahcen, F. and Idri, A.} } @article {Zizaan2022425, title = {Systematic Map of Machine Learning Based Breast Cancer Screening}, journal = {Lecture Notes in Networks and Systems}, volume = {468 LNNS}, year = {2022}, note = {cited By 0}, pages = {425-434}, abstract = {Although Breast Cancer (BC) deaths have decreased over time, it is still the second largest cause of cancer death among women. With the technical revolution of Artificial Intelligence (AI), and the big healthcare data that is becoming more of a reality, many researchers have attempted to employ Machine Learning (ML) techniques to gain a better understanding of this disease. The present paper is a systematic mapping study of the application of ML techniques in Breast Cancer Screening (BCS) between the years 2011 and early 2021. Out of 129 candidate papers we retrieved from six digital libraries, a total of 66 papers were selected according to 5 criteria: year and publication venue, paper type, BCS modality, and empirical type. The results show that classification was the most used ML objective, and that mammography was the most frequent BCS modality used. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-04826-5_43}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85130248734\&doi=10.1007\%2f978-3-031-04826-5_43\&partnerID=40\&md5=4017a93b47d63e929eb5d2e71e97f5f0}, author = {Zizaan, A. and Idri, A.} } @article {Yousfi2021129, title = {SBP: Preparation of Schema Elements to~Schema Matching}, journal = {Lecture Notes in Electrical Engineering}, volume = {733 LNEE}, year = {2021}, note = {cited By 0}, pages = {129-144}, abstract = {Schema pre-matching is very critical for having schema elements fully ready for schema matching. Ideally, words are first extracted from the schema elements{\textquoteright} labels, and then the semantically corresponding elements are generated accordingly. Searching for the sense of words based on their vertical and horizontal contexts, and before performing schema matching is very crucial to obtain high matching accuracy and as a result increase the amount of accurate matches and reduce the number of inaccurate matches and missed matches. Nonetheless, this problem is much more challenging than it seems. This is because complete and precise information about the meaning behind each element is often unavailable. This paper presents SBP, a Sense-Based Pre-matching approach designed for hierarchical data representations. SBP consists of two main components. First, the words sets generator generates, from each element, a set of words that fully describes its meaning. Second, the words qualifier identifies the senses of words based on both their vertical and horizontal contexts. Experimental results on real-world domains show high matching accuracy obtained when using the SBP approach. {\textcopyright} 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.}, keywords = {Electrical engineering, Hierarchical data, Mathematical techniques, Pre-matching, Real world domain, Schema matching}, doi = {10.1007/978-981-33-4909-4_10}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85107373285\&doi=10.1007\%2f978-981-33-4909-4_10\&partnerID=40\&md5=8abeb96c3db9e0d4b54e753de8bc994e}, author = {Yousfi, A. and El Yazidi, M.H. and Zellou, A.} } @article {Sebbar2021355, title = {Secure Data Sharing Framework Based on Supervised Machine Learning Detection System for Future SDN-Based Networks}, journal = {Studies in Computational Intelligence}, volume = {919}, year = {2021}, note = {cited By 2}, pages = {355-371}, abstract = {Securing Data-sharing mechanism between Software Defined Networks (SDN) nodes represent one of the biggest challenges in SDN context. In fact, attackers may steal or perturb flows in SDN by performing several types of attacks such as address resolution protocol poisoning, main in the middle and rogue nodes attacks. These attacks are very harm full to SDN networks as they can be performed easily and passively at all SDN layers. Furthermore, data-sharing permit to an attacker to gather all sensitive flows and data from SDN architecture. In this chapter, we will propose a framework for secure data sharing that detect and stop intrusions in SDN context while ensuring authentication and privacy. To do so, we propose a defense mechanism that detect and reduce the risk of attacks based on advanced machine learning techniques. The learning and data pre-processing steps was performed by using a constructed data set dedicated to SDN context. The simulation results show that our framework can effectively and efficiently address sniffing attacks that can be detected and stopped quickly. Finally, we observe high accuracy with a low false-positive for attack detection. {\textcopyright} 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-030-57024-8_16}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097909334\&doi=10.1007\%2f978-3-030-57024-8_16\&partnerID=40\&md5=0d3b5f0a3c85d400bc35313dfe6f3009}, author = {Sebbar, A. and Zkik, K. and Baddi, Y. and Boulmalf, M. and Ech-Cherif El Kettani, M.D.} } @article {Mouchfiq2021288, title = {Security issues in manets: A survey}, journal = {Advances in Intelligent Systems and Computing}, volume = {1184}, year = {2021}, note = {cited By 2}, pages = {288-295}, abstract = {Recently, the notion of security has become increasingly important to research on wireless networks, later the Internet of things (IoT) and ad hoc networks that are a part of IoT environment. The various changes in the digital environment, as it must identify the different changes in the digital environment, are namely the protection of the personal and professional data of this intelligent world. In the work already done, there are several methods and levels of security. In this study, we identify that security aggression MANETs are facing with the security services to provide in each layer. In order to reach our target, we did a literature search gathering information on different types of attacks and solutions, as well as the latest security work. Then, we discuss the proposed solutions to ensure a high level of security in networks by recalling the latest work of our team. Finally, we propose a method of security better adapted to our needs based on blockchain technology. {\textcopyright} The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021.}, keywords = {Digital environment, In networks, Internet of thing (IOT), Internet of things, Literature search, Mobile ad hoc networks, Network security, Security issues, Security services}, doi = {10.1007/978-981-15-5859-7_28}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091934292\&doi=10.1007\%2f978-981-15-5859-7_28\&partnerID=40\&md5=94af6860a11351f3307ffc8d94ae12a3}, author = {Mouchfiq, N. and Habbani, A. and Benjbara, C.} } @article {ElHaddaoui2021336, title = {Sentiment analysis: A review and framework foundations}, journal = {International Journal of Data Analysis Techniques and Strategies}, volume = {13}, number = {4}, year = {2021}, note = {cited By 0}, pages = {336-355}, abstract = {The rise of social media as a platform for opinion expression and social interactions motivated the need for an automated data analysis technique for business value extraction with optimal investment considerations. In this respect, sentiment analysis (SA) becomes the de facto approach to investigate generated data and retrieve information such as sentiments and emotions, discussed topics, etc., via traditional machine learning and modern neural network-based algorithms. The current techniques achieve reasonable accuracy scores but their performance evolution is depending on the context of application, also most implementations are complex and non-reusable components. Our literature review shows a lack in research studies to unify existing systems under a common framework for SA tasks. This paper also highlights the rending movement of neural networks approaches and pinpoint recent research studies for SA sub tasks. A SA framework design proposition is presented based on key research projects and enhanced with other promising works. {\textcopyright} 2021 Inderscience Publishers. All rights reserved.}, doi = {10.1504/IJDATS.2021.120112}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85122875189\&doi=10.1504\%2fIJDATS.2021.120112\&partnerID=40\&md5=e3d2033b898f101c2ec5d087fdf6472e}, author = {El Haddaoui, B. and Chiheb, R. and Faizi, R. and El Afia, A.} } @article {Abid20211463, title = {Simulation optimisation methods applied in reverse logistics: a systematic review}, journal = {International Journal of Sustainable Engineering}, volume = {14}, number = {6}, year = {2021}, note = {cited By 0}, pages = {1463-1483}, abstract = {Reverse logistics has grown in importance with the increase in environmental sustainability issues. However, reverse logistics is often associated with complex and difficult uncertainty issues, the vagueness of information, and the numerous decision variables and constraints. To address these issues, researchers deployed a class of effective methods called simulation-based optimisation. The aim of this study is to perform a systematic review of the available reverse logistics literature, discussing reverse logistic and simulation-based optimisation, highlighting the research gap and setting future directions. This work identifies: (1) various research design and methodologies used in reverse logistics literature; (2) the most explored areas of reverse logistics and discusses the sector where the exploration can be redirected; (3) the various simulation-based optimisation (SO) methods; and (4) the most dominant SO methods for solving reverse logistics problems. This study will be useful to researchers and practitioners in finding new research opportunities in the field of reverse logistics. {\textcopyright} 2021 Informa UK Limited, trading as Taylor \& Francis Group.}, keywords = {Decision constraints, Decision variables, Environmental sustainability, Optimization, Optimization method, Reverse logistics, Simulation optimization method, Simulation-based optimizations, Sustainability issues, Sustainable development, Systematic Review, Uncertainty}, doi = {10.1080/19397038.2021.2003470}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85119952129\&doi=10.1080\%2f19397038.2021.2003470\&partnerID=40\&md5=dd9095deb5eaf7d2eb4fffd798e2e34d}, author = {Abid, S. and Mhada, F.Z.} } @article {Talei2021, title = {Smart building energy inefficiencies detection through time series analysis and unsupervised machine learning}, journal = {Energies}, volume = {14}, number = {19}, year = {2021}, note = {cited By 6}, abstract = {The climate of Houston, classified as a humid subtropical climate with tropical influences, makes the heating, ventilation, and air conditioning (HVAC) systems the largest electricity consumers in buildings. HVAC systems in commercial buildings are usually operated by a centralized control system and/or an energy management system based on a fixed schedule and scheduled control of a zone setpoint, which is not appropriate for many buildings with changing occupancy rates. Lately, as part of energy efficiency analysis, attention has focused on collecting and analyzing smart meters and building-related data, as well as applying supervised learning techniques, to propose new strategies to operate HVAC systems and reduce energy consumption. On the other hand, unsupervised learning techniques have been used to study the consumption information and profile characterization of different buildings after cluster analysis is performed. This paper adopts a different approach by revealing the power of unsupervised learning to cluster data and unveiling hidden patterns. In this study, we also identify energy inefficiencies after exploring the cluster results of a single building{\textquoteright}s HVAC consumption data and building usage data as part of the energy efficiency analysis. Time series analysis and the K-means clustering algorithm are successfully applied to identify new energy-saving opportunities in a highly efficient office building located in the Houston area (TX, USA). The paper uses 1-year data from a highly efficient Leadership in Energy and Environment Design (LEED)-, Energy Star-, and Net Zero-certified building, showing a potential energy savings of 6\% using the K-means algorithm. The results show that clustering is instrumental in helping building managers identify potential additional energy savings. {\textcopyright} 2021 by the authors. Licensee MDPI, Basel, Switzerland.}, keywords = {Clusterings, Conditioning systems, energy efficiency, Energy management systems, Energy savings, Energy utilization, Energy-savings, Harmonic analysis, Heating ventilation and air conditioning, Houston, HVAC, Internet of things, K-means clustering, Leadership in energy and environment design building, Leadership in energy and environment designs, Learning algorithms, Office buildings, Potential energy, Time series analysis, Time-series analysis, Times series, Tropics, Unsupervised learning}, doi = {10.3390/en14196042}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85115608885\&doi=10.3390\%2fen14196042\&partnerID=40\&md5=e01e465020f683b8a7ccebf61bf08077}, author = {Talei, H. and Benhaddou, D. and Gamarra, C. and Benbrahim, H. and Essaaidi, M.} } @article {Majdoubi2021, title = {SmartMedChain: A Blockchain-Based Privacy-Preserving Smart Healthcare Framework}, journal = {Journal of Healthcare Engineering}, volume = {2021}, year = {2021}, note = {cited By 6}, abstract = {Nowadays, the adoption of Internet of Things (IoT) technology worldwide is accelerating the digital transformation of healthcare industry. In this context, smart healthcare (s-healthcare) solutions are ensuring better and innovative opportunities for healthcare providers to improve patients{\textquoteright} care. However, these solutions raise also new challenges in terms of security and privacy due to the diversity of stakeholders, the centralized data management, and the resulting lack of trustworthiness, accountability, and control. In this paper, we propose an end-to-end Blockchain-based and privacy-preserving framework called SmartMedChain for data sharing in s-healthcare environment. The Blockchain is built on Hyperledger Fabric and stores encrypted health data by using the InterPlanetary File System (IPFS), a distributed data storage solution with high resiliency and scalability. Indeed, compared to other propositions and based on the concept of smart contracts, our solution combines both data access control and data usage auditing measures for both Medical IoT data and Electronic Health Records (EHRs) generated by s-healthcare services. In addition, s-healthcare stakeholders can be held accountable by introducing an innovative Privacy Agreement Management scheme that monitors the execution of the service in respect of patient preferences and in accordance with relevant privacy laws. Security analysis and experimental results show that the proposed SmartMedChain is feasible and efficient for s-healthcare environments. Copyright {\textcopyright} 2021 Driss El Majdoubi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.}, keywords = {Access control, adult, Article, Block-chain, Blockchain, Centralised, controlled study, Data Management, Delivery of Health Care, Digital storage, Digital transformation, Distributed ledger, electronic health record, Electronic Health Records, Health care, health care delivery, Health care providers, Healthcare environments, Healthcare industry, human, Humans, Information management, information processing, information storage, Internet of things, Internet of things technologies, Network security, patient care, patient preference, Privacy, Privacy preserving, Privacy-preserving techniques, Security and privacy, Smart contract}, doi = {10.1155/2021/4145512}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85121960725\&doi=10.1155\%2f2021\%2f4145512\&partnerID=40\&md5=0f8afcea0c53e46d9f3863d4ed04b5b8}, author = {Majdoubi, D.E. and Bakkali, H.E. and Sadki, S.} } @conference {Gryech2021, title = {On spatial prediction of urban air pollution}, booktitle = {2021 17th International Conference on Intelligent Environments, IE 2021 - Proceedings}, year = {2021}, note = {cited By 0}, abstract = {Air pollution continues to draw global attention, and still causes adverse environmental issues and health effects. Questions about how air pollution evolves spatially are also still unsolved. Many air quality monitoring stations are deployed in several countries to give insight about air quality. However, it is quite frequent for these stations to go out of order during their long life time. These incidents may lead to a significant loss of pollution data. To mitigate this issue, we propose to leverage spatial correlation between pollution monitoring stations to predict the lost data. To reduce the complexity of the prediction model, for each monitoring station, we identify the best set of other stations to use in the prediction model. Correlation-based station selection is shown to outperform distance-based station selection and provides an R2 above 0.8 when applied to the Airparif datasets. {\textcopyright} 2021 IEEE.}, keywords = {Air quality, Air quality monitoring stations, Environmental issues, Forecasting, Intelligent agents, Monitoring stations, Pollution monitoring, Prediction model, Predictive analytics, Spatial correlations, Spatial prediction, Urban air pollution}, doi = {10.1109/IE51775.2021.9486618}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85114499832\&doi=10.1109\%2fIE51775.2021.9486618\&partnerID=40\&md5=10a04db251b0bca163abb4d34f0c721a}, author = {Gryech, I. and Ben-Aboud, Y. and Ghogho, M. and Kobbane, A.} } @conference {Chaayra2021, title = {Statistical Analysis of Uplink Massive MIMO Systems for MRC Linear Receivers over Weibull Fading Channels}, booktitle = {Proceedings - 4th International Conference on Advanced Communication Technologies and Networking, CommNet 2021}, year = {2021}, note = {cited By 0}, abstract = {This paper investigates the performance of maximum-ratio combining (MRC) linear receivers in a massive multiple-input multiple-output (mMIMO) uplink communication system, that in terms of their signal-to-interference-plus-noise ratio (SINR) operating under independent flat Weibull multipath fading channels (WFCs). Based on a tight approximate probability density function (PDF) expression of the signal-to-noise ratio at the considered receiver output, we derive new accurate closed-form expressions of PDF, outage probability (OP) for mMIMO employing MRC technique. The results show high accuracy for significant values of K{\texttimes}Nr mMIMO system at high/low transmission power and severity fading parameters as well. Indeed, the greater K{\texttimes}Nr, the better the PDF{\textquoteright}s accuracy, therefore, the better is the OP. Numerical outcomes have been assessed by using Mathematica Software to show up our results. {\textcopyright} 2021 IEEE.}, keywords = {Cummulative density function, G-functions, Linear receiver, Massive MIMO, Maximum ratio, Maximum-ratio-combining, Meije G-function, MIMO systems, Multipath fading, Multipath propagation, Outage probability, Probability density function, Signal interference, Signal receivers, Signal to noise ratio, Signalto-interference-plus-noise ratios (SINR), Weibull distribution, Weibull fading channel}, doi = {10.1109/CommNet52204.2021.9641935}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123984751\&doi=10.1109\%2fCommNet52204.2021.9641935\&partnerID=40\&md5=3e44ae3af40139cd08615a702accf1ac}, author = {Chaayra, T. and El Ansari, Y. and El Bouanani, F. and Ben-Azza, H.} } @article {Fakhkhari2021724, title = {Structural Equation Model (SEM) for Evaluating Factors Affecting ICT4D Project Success}, journal = {Journal of Computer Science}, volume = {17}, number = {8}, year = {2021}, note = {cited By 0}, pages = {724-737}, abstract = {Abstract: Information Communication Technology for Development (ICT4D) enables organizations to transform and evolve. Despite the contributions of methodologies and models for project management, the number of failed ICT4D projects remain high; as a consequence, researching crucial success factors of ICT4D projects remains an important matter for practitioners and researchers. Studies and researches on factors impacting ICT4D projects{\textquoteright} success are various, fragmented and have used different methods to explore the relatedness between various variables. Structural Equation Modeling approach (SEM) has attracted very little attention in the definition of critical factors affecting ICT and ICT4D projects{\textquoteright} success. From this standpoint, we as author of this study have applied the SEM approach and built an empirical model that identifies and justifies the topmost factors that impact the best outcome of ICT initiatives and projects conducted for development. In this regard, we reviewed relevant literature to compile and synthesize important success factors in ICT4D projects. The results obtained revealed that there isn{\textquoteright}t an agreement on ICT4D project factor success. Our work consisted of consolidating the ICT4D success factors and developing a quantitative approach using smart-PLS version 3.3.3 to test and verify the proposed conceptual model. Particularly, we undertook this study to highlights the correlation between {\textquotedblleft}Leadership and Governance{\textquotedblright}, {\textquotedblleft}Project Management{\textquotedblright}, {\textquotedblleft}Quality Management{\textquotedblright} and {\textquotedblleft}Foundations and Requirements{\textquotedblright} factors and how these correlated to the outcomes of the ICT4D project. The results indicate that the R Square value of the model attained 0.84 which reveals that the latent constructs previously mentioned justified 84\% of the variance in project success. This study lays out the contours of the existing literature concluding the critical success factors and coming up with a framework for decision-makers, researchers, practitioners and organizations intending to initiate and implement an ICT4D project. {\textcopyright} 2021 Houda Fakhkhari, Bouchaib Bounabat and Maria Bennani.}, doi = {10.3844/jcssp.2021.724.737}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85115226816\&doi=10.3844\%2fjcssp.2021.724.737\&partnerID=40\&md5=1dc4b3091bea1e834de120ae5f1ffa6b}, author = {Fakhkhari, H. and Bounabat, B. and Bennani, M.} } @article {Kishore20217232, title = {Sum Rate Analysis of Generalized Space Shift Keying-Aided MIMO-NOMA Systems}, journal = {IEEE Transactions on Vehicular Technology}, volume = {70}, number = {7}, year = {2021}, note = {cited By 1}, pages = {7232-7236}, abstract = {We investigate the sum rate performance of a generalized space shift keying (GSSK)-aided, non-orthogonal multiple access (NOMA) network. In particular, we consider a multiple-input multiple-output (MIMO) NOMA downlink channel, where the base station employs GSSK modulation to transmit additional information to the NOMA users. We present a novel energy-based maximum likelihood (ML) detection strategy at the NOMA users to decode the active antenna indices. We derive a closed-form expression for the average pairwise error probability of the energy-based ML strategy to find a union bound on the bit error probability. Further, we derive the expression for the overall sum rate of the proposed GSSK-aided MIMO-NOMA system. Through numerical evaluations, we show that the proposed system outperforms the conventional MIMO-NOMA system, in terms of spectral efficiency. {\textcopyright} 1967-2012 IEEE.}, keywords = {Antennas, Bit error probability, Bit error rate, Block codes, Closed-form expression, Downlink channels, Maximum likelihood, Maximum-likelihood detection, MIMO systems, Multiple access, Pair-wise error probability, Space-shift keying, Spectral efficiencies, Trellis codes}, doi = {10.1109/TVT.2021.3085415}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85107332896\&doi=10.1109\%2fTVT.2021.3085415\&partnerID=40\&md5=43ed806aa513f25c8c35a3c8a9b88af1}, author = {Kishore, R. and Gurugopinath, S. and Muhaidat, S. and Bouanani, F.E. and Dobre, O.A.} } @article {Khaouja2021118134, title = {A Survey on Skill Identification from Online Job Ads}, journal = {IEEE Access}, volume = {9}, year = {2021}, note = {cited By 8}, pages = {118134-118153}, abstract = {A changing job market, influenced by different factors such as globalization and demographic growth, urges close monitoring. The digitization of the job market has given the opportunity to researchers to better understand job market needs as job postings/ads become more accessible. However, such postings are submitted in unstructured text and need further processing to identify the required skills. The aim of this survey is to review current research on skill identification from job ads and to discuss possible future research directions. In this study, we systematically reviewed 108 research articles on the topic. In particular, we evaluated and classified the prior work aiming to identify the skill bases used for analyzing job market needs; the type of extracted skills; the skill identification methods; the studied sector and the skill identification granularity. Then, we categorized the existent applications and goals of skill identification. Finally, we present key challenges and discuss recent trends. {\textcopyright} 2013 IEEE.}, keywords = {Commerce, Demographic growth, Employment, Identification method, Job market, Job postings, Possible futures, Recent trends, Surveys, Unstructured texts}, doi = {10.1109/ACCESS.2021.3106120}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85113305279\&doi=10.1109\%2fACCESS.2021.3106120\&partnerID=40\&md5=95e3da9f3201c5b0ca744ba8d8af7012}, author = {Khaouja, I. and Kassou, I. and Ghogho, M.} } @article {Drissi2021594, title = {A Systematic Literature Review on e-Mental Health Solutions to Assist Health Care Workers during COVID-19}, journal = {Telemedicine and e-Health}, volume = {27}, number = {6}, year = {2021}, note = {cited By 27}, pages = {594-602}, abstract = {Background: e-Mental health is an established field of exploiting information and communication technologies for mental health care. It offers different solutions and has shown effectiveness in managing many psychological issues. Introduction: The coronavirus disease 2019 (COVID-19) pandemic has critically influenced health care systems and health care workers (HCWs). HCWs are working under hard conditions, and are suffering from different psychological issues, including anxiety, stress, and depression. Consequently, there is an undeniable need of mental care interventions for HCWs. Under the circumstances caused by COVID-19, e-health interventions can be used as tools to assist HCWs with their mental health. These solutions can provide mental health care support remotely, respecting the recommended safety measures. Materials and Methods: This study aims to identify e-mental health interventions, reported in the literature, that are developed for HCWs during the COVID-19 pandemic. A systematic literature review was conducted following the PRISMA protocol by searching the following digital libraries: IEEE, ACM, ScienceDirect, Scopus, and PubMed. Results and Discussion: Eleven publications were selected. The identified e-mental health interventions consisted of social media platforms, e-learning content, online resources and mobile applications. Only 27\% of the studies included empirical evaluation of the reported interventions, 55\% listed challenges and limitations related to the adoption of the reported interventions. And 45\% presented interventions developed specifically for HCWs in China. The overall feedback on the identified interventions was positive, yet a lack of empirical evaluation was identified, especially regarding qualitative evidence. Conclusions: The COVID-19 pandemic has highlighted the importance and need for e-mental health solutions for HCWs. {\textcopyright} Copyright 2021, Mary Ann Liebert, Inc., publishers 2021.}, keywords = {China, COVID-19, Digital libraries, e-learning, E-learning contents, Empirical evaluations, Health care, health care personnel, Health care workers, Health Personnel, Health-care system, human, Humans, Information and Communication Technologies, Mental health, Mobile applications, pandemic, Pandemics, SARS-CoV-2, Social media platforms, Systematic literature review}, doi = {10.1089/tmj.2020.0287}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85108029620\&doi=10.1089\%2ftmj.2020.0287\&partnerID=40\&md5=abb17cd8cdd22c6edcf3e914fcc6e8e2}, author = {Drissi, N. and Ouhbi, S. and Marques, G. and De La Torre D{\'\i}ez, I. and Ghogho, M. and Janati Idrissi, M.A.} } @article {Hosni20212827, title = {A systematic mapping study for ensemble classification methods in cardiovascular disease}, journal = {Artificial Intelligence Review}, volume = {54}, number = {4}, year = {2021}, note = {cited By 5}, pages = {2827-2861}, abstract = {Ensemble methods overcome the limitations of single machine learning techniques by combining different techniques, and are employed in the quest to achieve a high level of accuracy. This approach has been investigated in various fields, one of them being that of bioinformatics. One of the most frequent applications of ensemble techniques involves research into cardiovascular diseases, which are considered the leading cause of death worldwide. The purpose of this research work is to identify the papers that investigate ensemble classification techniques applied to cardiology diseases, and to analyse them according to nine aspects: their publication venues, the medical tasks tackled, the empirical and research types adopted, the types of ensembles proposed, the single techniques used to construct the ensembles, the validation frameworks adopted to evaluate the proposed ensembles, the tools used to build the ensembles, and the optimization methods employed for the single techniques. This paper reports the carrying out of a systematic mapping study. An extensive automatic search in four digital libraries: IEEE Xplore, ACM Digital Library, PubMed, and Scopus, followed by a study selection process, resulted in the identification of 351 papers that were used to address our mapping questions. This study found that the papers selected had been published in a large number of different resources. The medical task addressed most frequently by the selected studies was diagnosis. In addition, the experiment-based empirical type and evaluation-based research type were the most dominant approaches adopted by the selected studies. Homogeneous ensembles were the ensemble type that was developed most often in literature, while decision trees, artificial neural networks and Bayesian classifiers were the single techniques used most frequently to develop ensemble classification methods. The weighted majority and majority voting rules were adopted to obtain the final decision of the ensembles developed. With regard to evaluation frameworks, the datasets obtained from the UCI and PhysioBank repositories were those used most often to evaluate the ensemble methods, while the k-fold cross-validation method was the most frequently-employed validation technique. Several tools with which to build ensemble classifiers were identified, and the type of software adopted with the greatest frequency was open source. Finally, only a few researchers took into account the optimization of the parameter settings of either single or meta ensemble classifiers. This mapping study attempts to provide a greater insight into the application of ensemble classification methods in cardiovascular diseases. The majority of the selected papers reported positive feedback as regards the ability of ensemble methods to perform better than single methods. Further analysis is required to aggregate the evidence reported in literature. {\textcopyright} 2020, Springer Nature B.V.}, keywords = {Bayesian networks, Cardio-vascular disease, Cardiology, Decision trees, Diagnosis, Digital libraries, Diseases, Ensemble classification, Ensemble classifiers, Evaluation framework, K fold cross validations, Learning systems, Majority voting rules, Mapping, Open source software, Open systems, Optimization method, Systematic mapping studies}, doi = {10.1007/s10462-020-09914-6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091735819\&doi=10.1007\%2fs10462-020-09914-6\&partnerID=40\&md5=69ea4b02de420c3ec6a85e1f3c7dddaf}, author = {Hosni, M. and Carrillo de Gea, J.M. and Idri, A. and El Bajta, M. and Fern{\'a}ndez Alem{\'a}n, J.L. and Garc{\'\i}a-Mateos, G. and Abnane, I.} } @article {ElMouaatamid2020, title = {A Scalable Group Authentication Scheme Based on Combinatorial Designs with Fault Tolerance for the Internet of Things}, journal = {SN Computer Science}, volume = {1}, number = {4}, year = {2020}, note = {cited By 2}, abstract = {With the development of the Internet of Things, the scale of IoT system is becoming large. Due to the network congestion problems and the server capability, using unicast authentication will bring burden to the network link and server. In this paper, we propose a scalable group authentication scheme with fault tolerance based on combinatorial designs. Performance analysis of the proposed scheme is based on several metrics such as fault tolerance, scalability, energy consumption and storage overhead. Simulation results have shown that oval designs realize the best trade-off for all metrics. {\textcopyright} 2020, Springer Nature Singapore Pte Ltd.}, doi = {10.1007/s42979-020-00247-3}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85127243319\&doi=10.1007\%2fs42979-020-00247-3\&partnerID=40\&md5=931f3209f31ffb24bb90442a553f5133}, author = {El Mouaatamid, O. and Lahmer, M. and Belkasmi, M.} } @conference {Echihabi20201, title = {Scalable Machine Learning on High-Dimensional Vectors: From Data Series to Deep Network Embeddings}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F162565}, year = {2020}, note = {cited By 0}, pages = {1-6}, abstract = {There is an increasingly pressing need, by several applications in diverse domains, for developing techniques able to analyze very large collections of static and streaming sequences (a.k.a. data series), predominantly in real-time. Examples of such applications come from Internet of Things installations, neuroscience, astrophysics, and a multitude of other scientific and application domains that need to apply machine learning techniques for knowledge extraction. It is not unusual for these applications, for which similarity search is a core operation, to involve numbers of data series in the order of hundreds of millions to billions, which are seldom analyzed in their full detail due to their sheer size. Such application requirements have driven the development of novel similarity search methods that can facilitate scalable analytics in this context. At the same time, a host of other methods have been developed for similarity search of high-dimensional vectors in general. All these methods are now becoming increasingly important, because of the growing popularity and size of sequence collections, as well as the growing use of high-dimensional vector representations of a large variety of objects (such as text, multimedia, images, audio and video recordings, graphs, database tables, and others) thanks to deep network embeddings. In this work, we review recent efforts in designing techniques for indexing and analyzing massive collections of data series, and argue that they are the methods of choice even for general high-dimensional vectors. Finally, we discuss the challenges and open research problems in this area. {\textcopyright} 2020 Owner/Author.}, keywords = {Application requirements, Astrophysics, Deep learning, Designing techniques, Embeddings, High-dimensional, Intelligent systems, Knowledge extraction, Learning systems, Machine learning techniques, Real time systems, Research problems, Scalable machine learning, Semantics, Similarity search, Vectors, Video recording}, doi = {10.1145/3405962.3405989}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091520891\&doi=10.1145\%2f3405962.3405989\&partnerID=40\&md5=b3b9f8c365e940d7a488d9a9a20df419}, author = {Echihabi, K. and Zoumpatianos, K. and Palpanas, T.} } @article {Mouchfiq2020219, title = {Security in MANETs: The Blockchain Issue}, journal = {Communications in Computer and Information Science}, volume = {1264}, year = {2020}, note = {cited By 2}, pages = {219-232}, abstract = {With the emergence of the IoT (Internet of Things) technology, security features must take into account the developments and possible uses. The blockchain is considered as a new technology devoted to data sharing, it allows to guarantee the integrity of data by IoT devices thanks to intelligent contracts allowing to verify and enforce the conditions of the monitored goods during their processing. In our work, we will address the security of Blockchain-based systems and networks to improve and simplify the communication of messages and informations, using the most innovative and sophisticated processes and a form of device independent control. In order to do so, we will analyse the solutions advanced by researchers from all over the world who are dedicated to guaranteeing a good state of security on these networks. Finally, our manuscript will present an approach to enhance security which is founded on the Blockchain principle and which we have entitled {\textquotedblleft}MPR Blockchain{\textquotedblright}. This solution proves to be the most appropriate to our requirements and expectations as a team working within IoT systems and especially ad hoc networks. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Blockchain, Data communication systems, Data Sharing, Independent control, Internet of things, Mobile ad hoc networks, Mobile security, Network security, Security features, Team working}, doi = {10.1007/978-3-030-61143-9_18}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85097368928\&doi=10.1007\%2f978-3-030-61143-9_18\&partnerID=40\&md5=d277597a52117999b5b738db40aa811f}, author = {Mouchfiq, N. and Benjbara, C. and Habbani, A.} } @conference {Drissi2020593, title = {Sensor-based solutions for mental healthcare: A systematic literature review}, booktitle = {HEALTHINF 2020 - 13th International Conference on Health Informatics, Proceedings; Part of 13th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2020}, year = {2020}, note = {cited By 2}, pages = {593-600}, abstract = {Mental well-being is a crucial aspect of the person{\textquoteright}s general health, compromised mental health impairs the person{\textquoteright}s functioning, decreases the quality of life, and limits the person{\textquoteright}s contribution to society. The mental health industry is still facing some barriers to healthcare delivery such as costs, mental health illiteracy, and stigma. Incorporating technological interventions in the treatment and the diagnosis processes might help overcome these barriers. Sensors are devices that have been used for healthcare since the 1990s and have been incorporated into mental healthcare in different forms. In this study, we conducted a systematic literature review to identify and analyze sensor-based solutions for mental healthcare. 12 studies were identified and analyzed. The majority of the selected studies presented methods and models and were empirically evaluated and showed promising accuracy results. Different types of sensors were used to collect different types of data about the patient such as physical and behavioral information. The selected studies mainly addressed the use of sensors for common mental issues like stress and depression or the analysis of general mental status. Some studies reported some limitations mainly related to technological issues and lack of standards. {\textcopyright} 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Biomedical engineering, Health care, Healthcare delivery, Medical informatics, Mental health, Quality of life, Systematic literature review, Well being}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083705930\&partnerID=40\&md5=335f69fa969e09929802b364d7f6d696}, author = {Drissi, N. and Ouhbi, S. and Garc{\'\i}a-Bern{\'a}, J.A. and Idrissi, M.A.J. and Ghogho, M.} } @conference {Rabia2020, title = {Simulation as a decision-making tool in a business analytics environment}, booktitle = {Proceedings - 2020 5th International Conference on Logistics Operations Management, GOL 2020}, year = {2020}, note = {cited By 0}, abstract = {Nowadays, Business Intelligence (BI) plays a key role in the decision-making chain because of what it offers in terms of data availability, structuring, analysis and presentation in the form of dashboards or Key Performance Indicators (KPI) to assist decision-making. Despite its advantages in terms of historicizing the company{\textquoteright}s activity, traditional BI tools do not allow us to project our business into the future and evaluate the impact of a decision on the entire activity of a company. Given this consideration, What-if analysis positions itself as a data-intensive simulation to examine the impact of a decision. In this article, we intend to highlight the role that simulation techniques can play in prescriptive analysis. Then, we present the different architectures that combine the use of simulation in an analytical environment. Finally, we also provide an idea of the future perspectives and challenges in simulation-based analytics. {\textcopyright} 2020 IEEE.}, keywords = {Advanced Analytics, Benchmarking, Business analytics, Data availability, Data intensive, Decision making, Decision making tool, Future perspectives, Key performance indicators, Simulation technique, What-if Analysis}, doi = {10.1109/GOL49479.2020.9314725}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100164050\&doi=10.1109\%2fGOL49479.2020.9314725\&partnerID=40\&md5=03afaf905e87539e719dc12b27acd09d}, author = {Rabia, M.A.B. and Bellabdaoui, A.} } @article {Sayagh2020646, title = {Software Configuration Engineering in Practice Interviews, Survey, and Systematic Literature Review}, journal = {IEEE Transactions on Software Engineering}, volume = {46}, number = {6}, year = {2020}, note = {cited By 12}, pages = {646-673}, abstract = {Modern software applications are adapted to different situations (e.g., memory limits, enabling/disabling features, database credentials) by changing the values of configuration options, without any source code modifications. According to several studies, this flexibility is expensive as configuration failures represent one of the most common types of software failures. They are also hard to debug and resolve as they require a lot of effort to detect which options are misconfigured among a large number of configuration options and values, while comprehension of the code also is hampered by sprinkling conditional checks of the values of configuration options. Although researchers have proposed various approaches to help debug or prevent configuration failures, especially from the end users{\textquoteright} perspective, this paper takes a step back to understand the process required by practitioners to engineer the run-time configuration options in their source code, the challenges they experience as well as best practices that they have or could adopt. By interviewing 14 software engineering experts, followed by a large survey on 229 Java software engineers, we identified 9 major activities related to configuration engineering, 22 challenges faced by developers, and 24 expert recommendations to improve software configuration quality. We complemented this study by a systematic literature review to enrich the experts{\textquoteright} recommendations, and to identify possible solutions discussed and evaluated by the research community for the developers{\textquoteright} problems and challenges. We find that developers face a variety of challenges for all nine configuration engineering activities, starting from the creation of options, which generally is not planned beforehand and increases the complexity of a software system, to the non-trivial comprehension and debugging of configurations, and ending with the risky maintenance of configuration options, since developers avoid touching and changing configuration options in a mature system. We also find that researchers thus far focus primarily on testing and debugging configuration failures, leaving a large range of opportunities for future work. {\textcopyright} 1976-2012 IEEE.}, keywords = {Application programs, Bibliographies, Codes (symbols), Errors, Facebook, Interviews, Program debugging, Software algorithms, Software systems, Surveys, Systematics}, doi = {10.1109/TSE.2018.2867847}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052624554\&doi=10.1109\%2fTSE.2018.2867847\&partnerID=40\&md5=f1b2d51b59522e24e5c52f064a62d00b}, author = {Sayagh, M. and Kerzazi, N. and Adams, B. and Petrillo, F.} } @article {Zakrani202072, title = {Software Effort Estimation Using an Optimal Trees Ensemble: An Empirical Comparative Study}, journal = {Smart Innovation, Systems and Technologies}, volume = {146}, year = {2020}, note = {cited By 0}, pages = {72-82}, abstract = {Since information systems have become the heartbeat of many organizations, the investment in software is growing rapidly and consuming then a significant portion of the company budget. In this context, both the software engineering practitioners and researchers are more interested than ever about accurately estimating the effort and the quality of software product under development. Accurate estimates are desirable but no technique has demonstrated to be successful at effectively and reliably estimating software development effort. In this paper, we propose the use of an optimal trees ensemble (OTE) to predict the software development effort. The ensemble employed is built by combining only the top ranked trees, one by one, from a set of random forests. Each included tree must decrease the unexplained variance of the ensemble for software development effort estimation (SDEE). The effectiveness of the OTE model is compared with other techniques such as regression trees, random forest, RBF neural networks, support vector regression and multiple linear regression in terms of the mean magnitude relative error (MMRE), MdMRE and Pred(l) obtained on five well known datasets namely: ISBSG R8, COCOMO, Tukutuku, Desharnais and Albrecht. According to the results obtained from the experiments, it is shown that the proposed ensemble of optimal trees outperformed almost all the other techniques. Also, OTE model outperformed statistically the other techniques at least in one dataset. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Accuracy evaluation, Budget control, Decision trees, Forestry, Linear regression, Multiple linear regressions, Optimal trees ensemble, Radial basis function networks, Random forests, RBF Neural Network, Regression trees, Software design, Software development effort, Support vector regression (SVR)}, doi = {10.1007/978-3-030-21005-2_7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85069482179\&doi=10.1007\%2f978-3-030-21005-2_7\&partnerID=40\&md5=8d9d107d9b52c20f6cd93bb86477a6a0}, author = {Zakrani, A. and Idri, A. and Hain, M.} } @article {Kharbouch2020894, title = {Software Requirement Catalog on Acceptability, Usability, Internationalization and Sustainability for Contraception mPHRs}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {12252 LNCS}, year = {2020}, note = {cited By 0}, pages = {894-905}, abstract = {Contraception Mobile Personal Health Records (mPHRs) are efficient mobile health applications (apps) to increase awareness about fertility and contraception and to allow women to access, track, manage, and share their health data with healthcare providers. This paper aims to develop a requirements catalog, according to standards, guidelines, and relevant literature to e-health technology and psychology. The requirements covered by this catalog are Acceptability, Usability, Sustainability, and Internationalization (i18n). This catalog can be very useful for developing, evaluating, and auditing contraceptive apps, as well as helping stakeholders and developers identify potential requirements for their mPHRs to improve them. {\textcopyright} 2020, Springer Nature Switzerland AG.}, keywords = {Health, Health care providers, Health data, Mobile health application, Personal health record, Software requirements, Sustainable development}, doi = {10.1007/978-3-030-58811-3_63}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85092222585\&doi=10.1007\%2f978-3-030-58811-3_63\&partnerID=40\&md5=119f051c4582d8079abdb813399d89d1}, author = {Kharbouch, M. and Idri, A. and Redman, L. and Alami, H. and Fernandez-Aleman, J.L. and Toval, A.} } @article {Nemiche2020i, title = {Special issue of the 4th world conference on complex systems (Wccs)}, journal = {Complex Systems}, volume = {29}, number = {3}, year = {2020}, note = {cited By 0}, pages = {i}, doi = {10.25088/ComplexSystems.29.3.i}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85091660029\&doi=10.25088\%2fComplexSystems.29.3.i\&partnerID=40\&md5=c773e461854462f6930bd4c36c84a9f5}, author = {Nemiche, M. and Essaaidi, M.} } @article {ABDELLAH2020568, title = {Spelling correction for the Arabic language space deletion errors-}, journal = {Procedia Computer Science}, volume = {177}, year = {2020}, note = {The 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) / The 10th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2020) / Affiliated Workshops}, pages = {568-574}, abstract = {The automatic correction of spelling errors is one of the most used disciplines in different automatic language processing systems, therefore we are dealing in this article the space deletion errors. This type of error was not taken into consideration in the classical Levenshtein algorithm. In this paper, we propose a new approach for the correction of this spelling errors type. This new approach uses an adapted version of the Levenshtein distance to correct this error. For the evaluation of our new approach we used a lexicon extracted from Al Watane newspaper articles. The results showed the importance of our approach.}, keywords = {Arabic language, Levenshtein distance, space deletion errors, spelling errors}, issn = {1877-0509}, doi = {https://doi.org/10.1016/j.procs.2020.10.080}, url = {https://www.sciencedirect.com/science/article/pii/S1877050920323504}, author = {Yousfi Abdellah and Aouragh Si Lhoussain and Gueddah Hicham and Nejja Mohamed} } @conference {Abdellah2020568, title = {Spelling correction for the Arabic language-space deletion errors}, booktitle = {Procedia Computer Science}, volume = {177}, year = {2020}, note = {cited By 5}, pages = {568-574}, abstract = {The automatic correction of spelling errors is one of the most used disciplines in different automatic language processing systems, therefore we are dealing in this article the space deletion errors. This type of error was not taken into consideration in the classical Levenshtein algorithm. In this paper, we propose a new approach for the correction of this spelling errors type. This new approach uses an adapted version of the Levenshtein distance to correct this error. For the evaluation of our new approach we used a lexicon extracted from Al Watane newspaper articles. The results showed the importance of our approach. {\textcopyright} 2020 The Authors. Published by Elsevier B.V.}, keywords = {Arabic languages, Automatic corrections, Computer science, Computers, Errors, Language processing systems, Levenshtein distance, New approaches, space deletion errors, Spelling correction, spelling errors}, doi = {10.1016/j.procs.2020.10.080}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85099878597\&doi=10.1016\%2fj.procs.2020.10.080\&partnerID=40\&md5=696fa31a7debf0be7759cbf273e88803}, author = {Abdellah, Y. and Lhoussain, A.S. and Hicham, G. and Mohamed, N.} } @conference {Yousfi202085, title = {Spm: Preparing hierarchical data structures for schema matching}, booktitle = {ACM International Conference Proceeding Series}, year = {2020}, note = {cited By 0}, pages = {85-90}, abstract = {Schema pre-matching approaches prepare different schema elements for the matching step. Ideally words are extracted from schema elements{\textquoteright} labels and the semantic correspondences are generated. Identifying the sense of words based on their contexts and before schema matching is critical for increasing the total amount of true matches and decreasing significantly the total amount of both missed matches and false matches. However this problem is very challenging since we often do not have complete and precise information about the meaning behind each element. In this paper we present SPM a Sense-based Pre-Matching approach. SPM has two key modules. First the Sets of Words Generator module generates from every schema element a set of words that describes its meaning. Second the Sense Identifier module selects the most appropriate meaning of words based on their contexts. Experimental results on real-world datasets show high effectiveness achieved by SPM. {\textcopyright} 2020 ACM.}, keywords = {False matches, Hierarchical data structure, Intelligent systems, Pre-matching, Real-world datasets, Schema matching, Semantic correspondence, Semantics}, doi = {10.1145/3419604.3419782}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85096412741\&doi=10.1145\%2f3419604.3419782\&partnerID=40\&md5=0ace2c18d2f9dd1d741d0d08acb83cfa}, author = {Yousfi, A. and El Yazidi, M.H. and Zellou, A.} } @article {Maryame2020441, title = {State of the Art of Deep Learning Applications in Sentiment Analysis: Psychological Behavior Prediction}, journal = {Advances in Intelligent Systems and Computing}, volume = {1076}, year = {2020}, note = {cited By 3}, pages = {441-451}, abstract = {With the explosion of web 2.0, we are witnessing a sharp increase in Internet users such as a vertiginous evolution of social media. These media constitute a source of rich and varied information for researchers in sentiment analyses. This paper describes a tool for sifting through and synthesizing reviews by identifying the main deep learning techniques applied for sentiment analysis especially when it comes to psychological behavior prediction. {\textcopyright} Springer Nature Singapore Pte Ltd. 2020.}, keywords = {Behavior prediction, Behavioral research, Deep learning, Embedded systems, Internet users, Learning techniques, Sentiment analysis, Sharp increase, social media, State of the art, Web 2.0}, doi = {10.1007/978-981-15-0947-6_42}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85085169691\&doi=10.1007\%2f978-981-15-0947-6_42\&partnerID=40\&md5=dcac33ec68694f08b6258ea4a477f755}, author = {Maryame, N. and Najima, D. and Hasnae, R. and Rachida, A.} } @conference {ElIdrissi2020337, title = {Strategies of multi-step-ahead forecasting for blood glucose level using LSTM neural networks: A comparative study}, booktitle = {HEALTHINF 2020 - 13th International Conference on Health Informatics, Proceedings; Part of 13th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2020}, year = {2020}, note = {cited By 3}, pages = {337-344}, abstract = {Predicting the blood glucose level (BGL) is crucial for self-management of Diabetes. In general, a BGL prediction is done based on the previous measurements of BGL, which can be taken either (manually) by using sticks or (automatically) by using continuous glucose monitoring (CGM) devices. To allow the diabetic patients to take appropriate actions, the BGL predictions should be done ahead of time; thus a multi-step ahead prediction is suitable. Therefore, many Multi-Step-ahead Forecasting (MSF) strategies have been developed and evaluated, and can be categorized in five types: Recursive, Direct, MIMO (for Multiple Input Multiple Output), DirMO (combining Direct and MIMO) and DirRec (combining Direct and Recursive). However, none of them is known to be the best strategy in all contexts. The present study aims at: 1) reviewing the MSF strategies, and 2) determining the best strategy to fit with a LSTM Neural Network model. Hence, we evaluated and compared in terms of two performance criteria: Root-Mean-Square Error (RMSE) and Mean Absolute Error (MAE), the five MSF strategies using a LSTM Neural Network with an horizon of 30 minutes. The results show that there is no strategy that significantly outperformed others when using the Wilcoxon statistical test. However, when using the Sum Ranking Differences method, MIMO is the best strategy for both RMSE and MAE criteria. {\textcopyright} 2020 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, keywords = {Biomedical engineering, Blood, Blood glucose level, Comparative studies, Continuous glucosemonitoring (CGM), Forecasting, Glucose, Long short-term memory, Mean absolute error, Mean square error, Medical informatics, MIMO systems, Multi-step-ahead predictions, Neural network model, Performance criterion, Root mean square errors}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85083722214\&partnerID=40\&md5=bd9e45a8538559492b02432e5567d10e}, author = {El Idrissi, T. and Idri, A. and Kadi, I. and Bakkoury, Z.} } @article {Idrissi2020, title = {A systematic literature review of sparsity issues in recommender systems}, journal = {Social Network Analysis and Mining}, volume = {10}, number = {1}, year = {2020}, note = {cited By 36}, abstract = {The tremendous expansion of information available on the web voraciously bombards users, leaving them unable to make decisions and having no way of stepping back to process it all. Recommender systems have emerged in this context as a solution to assist users by providing them with choices of appropriate and relevant items according to their preferences and interests. However, despite their success in many fields and application domains, they still suffer from the main limitation, known as the sparsity problem. The latter refers to the situation where insufficient transactional and feedback data are available for inferring specific user{\textquoteright}s similarities, which affects the accuracy and performance of the recommender system. This paper provides a systematic literature review to investigate, analyze, and discuss the existing relevant contributions and efforts that use new concepts and tools to alleviate the sparsity issues. We have investigated the contributed similarity measures and have uncovered proposed approaches in different types of recommender systems. We have also identified the types of side information more commonly employed by recommender systems. Furthermore, we have examined the criteria that should be valued to enhance recommendation accuracy on sparse data. Each selected article was evaluated for its ability to mitigate the sparsity impediment. Our findings emphasize and accentuate the importance of sparsity in recommender systems and provide researchers and practitioners with insights on proposed solutions and their limitations, which contributes to the development of more powerful systems that can significantly solve the sparsity hurdle and thus enhance further the accuracy and efficiency of recommendations. {\textcopyright} 2020, Springer-Verlag GmbH Austria, part of Springer Nature.}, keywords = {Collaborative filtering, Powerful systems, Recommendation accuracy, Recommender Systems, Side information, Similarity measure, Sparsity, Sparsity problems, Stepping back, Systematic literature review}, doi = {10.1007/s13278-020-0626-2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85079359447\&doi=10.1007\%2fs13278-020-0626-2\&partnerID=40\&md5=742624a91b29d333d839a4cc18b46ced}, author = {Idrissi, N. and Zellou, A.} } @conference {Illi2019, title = {On the Secrecy Performance of Mixed RF/UOW Communication System}, booktitle = {2018 IEEE Globecom Workshops, GC Wkshps 2018 - Proceedings}, year = {2019}, note = {cited By 1}, doi = {10.1109/GLOCOMW.2018.8644314}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85055381999\&doi=10.1109\%2fGLOCOMW.2018.8644314\&partnerID=40\&md5=fc4e23b9414d6feaac033c613bdfb08f}, author = {Illi, E. and Bouanani, F.E. and Da Costa, D.B. and Ayoub, F. and Dias, U.S.} } @conference {Bekkali2019, title = {Securing the Internet of Things (IoT)}, booktitle = {Proceedings - 2018 International Conference on Wireless Networks and Mobile Communications, WINCOM 2018}, year = {2019}, note = {cited By 0}, doi = {10.1109/WINCOM.2018.8629652}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062838771\&doi=10.1109\%2fWINCOM.2018.8629652\&partnerID=40\&md5=384b7ebf423613c054b0ec7d89c21c6a}, author = {Bekkali, A.E. and Boulmalf, M. and Essaaidi, M. and Mezzour, G.} } @conference {Afia2019512, title = {A Self Controlled Simulated Annealing Algorithm using Hidden Markov Model State Classification}, booktitle = {Procedia Computer Science}, volume = {148}, year = {2019}, note = {cited By 0}, pages = {512-521}, doi = {10.1016/j.procs.2019.01.024}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062665945\&doi=10.1016\%2fj.procs.2019.01.024\&partnerID=40\&md5=7a6b9cd9dfff11052107df70b4b828f0}, author = {Afia, A.E. and Lalaoui, M. and Chiheb, R.} } @article {Hayat20191040, title = {A signaling game-based approach for Data-as-a-Service provisioning in IoT-Cloud}, journal = {Future Generation Computer Systems}, volume = {92}, year = {2019}, note = {cited By 1}, pages = {1040-1050}, doi = {10.1016/j.future.2017.10.001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85034971596\&doi=10.1016\%2fj.future.2017.10.001\&partnerID=40\&md5=da16debd38f36b3509fc36e9edb8e561}, author = {Hayat, R. and Sabir, E. and Badidi, E. and Elkoutbi, M.} } @article {Chabibi201917, title = {SimulML: A DSML for simulating SysML models}, journal = {Journal of Computing Science and Engineering}, volume = {13}, number = {1}, year = {2019}, note = {cited By 0}, pages = {17-31}, doi = {10.5626/JCSE.2019.13.1.17}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85064554918\&doi=10.5626\%2fJCSE.2019.13.1.17\&partnerID=40\&md5=9335bd1dbb7ad1c561bf7e9b03c66c37}, author = {Chabibi, B. and Nassar, M. and Anwar, A.} } @article {Nassif2019, title = {Software development effort estimation using regression fuzzy models}, journal = {Computational Intelligence and Neuroscience}, volume = {2019}, year = {2019}, note = {cited By 0}, doi = {10.1155/2019/8367214}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85062599935\&doi=10.1155\%2f2019\%2f8367214\&partnerID=40\&md5=efd8130615f3d9857ff368174c7a2db1}, author = {Nassif, A.B. and Azzeh, M. and Idri, A. and Abran, A.} } @conference {Nassit2019, title = {Structures Simulation of Curved Sensor based on PVDF for Fetal Heart Rate Monitoring}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, volume = {2018-November}, year = {2019}, note = {cited By 0}, doi = {10.1109/AICCSA.2018.8612800}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061916848\&doi=10.1109\%2fAICCSA.2018.8612800\&partnerID=40\&md5=d8b688fb052cf638abff3337dfb73790}, author = {Nassit, M. and Berbia, H.} } @article {ElHamlaoui2019167, title = {Support cloud SLA establishment using MDE}, journal = {Lecture Notes in Networks and Systems}, volume = {49}, year = {2019}, note = {cited By 0}, pages = {167-184}, doi = {10.1007/978-3-319-97719-5_12}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85063299209\&doi=10.1007\%2f978-3-319-97719-5_12\&partnerID=40\&md5=78747c9999533ac370999a8301a4f99f}, author = {El Hamlaoui, M. and Fissaa, T. and Laghouaouta, Y. and Nassar, M.} } @article {Benhar2019, title = {A Systematic Mapping Study of Data Preparation in Heart Disease Knowledge Discovery}, journal = {Journal of Medical Systems}, volume = {43}, number = {1}, year = {2019}, note = {cited By 0}, doi = {10.1007/s10916-018-1134-z}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058606352\&doi=10.1007\%2fs10916-018-1134-z\&partnerID=40\&md5=f92d6f6b431ad7798a78fb05c7a5624d}, author = {Benhar, H. and Idri, A. and Fernandez-Aleman, J.L.} } @conference {Filali2018, title = {SDN Controller Assignment and Load Balancing with Minimum Quota of Processing Capacity}, booktitle = {IEEE International Conference on Communications}, volume = {2018-May}, year = {2018}, doi = {10.1109/ICC.2018.8422750}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051428081\&doi=10.1109\%2fICC.2018.8422750\&partnerID=40\&md5=950211c49ab90c21d84d57b5ecf8c58f}, author = {Filali, A. and Kobbane, A. and Elmachkour, M. and Cherkaoui, S.} } @conference {Bouabdellah201870, title = {Secrecy outage performance for dual-hop underlay cognitive radio system over nakagami-m fading}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, pages = {70-75}, doi = {10.1145/3289100.3289112}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058649293\&doi=10.1145\%2f3289100.3289112\&partnerID=40\&md5=cbb8800324a876dc6cd5477d40de937c}, author = {Bouabdellah, M. and Bouanani, F.E. and Benazza, H.} } @conference {Bouabdellah20181, title = {Secrecy outage probability in cognitive radio networks subject to Rayleigh fading channels}, booktitle = {Proceedings - 2018 International Conference on Advanced Communication Technologies and Networking, CommNet 2018}, year = {2018}, pages = {1-5}, doi = {10.1109/COMMNET.2018.8360281}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048325751\&doi=10.1109\%2fCOMMNET.2018.8360281\&partnerID=40\&md5=0e696334d57d007731bf272268a1e1fe}, author = {Bouabdellah, M. and El Bouanani, F. and Ben-Azza, H.} } @conference {Naji20181, title = {A secure virtualization architecture based on a nested Nova hypervisor}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-7}, doi = {10.1109/CloudTech.2017.8284737}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046642436\&doi=10.1109\%2fCloudTech.2017.8284737\&partnerID=40\&md5=1cfbc9ea2bde9c6ea073f19601649c07}, author = {Naji, H.Z. and Zbakh, M.} } @conference {Amraoui20181, title = {Security \& cooperation mechanisms over mobile ad hoc networks: A survey and challenges}, booktitle = {Proceedings of 2017 International Conference on Electrical and Information Technologies, ICEIT 2017}, volume = {2018-January}, year = {2018}, pages = {1-6}, doi = {10.1109/EITech.2017.8255313}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047364198\&doi=10.1109\%2fEITech.2017.8255313\&partnerID=40\&md5=16f5590d7460c7a1606e951c65b604b4}, author = {Amraoui, H. and Habbani, A. and Hajami, A. and Bilal, E.} } @book {Maarof2018105, title = {Security in the internet of things}, series = {Security and Privacy in Smart Sensor Networks}, year = {2018}, pages = {105-121}, doi = {10.4018/978-1-5225-5736-4.ch006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85049817262\&doi=10.4018\%2f978-1-5225-5736-4.ch006\&partnerID=40\&md5=80e4b7c3b0310d29dc82712e2dc2e6bc}, author = {Maarof, A. and Senhadji, M. and Labbi, Z. and Belkasmi, M.} } @conference {Lalaoui20181, title = {A self-adaptive very fast simulated annealing based on Hidden Markov model}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-8}, doi = {10.1109/CloudTech.2017.8284698}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046690728\&doi=10.1109\%2fCloudTech.2017.8284698\&partnerID=40\&md5=019d60ddd6cdf20019791974755a6d33}, author = {Lalaoui, M. and El Afia, A. and Chiheb, R.} } @article {Lalaoui2018291, title = {A self-tuned simulated annealing algorithm using hidden markov model}, journal = {International Journal of Electrical and Computer Engineering}, volume = {8}, number = {1}, year = {2018}, pages = {291-298}, doi = {10.11591/ijece.v8i1.pp291-298}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85042923643\&doi=10.11591\%2fijece.v8i1.pp291-298\&partnerID=40\&md5=804e27501baca7ca4efeeaa3d1ff0ef1}, author = {Lalaoui, M. and El Afia, A. and Chiheb, R.} } @article {Lalaoui2018291, title = {A self-tuned simulated annealing algorithm using hidden markov model}, journal = {International Journal of Electrical and Computer Engineering}, volume = {8}, number = {1}, year = {2018}, note = {cited By 0}, pages = {291-298}, abstract = {Simulated Annealing algorithm (SA) is a well-known probabilistic heuristic. It mimics the annealing process in metallurgy to approximate the global minimum of an optimization problem. The SA has many parameters which need to be tuned manually when applied to a specific problem. The tuning may be difficult and time-consuming. This paper aims to overcome this difficulty by using a self-tuning approach based on a machine learning algorithm called Hidden Markov Model (HMM). The main idea is allowing the SA to adapt his own cooling law at each iteration, according to the search history. An experiment was performed on many benchmark functions to show the efficiency of this approach compared to the classical one. {\textcopyright} 2018 Institute of Advanced Engineering and Science.}, doi = {10.11591/ijece.v8i1.pp291-298}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85042923643\&doi=10.11591\%2fijece.v8i1.pp291-298\&partnerID=40\&md5=804e27501baca7ca4efeeaa3d1ff0ef1}, author = {Lalaoui, M. and El Afia, A. and Chiheb, R.} } @article {Boudad20182479, title = {Sentiment analysis in Arabic: A review of the literature}, journal = {Ain Shams Engineering Journal}, volume = {9}, number = {4}, year = {2018}, pages = {2479-2490}, doi = {10.1016/j.asej.2017.04.007}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85025446495\&doi=10.1016\%2fj.asej.2017.04.007\&partnerID=40\&md5=4c3f2d43d536d6eec5f42878492ea75c}, author = {Boudad, N. and Faizi, R. and Oulad Haj Thami, R. and Chiheb, R.} } @conference {Mabrouk2018495, title = {Signaling game-based approach to improve security in vehicular networks}, booktitle = {VEHITS 2018 - Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems}, volume = {2018-March}, year = {2018}, pages = {495-500}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85051947337\&partnerID=40\&md5=fd17d3ff35b56253285bf7d433abcfa8}, author = {Mabrouk, A. and Kobbane, A. and El Koutbi, M.} } @article {Niharmine20181174, title = {Simulated annealing decoder for linear block codes}, journal = {Journal of Computer Science}, volume = {14}, number = {8}, year = {2018}, pages = {1174-1189}, doi = {10.3844/jcssp.2018.1174.1189}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052851664\&doi=10.3844\%2fjcssp.2018.1174.1189\&partnerID=40\&md5=fe2215ebe454f68d001cef85f5f26095}, author = {Niharmine, L. and Bouzkraoui, H. and Azouaoui, A. and Hadi, Y.} } @conference {ElHilali2018, title = {Smart companies: How to reach sustainability during a digital transformation}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3286606.3286812}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059910187\&doi=10.1145\%2f3286606.3286812\&partnerID=40\&md5=ff10f75c6ceb0a068fd7069eec7d6a49}, author = {El Hilali, W. and El Manouar, A.} } @article {Bouzkraoui20183994, title = {Soft decision decoding of linear block codes using memetic algorithms}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {96}, number = {13}, year = {2018}, pages = {3994-4003}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050164403\&partnerID=40\&md5=a229b49e1f514877e8d3bf865c806ede}, author = {Bouzkraoui, H. and Azouaoui, A. and Hadi, Y. and Niharmine, L.} } @article {Sayagh2018, title = {Software Configuration Engineering in Practice: Interviews, Survey, and Systematic Literature Review}, journal = {IEEE Transactions on Software Engineering}, year = {2018}, doi = {10.1109/TSE.2018.2867847}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85052624554\&doi=10.1109\%2fTSE.2018.2867847\&partnerID=40\&md5=f1b2d51b59522e24e5c52f064a62d00b}, author = {Sayagh, M. and Kerzazi, N. and Adams, B. and Petrillo, F.} } @article {Bajta2018690, title = {Software project management approaches for global software development: A systematic mapping study}, journal = {Tsinghua Science and Technology}, volume = {23}, number = {6}, year = {2018}, pages = {690-714}, doi = {10.26599/TST.2018.9010029}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85055661732\&doi=10.26599\%2fTST.2018.9010029\&partnerID=40\&md5=7601769b8094dafca96fea06d11fd3db}, author = {Bajta, M.E. and Idri, A. and Ros, J.N. and Fernandez-Aleman, J.L. and de Gea, J.M.C. and Garc{\'\i}a, F. and Toval, A.} } @conference {ElAmrani20181, title = {Solving the multi-capacitated location problem using a Lagrangian relaxation approach}, booktitle = {Proceedings - GOL 2018: 4th IEEE International Conference on Logistics Operations Management}, year = {2018}, pages = {1-5}, doi = {10.1109/GOL.2018.8378083}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050006113\&doi=10.1109\%2fGOL.2018.8378083\&partnerID=40\&md5=a6806947bd9a072c9afab65cb312d06a}, author = {El Amrani, M. and Benadada, Y.} } @article {Angeler2018, title = {Sonifying social-ecological change: A wetland laments agricultural transformation}, journal = {Ecology and Society}, volume = {23}, number = {2}, year = {2018}, doi = {10.5751/ES-10055-230220}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85049607952\&doi=10.5751\%2fES-10055-230220\&partnerID=40\&md5=d13c737c6c7af34594b114006ad1b2a5}, author = {Angeler, D.G. and Alvarez-Cobelas, M. and S{\'a}nchez-Carrillo, S.} } @article {Emerson20181, title = {Soul of the City: The Depth of How "urban" Matters in the Sociology of Religion}, journal = {Sociology of Religion: A Quarterly Review}, volume = {79}, number = {1}, year = {2018}, pages = {1-19}, doi = {10.1093/socrel/srx056}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85043334602\&doi=10.1093\%2fsocrel\%2fsrx056\&partnerID=40\&md5=235227dab6bb6e508b6dc1ad75941175}, author = {Emerson, M.O. and Johnson, L.M.K.} } @conference {Abdellaoui2018, title = {Spatial relation expiration time to select multipoint relays in smart city environments}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3286606.3286829}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059884352\&doi=10.1145\%2f3286606.3286829\&partnerID=40\&md5=061c6da5dd438054e59828b195e9a9c5}, author = {Abdellaoui, A. and Elmhamdi, J. and Berradi, H.} } @conference {ElKarfi201859, title = {A spectral clustering-based approach for sentiment classification in modern standard Arabic}, booktitle = {MCCSIS 2018 - Multi Conference on Computer Science and Information Systems; Proceedings of the International Conferences on Big Data Analytics, Data Mining and Computational Intelligence 2018, Theory and Practice in Modern Computing 2018 and Connected Sma}, year = {2018}, pages = {59-65}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85054167622\&partnerID=40\&md5=101982324dd788664f052d2919012106}, author = {El Karfi, I. and El Fkihi, S. and Faizi, R.} } @conference {Nanfack2018, title = {Squeeze-SegNet: A new fast deep convolutional neural network for semantic segmentation}, booktitle = {Proceedings of SPIE - The International Society for Optical Engineering}, volume = {10696}, year = {2018}, doi = {10.1117/12.2309497}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046457923\&doi=10.1117\%2f12.2309497\&partnerID=40\&md5=51466985a41e4eb9b1925e8f1849709c}, author = {Nanfack, G. and Elhassouny, A. and Oulad Haj Thami, R.} } @article {Elhozmari2018211, title = {Straightforward MAAS to ensure interoperability in heterogeneous environment}, journal = {Advances in Intelligent Systems and Computing}, volume = {735}, year = {2018}, pages = {211-220}, doi = {10.1007/978-3-319-76354-5_19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85044063846\&doi=10.1007\%2f978-3-319-76354-5_19\&partnerID=40\&md5=4a2d97920bb38e7b2a5bef865c1aeb78}, author = {Elhozmari, M. and Ettalbi, A.} } @article {Idri2018, title = {Support vector regression-based imputation in analogy-based software development effort estimation}, journal = {Journal of Software: Evolution and Process}, volume = {30}, number = {12}, year = {2018}, doi = {10.1002/smr.2114}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058493764\&doi=10.1002\%2fsmr.2114\&partnerID=40\&md5=09059bd4e9087fda5b7225f1c8aeea9d}, author = {Idri, A. and Abnane, I. and Abran, A.} } @conference {Elkoubaiti2018334, title = {A Survey of Pedagogical Affordances of Augmented and Virtual Realities Technologies in loT - Based Classroom}, booktitle = {Colloquium in Information Science and Technology, CIST}, volume = {2018-October}, year = {2018}, pages = {334-341}, doi = {10.1109/CIST.2018.8596654}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85061437372\&doi=10.1109\%2fCIST.2018.8596654\&partnerID=40\&md5=318781b672e82f7d6939fb6b8b4f6dc4}, author = {Elkoubaiti, H. and Mrabet, R.} } @article {Chadli2018408, title = {A survey on the impact of risk factors and mitigation strategies in global software development}, journal = {Advances in Intelligent Systems and Computing}, volume = {746}, year = {2018}, pages = {408-417}, doi = {10.1007/978-3-319-77712-2_39}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045296980\&doi=10.1007\%2f978-3-319-77712-2_39\&partnerID=40\&md5=9b40aafda48fa8eff4f79973caf81f38}, author = {Chadli, S.Y. and Idri, A.} } @conference {Mannane20181, title = {Survey: Risk assessment models for cloud computing: Evaluation criteria}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-5}, doi = {10.1109/CloudTech.2017.8284712}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046637347\&doi=10.1109\%2fCloudTech.2017.8284712\&partnerID=40\&md5=cf795cd6320ca19385451ed39a5973b6}, author = {Mannane, N. and Bencharhi, Y. and Boulafdour, B. and Regragui, B.} } @article {Ouhbi2018, title = {Sustainability requirements for connected health applications}, journal = {Journal of Software: Evolution and Process}, volume = {30}, number = {7}, year = {2018}, doi = {10.1002/smr.1922}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050354987\&doi=10.1002\%2fsmr.1922\&partnerID=40\&md5=70c90bb949fb18d52004aec275734df0}, author = {Ouhbi, S. and Fernandez-Aleman, J.L. and Toval, A. and Rivera~Pozo, J. and Idri, A.} } @book {Thatcher201823, title = {A sustainable system-of-systems approach: Identifying the important boundaries for a target system in human factors and ergonomics}, series = {Ergonomics and Human Factors for a Sustainable Future: Current Research and Future Possibilities}, year = {2018}, pages = {23-45}, doi = {10.1007/978-981-10-8072-2_2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85060697281\&doi=10.1007\%2f978-981-10-8072-2_2\&partnerID=40\&md5=63490266dc439c499fbf5cabf61c204f}, author = {Thatcher, A. and Yeow, P.H.} } @conference {Idri2018, title = {A systematic map of data analytics in breast cancer}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3167918.3167930}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85044739616\&doi=10.1145\%2f3167918.3167930\&partnerID=40\&md5=4cfbf5c917bfa294988a996c72ff2234}, author = {Idri, A. and Chlioui, I. and El Ouassif, B.} } @article {Idri201869, title = {A systematic map of medical data preprocessing in knowledge discovery}, journal = {Computer Methods and Programs in Biomedicine}, volume = {162}, year = {2018}, pages = {69-85}, doi = {10.1016/j.cmpb.2018.05.007}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046706780\&doi=10.1016\%2fj.cmpb.2018.05.007\&partnerID=40\&md5=30324a8f7b2702347d51c7c56b55b294}, author = {Idri, A. and Benhar, H. and Fernandez-Aleman, J.L. and Kadi, I.} } @article {Moumane201858, title = {A systematic map of mobile software usability evaluation}, journal = {Advances in Intelligent Systems and Computing}, volume = {746}, year = {2018}, pages = {58-67}, doi = {10.1007/978-3-319-77712-2_6}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85045321817\&doi=10.1007\%2f978-3-319-77712-2_6\&partnerID=40\&md5=c77c64a151faac6ec168b3914e6eb0dc}, author = {Moumane, K. and Idri, A.} } @conference {Fezeu2017, title = {Safe and irrefutable decentralized communication: Bringing non-repudiation to mesh networks}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {Securing digital communications is a major preoccupation for industry and academia, and a great number of techniques have been successfully developed to achieve that goal. The predominant model for digital communication is that which relies on trusted third-parties, either as local servers or as cloud services. Meanwhile, emerging technologies such as internet-of-things are set to broadcast growing amounts of potentially sensitive information thereby making centralized architectures problematic for privacy and performance reasons and making decentralized networks ever more relevant. However, these third-parties play an important role in securing brokered communications and are essential in providing Authentication and Non-Repudiation according to current models. Clearly, such an approach cannot be used in peer-to-peer networks and there is need for a simple model applicable in fully decentralized networks to provide Non-Repudiation. This document proposes such a model, presents an implementation and discusses its application, particularly pertaining to implementing irrefutable trustless transaction mechanisms - similar to blockchain - in the realm of limited resources. {\textcopyright} 2017 Copyright is held by the owner/author(s). Publication rights licensed to ACM.}, doi = {10.1145/3090354.3090392}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028463840\&doi=10.1145\%2f3090354.3090392\&partnerID=40\&md5=00d345b203cd99bd20f6b7401577a263}, author = {Fezeu, H.K. and Djotio, T. and Thami, R.O.H.} } @conference {Faizi20171760, title = {Screening job candidates via social media: Opportunities and pitfalls}, booktitle = {Proceedings of the 29th International Business Information Management Association Conference - Education Excellence and Innovation Management through Vision 2020: From Regional Development Sustainability to Global Economic Growth}, year = {2017}, note = {cited By 0}, pages = {1760-1765}, abstract = {Many businesses have undergone significant changes over the past decade due to the exponential growth of social media. These technologies have not only altered how professionals and businesses operate but also the way they get engaged with target groups. With millions of job seekers being tech-savvy, recruiters are heavily using social media to screen job candidates. Whether seeking a job or hunting for candidates, these online networks seem to be the ideal venue. Therefore, our objective in this paper is to examine the opportunities and pitfalls of using social media in the recruitment process. In this respect, it was found out that these online platforms enable human resources managers to have access to a large and diverse pool of qualified prospective employees at a lower cost, and to get connected with passive candidates. Social media also provide recruiters with an opportunity to get greater insight into an applicant{\textquoteright}s real abilities and competences as well as to view aspects of his personality. Nevertheless, using these platforms in the hiring process usually inundates employers with huge amounts of data that is often difficult to analyze. Moreover, being limited to the information available on social media runs the risk of excluding skilled candidates or hiring under qualified employees. Finally, accessing sensitive information on a job candidate{\textquoteright}s social media profile could be viewed as an invasion of privacy. Despite all these pitfalls, we strongly believe that social media represent a significant component of the hiring process that will give businesses a competitive advantage.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85029761283\&partnerID=40\&md5=099a91a3a97bbda87b2b604b24ae305c}, author = {Faizi, R.} } @conference {Bouabdellah2017, title = {A secure cooperative transmission model in VANET using attribute based encryption}, booktitle = {2016 International Conference on Advanced Communication Systems and Information Security, ACOSIS 2016 - Proceedings}, year = {2017}, note = {cited By 1}, abstract = {Cooperative transmission in vehicular ad-hoc networks (VANET) seems to be an efficient solution when no direct transmission between the source and the destination is possible. However, secure reception of the message at the destination through not necessarily honest relays remains a crucial problem to solve in VANET. In this paper, we propose a trust cooperative transmission protocol for multiple-hops broadcast in VANET which selects among all relays only the best ones minimizing a function of finite number of metrics. Our proposed protocol uses cryptography to ensure a confidential communication between the source and the destination. As the vehicle broadcast the safety message thus, the primitive of cryptography which can be used is Ciphertext-policy attribute based encryption (CP-ABE), because this primitive provides an encrypted access control mechanism for broadcasting messages. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ACOSIS.2016.7843940}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85015190363\&doi=10.1109\%2fACOSIS.2016.7843940\&partnerID=40\&md5=8080247d3ffdd9caadd219b38b216bae}, author = {Bouabdellah, M. and El Bouanani, F. and Ben-Azza, H.} } @conference {Bensitel20171, title = {Secure data storage in the cloud with homomorphic encryption}, booktitle = {Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016}, year = {2017}, note = {cited By 0}, pages = {1-6}, abstract = {The adoption of cloud computing is accelerating among health care providers, as they realize the limitations of traditional systems of computerized medical file. Many obstacles must be overcome, however, with regard to respect for privacy and patient safety. In order to ensure the respect for privacy, an encryption of data is required. An encryption that allows to compute over encrypted data without having to decrypt. In this paper we focus on cloud computing and its adoption in different domain, we describe the role of homomorphic encryption scheme for preserving privacy data sharing in the cloud and propose a system that ensures confidentiality of data by using partial homomorphic encryption algorithms. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CloudTech.2016.7847680}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013782447\&doi=10.1109\%2fCloudTech.2016.7847680\&partnerID=40\&md5=041a6f63be066f6469ebdd53e8351cce}, author = {Bensitel, Y. and Romadi, R.} } @conference {Alaoui2017114, title = {Semantic approach for the building of user profile for recommender system}, booktitle = {Proceedings - 2016 Global Summit on Computer and Information Technology, GSCIT 2016}, year = {2017}, note = {cited By 0}, pages = {114-119}, abstract = {The major problem in the use of the Web is that of searching for relevant information that meets the expectations of a user. This problem increases every day and especially with the emergence of web 2.0 or social web. Our paper, therefore, ignores the disadvantage of social web and operates it to rich user profile. {\textcopyright} 2016 IEEE.}, doi = {10.1109/GSCIT.2016.27}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027454775\&doi=10.1109\%2fGSCIT.2016.27\&partnerID=40\&md5=3af5bd399eb70f7167e5ea8ae78eb4df}, author = {Alaoui, S. and Ajhoun, R. and El Bouzekri El Idrissi, Y.} } @article {Elmaroud2017, title = {Sensitivity analysis of FBMC-based multi-cellular networks to synchronization errors and HPA nonlinearities}, journal = {Eurasip Journal on Advances in Signal Processing}, volume = {2017}, number = {1}, year = {2017}, note = {cited By 0}, abstract = {In this paper, we study the performance of asynchronous and nonlinear FBMC-based multi-cellular networks. The considered system includes a reference mobile perfectly synchronized with its reference base station (BS) and K interfering BSs. Both synchronization errors and high-power amplifier (HPA) distortions will be considered and a theoretical analysis of the interference signal will be conducted. On the basis of this analysis, we will derive an accurate expression of signal-to-noise-plus-interference ratio (SINR) and bit error rate (BER) in the presence of a frequency-selective channel. In order to reduce the computational complexity of the BER expression, we applied an interesting lemma based on the moment generating function of the interference power. Finally, the proposed model is evaluated through computer simulations which show a high sensitivity of the asynchronous FBMC-based multi-cellular network to HPA nonlinear distortions. {\textcopyright} 2017, The Author(s).}, doi = {10.1186/s13634-016-0441-0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85008705000\&doi=10.1186\%2fs13634-016-0441-0\&partnerID=40\&md5=28ba324c5eee82072f7555fc9f1f6df0}, author = {Elmaroud, B.a and Faqihi, A.a b and Aboutajdine, D.a} } @article { ISI:000392177500001, title = {Sensitivity analysis of FBMC-based multi-cellular networks to synchronization errors and HPA nonlinearities}, journal = {EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING}, year = {2017}, month = {JAN 7}, abstract = {In this paper, we study the performance of asynchronous and nonlinear FBMC-based multi-cellular networks. The considered system includes a reference mobile perfectly synchronized with its reference base station (BS) and K interfering BSs. Both synchronization errors and high-power amplifier (HPA) distortions will be considered and a theoretical analysis of the interference signal will be conducted. On the basis of this analysis, we will derive an accurate expression of signal-to-noise-plus-interference ratio (SINR) and bit error rate (BER) in the presence of a frequency-selective channel. In order to reduce the computational complexity of the BER expression, we applied an interesting lemma based on the moment generating function of the interference power. Finally, the proposed model is evaluated through computer simulations which show a high sensitivity of the asynchronous FBMC-based multi-cellular network to HPA nonlinear distortions.}, issn = {1687-6180}, doi = {10.1186/s13634-016-0441-0}, author = {Elmaroud, Brahim and Faqihi, Ahmed and Aboutajdine, Driss} } @article {Elmaroud2017, title = {Sensitivity analysis of FBMC-based multi-cellular networks to synchronization errors and HPA nonlinearities}, journal = {Eurasip Journal on Advances in Signal Processing}, volume = {2017}, number = {1}, year = {2017}, note = {cited By 1}, abstract = {In this paper, we study the performance of asynchronous and nonlinear FBMC-based multi-cellular networks. The considered system includes a reference mobile perfectly synchronized with its reference base station (BS) and K interfering BSs. Both synchronization errors and high-power amplifier (HPA) distortions will be considered and a theoretical analysis of the interference signal will be conducted. On the basis of this analysis, we will derive an accurate expression of signal-to-noise-plus-interference ratio (SINR) and bit error rate (BER) in the presence of a frequency-selective channel. In order to reduce the computational complexity of the BER expression, we applied an interesting lemma based on the moment generating function of the interference power. Finally, the proposed model is evaluated through computer simulations which show a high sensitivity of the asynchronous FBMC-based multi-cellular network to HPA nonlinear distortions. {\textcopyright} 2017, The Author(s).}, doi = {10.1186/s13634-016-0441-0}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85008705000\&doi=10.1186\%2fs13634-016-0441-0\&partnerID=40\&md5=28ba324c5eee82072f7555fc9f1f6df0}, author = {Elmaroud, B. and Faqihi, A. and Aboutajdine, D.} } @article {12059907120170107, title = {Sensitivity analysis of FBMC-based multi-cellular networks to synchronization errors and HPA nonlinearities.}, journal = {EURASIP Journal on Advances in Signal Processing}, volume = {2017}, number = {1}, year = {2017}, pages = {1 - 10}, abstract = {In this paper, we study the performance of asynchronous and nonlinear FBMC-based multi-cellular networks. The considered system includes a reference mobile perfectly synchronized with its reference base station (BS) and K interfering BSs. Both synchronization errors and high-power amplifier (HPA) distortions will be considered and a theoretical analysis of the interference signal will be conducted. On the basis of this analysis, we will derive an accurate expression of signal-to-noise-plus-interference ratio (SINR) and bit error rate (BER) in the presence of a frequency-selective channel. In order to reduce the computational complexity of the BER expression, we applied an interesting lemma based on the moment generating function of the interference power. Finally, the proposed model is evaluated through computer simulations which show a high sensitivity of the asynchronous FBMC-based multi-cellular network to HPA nonlinear distortions. [ABSTRACT FROM AUTHOR]}, keywords = {Bit error rate, Cellular neural networks (Computer science), Filter bank multicarrier, HPA NLD, Multi-cellular networks, Signal-to-interference-plus-noise ratio, Synchronization errors}, issn = {16876172}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=120599071\&site=ehost-live}, author = {Elmaroud, Brahim and Faqihi, Ahmed and Aboutajdine, Driss} } @article {Boudad2017, title = {Sentiment analysis in Arabic: A review of the literature}, journal = {Ain Shams Engineering Journal}, year = {2017}, note = {cited By 0; Article in Press}, abstract = {Within the last couple of years, Sentiment Analysis in Arabic has gained a considerable interest from the research community. In this respect, the objective of this paper is to provide a review of the major works that have dealt with this research area in this language. A thorough investigation of the available literature revealed that the works were mainly concentrated on dealing with specific Sentiment Analysis tasks. To this end, they used three different approaches, namely supervised, unsupervised and hybrid. The results that these studies achieved are interesting but divergent. This divergence is relatively due to the type of approach opted for, the task that is being analysed as well as to the specificities and intricacies of the Arabic variety understudy. {\textcopyright} 2017 Ain Shams University.}, doi = {10.1016/j.asej.2017.04.007}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85025446495\&doi=10.1016\%2fj.asej.2017.04.007\&partnerID=40\&md5=4c3f2d43d536d6eec5f42878492ea75c}, author = {Boudad, N. and Faizi, R. and Oulad Haj Thami, R. and Chiheb, R.} } @article {Boudad2017233, title = {Sentiment classification of Arabic tweets: A supervised approach}, journal = {Journal of Mobile Multimedia}, volume = {13}, number = {3-4}, year = {2017}, note = {cited By 0}, pages = {233-243}, abstract = {Social media platforms have proven to be a powerful source of opinion sharing. Thus, mining and analyzing these opinions has an important role in decision-making and product benchmarking. However, the manual processing of the huge amount of content that these web-based applications host is an arduous task. This has led to the emergence of a new field of research known as Sentiment Analysis. In this respect, our objective in this work is to investigate sentiment classification in Arabic tweets using machine learning. Three classifiers namely Na{\"I}ve Bayes, Support Vector Machine and K-Nearest Neighbor were evaluated on an in-house developed dataset using different features. A comparison of these classifiers has revealed that Support Vector Machine outperforms others classifiers and achieves a 78\% accuracy rate. {\textcopyright} Rinton Press.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85040241035\&partnerID=40\&md5=76bc92b38d241173585a11bc74ae14d7}, author = {Boudad, N. and Faizi, R. and Thami, R.O.H. and Chiheb, R.} } @article {Hayat2017, title = {A signaling game-based approach for Data-as-a-Service provisioning in IoT-Cloud}, journal = {Future Generation Computer Systems}, year = {2017}, note = {cited By 0; Article in Press}, abstract = {The impressive progress in sensing technology over the last few years has contributed to the proliferation and popularity of the Internet of Things (IoT) paradigm and to the adoption of Sensor Clouds for provisioning smart ubiquitous services. Also, the massive amount of data generated by sensors and smart objects led to a new kind of services known as Data-as-a-Service (DaaS). The quality of these services is highly dependent on the quality of sensed data (QoD), which is characterized by a number of quality attributes. DaaS provisioning is typically governed by a Service Level Agreement (SLA) between data consumers and DaaS providers. In this work, we propose a game-based approach for DaaS Provisioning, which relies on signaling based model for the negotiation of several QoD attributes between DaaS providers and data consumers. We consider that these entities are adaptive, rational, and able to negotiate the QoD offering even in the case of incomplete information about the other party. We use in the negotiation between the two parties a Q-learning algorithm for the signaling model and a Multi Attributes Decision Making (MADM) model to select the best signal. Moreover, we empirically validate the MADM model using Shannon{\textquoteright}s entropy. The results obtained in the case of a multi-stages negotiation scenario show the convergence towards the pooling equilibrium. {\textcopyright} 2017.}, doi = {10.1016/j.future.2017.10.001}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85034971596\&doi=10.1016\%2fj.future.2017.10.001\&partnerID=40\&md5=da16debd38f36b3509fc36e9edb8e561}, author = {Hayat, R. and Sabir, E. and Badidi, E. and Elkoutbi, M.} } @conference {Talei20171, title = {Smart campus energy management system: Advantages, architectures, and the impact of using cloud computing}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F130526}, year = {2017}, note = {cited By 0}, pages = {1-7}, abstract = {A Microgrid is a subset of smart grid, a small-scale electrical system powered with renewable energy resources that can operate either in a connected or a disconnected mode to/from the main grid. Given that universities are very important electricity consumers, using an academic Microgrid will solve many problems regarding energy usage[1]. The purpose of this paper, is to describe Microgrid components with an emphasis on energy management (EMS). Given its vital role, the paper presents different architectures of an EMS and discusses how cloud computing can be incorporated to the Microgrid architecture to improve the EMS efficiency. The paper concludes with presenting results of EMS data collection using Kaa IoT platform. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3128128.3128129}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030324881\&doi=10.1145\%2f3128128.3128129\&partnerID=40\&md5=b3eb81f09422ad7caf4cf46665ae3eca}, author = {Talei, H. and Essaaidi, M. and Benhaddou, D.} } @conference {Hosni20171251, title = {Software effort estimation using classical analogy ensembles based on random subspace}, booktitle = {Proceedings of the ACM Symposium on Applied Computing}, volume = {Part F128005}, year = {2017}, note = {cited By 1}, pages = {1251-1258}, abstract = {Software effort estimation is one of the important and complex tasks in software project management. It influences almost all the process of software development such as: bidding, planning, and budgeting. Hence, estimating the software project effort in early stages of the software life cycle is considered the key of success of any project. To this goal, many techniques have been proposed to predict the effort required to develop a software system. Unfortunately, there is no consensus about the single best technique. Recently, Ensemble Effort Estimation has been investigated to estimate software effort and consists on generating the software effort by combining more than one solo estimation technique by means of a combination rule. In this paper, we have developed different homogeneous ensembles based on combination of Random Subspace method and Classical Analogy technique using two linear rules over seven datasets. The results confirm that the Random Space ensembles outperform the solo Classical Analogy regardless of the dataset used and that the median rule generates better estimation than the average one. {\textcopyright} 2017 ACM.}, doi = {10.1145/3019612.3019784}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020917571\&doi=10.1145\%2f3019612.3019784\&partnerID=40\&md5=8b1b6f9ac3cb26187929f17a78dd5669}, author = {Hosni, M. and Idri, A.} } @conference {Harraz2017230, title = {Study of an adaptive approach for a Cloud system implementation}, booktitle = {Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016}, year = {2017}, note = {cited By 0}, pages = {230-236}, abstract = {In the few recent years a new paradigm has emerged, with the onward steps that revolutionized the internet and the machines interconnected over it. This has lead the modern technological world to be considered as a virtual sphere interconnecting things using internet, being called the Cloud Computing where any object can communicate with any other object using a network such as the internet. The Cloud Computing makes it possible for end users to profit from the high speed and high performance of remote machines, and deploys a business where internet providers can implement distributed resources and services based on modern technologies to address the needs of the end users. In such paradigm, all components should work in a fashion to provide the best response time possible, one way of doing that is through load balancing algorithms. In this paper we propose a cloud load balancing algorithm that relates to the stochastic and random behavior of any networking system, we show as a result that we can achieve a game theoretic load balancing policy based on the samples of the load in time. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CloudTech.2016.7847704}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013764269\&doi=10.1109\%2fCloudTech.2016.7847704\&partnerID=40\&md5=34d05b50f0f8af7eb7ee1964533a0ebd}, author = {Harraz, A. and Bissiriou, C. and Cherkaoui, R. and Zbakh, M.} } @conference {ElMahdi2017220, title = {Study of security in MANETs and evaluation of network performance using ETX metric}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F130526}, year = {2017}, note = {cited By 0}, pages = {220-228}, abstract = {Today, we witness the emergence of smart environments, where devices are able to connect independently without human-intervention. Mobile ad hoc networks are an example of smart environments that are widely deployed in public spaces. They offer great services and features compared with wired systems. However, these networks are more sensitive to malicious attacks because of the lack of infrastructure and the self-organizing nature of devices. Thus, communication between nodes is much more exposed to various security risks, than other networks. In this paper, we will present a synthetic study on security concept for MANETs, and then we will introduce a contribution based on evaluating link quality, using ETX metric, to enhance network availability. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3128128.3128162}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030328629\&doi=10.1145\%2f3128128.3128162\&partnerID=40\&md5=07c3afc88f0628598193c141135dba27}, author = {El Mahdi, F. and Habbani, A. and Mouchfiq, N. and Essaid, B.} } @conference {ElAfia2017, title = {Supervised learning in branch-and-cut strategies}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F129474}, year = {2017}, note = {cited By 0}, abstract = {Branch-and-Cut is a powerful algorithm used for solving MILP problems. It involves two main sub-algorithms: branch-and-bound and cutting plane. On the one hand, the branch-and-bound algorithm comprises two strategies that are node selection strategy and branching strategy. These two strategies in literature don{\textquoteright}t exploit information of each other,and variable branching strategy tryto find compromise between minimizing the number of processed nodes and minimizing solving time. On the other hand, cutting plane algorithmallow tightening bounds and reducing the number of processing nodes. Whereas the learning literature has been focused in dealing with just one strategy on the same time, we design a two-in-one strategy of branch-and-bound algorithm regarding the fact thatare intuitively dependent. In this perspective, we apply the well-known Support Vector Machine (SVM)algorithm to the well-known set of problems MIPLIB to learn the mentioned strategy that can be used to speed up the basic branch-and-bound algorithm. We use also cutting plane to speed up the algorithm. {\textcopyright} 2017 Association for Computing Machinery.}, doi = {10.1145/3090354.3090474}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028470798\&doi=10.1145\%2f3090354.3090474\&partnerID=40\&md5=bf88dbeb883a772c23ba54d4a017ef96}, author = {El Afia, A. and Kabbaj, M.M.} } @conference {Idri2017, title = {A survey of secondary studies in software process improvement}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, year = {2017}, note = {cited By 0}, abstract = {Software Process Improvement (SPI) has become one of the main strategic objectives in software industry. Companies make more investments in implementing software quality standards and models that focus on process assessment to improve their performance and productivity. To achieve these goals, companies focus on improving their process by means of improvement initiatives which may be implemented. To help practitioners find more innovative ways to manage and implement software process improvement initiatives efficiently, an important number of studies related to this topic have been emerged in recent years. Some of them, referred to as secondary studies, focused on the interpretation and synthesis of available published research works by giving an up to date state of art about SPI. This state of the art is provided in a form of literature surveys or in a methodological form using well established approaches such as systematic reviews or systematic mappings or tertiary studies. The objective of this paper is to identify and present the current secondary studies on SPI. The purpose is to discuss methods that these literature reviews of SPI use, their quality, and specific subjects that they cover. A set of survey research questions have been proposed and discussed through the investigation of 70 selected secondary studies collected from different digital libraries. The results show that success factors and issues related to implementation of SPI initiatives are the most studied, and there is a need to address in depth the measurement aspects in SPI. {\textcopyright} 2016 IEEE.}, doi = {10.1109/AICCSA.2016.7945655}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85021871351\&doi=10.1109\%2fAICCSA.2016.7945655\&partnerID=40\&md5=e6b8548942846520db1fe2f2d41c4ecc}, author = {Idri, A. and Cheikhi, L.} } @conference {Aitfares2017113, title = {Suspicious behavior detection of people by monitoring camera}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {113-117}, abstract = {The analytic video is a very challenging area of research in computer vision. Ensure a high level of security in a public space monitored by a surveillance camera is a difficult task in recent years. Understanding people behaviors in real time allows the surveillance systems to analyze unusual events through the video frames. In this paper, we propose a new approach for detecting suspicious behavior of moving people. We are not interested in a simple motion detection of a moving object, but we analyze the trajectory of this latter; relying on the object motion vector. Once a suspicious behavior suddenly occurs in this trajectory, we segment and track this object during its motion within the camera{\textquoteright}s field of view. Experiments with real-world images validate the efficiency of the proposed approach. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905601}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019074005\&doi=10.1109\%2fICMCS.2016.7905601\&partnerID=40\&md5=72fbf7b2e7ea117ae6bf2217a9fdc658}, author = {Aitfares, W. and Kobbane, A. and Kriouile, A.} } @article {Sardi201731, title = {A systematic review of gamification in e-Health}, journal = {Journal of Biomedical Informatics}, volume = {71}, year = {2017}, note = {cited By 5}, pages = {31-48}, abstract = {Gamification is a relatively new trend that focuses on applying game mechanics to non-game contexts in order to engage audiences and to inject a little fun into mundane activities besides generating motivational and cognitive benefits. While many fields such as Business, Marketing and e-Learning have taken advantage of the potential of gamification, the digital healthcare domain has also started to exploit this emerging trend. This paper aims to summarize the current knowledge regarding gamified e-Health applications. A systematic literature review was therefore conducted to explore the various gamification strategies employed in e-Health and to address the benefits and the pitfalls of this emerging discipline. A total of 46 studies from multiple sources were then considered and thoroughly investigated. The results show that the majority of the papers selected reported gamification and serious gaming in health and wellness contexts related specifically to chronic disease rehabilitation, physical activity and mental health. Although gamification in e-Health has attracted a great deal of attention during the last few years, there is still a dearth of valid empirical evidence in this field. Moreover, most of the e-Health applications and serious games investigated have been proven to yield solely short-term engagement through extrinsic rewards. For gamification to reach its full potential, it is therefore necessary to build e-Health solutions on well-founded theories that exploit the core experience and psychological effects of game mechanics. {\textcopyright} 2017 Elsevier Inc.}, doi = {10.1016/j.jbi.2017.05.011}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019895406\&doi=10.1016\%2fj.jbi.2017.05.011\&partnerID=40\&md5=9da7af1cff144bf7fab5532c2a4aea66}, author = {Sardi, L. and Idri, A. and Fernandez-Aleman, J.L.} } @conference { ISI:000388603102055, title = {A saddle-point based approach for semi-analytical performance evaluation of a digital communication system}, booktitle = {2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE}, series = {IEEE Wireless Communications and Networking Conference}, year = {2016}, note = {IEEE Wireless Communications and Networking Conference (WCNC), Doha, QATAR, APR 03-07, 2016}, publisher = {IEEE; IEEE Commun Soc}, organization = {IEEE; IEEE Commun Soc}, abstract = {Nowadays, it has become difficult to obtain the expected performance of a digital communication system using the Monte Carlo simulation method. This is due to advanced technologies used in the transmitter and the receiver. In this paper, we propose a new semi-analytical approach for deriving the error probability. It combines the saddle-point approximation and bootstrap technique for estimating the probability density function. Simulation results show that the obtained semi-analytical error probability is close to that measured with Monte Carlo simulation and provides a significant gain in terms of computing time.}, isbn = {978-1-4673-9814-5}, issn = {1525-3511}, author = {Naamane, Fatima Ezzahra and Et-tolba, Mohamed and Belkasmi, Mostafa} } @conference {Naamane2016, title = {A saddle-point based approach for semi-Analytical performance evaluation of a digital communication system}, booktitle = {IEEE Wireless Communications and Networking Conference, WCNC}, volume = {2016-September}, year = {2016}, note = {cited By 0}, abstract = {Nowadays, it has become difficult to obtain the expected performance of a digital communication system using the Monte Carlo simulation method. This is due to advanced technologies used in the transmitter and the receiver. In this paper, we propose a new semi-Analytical approach for deriving the error probability. It combines the saddle-point approximation and bootstrap technique for estimating the probability density function. Simulation results show that the obtained semi-Analytical error probability is close to that measured with Monte Carlo simulation and provides a significant gain in terms of computing time. {\textcopyright} 2016 IEEE.}, doi = {10.1109/WCNC.2016.7565011}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84989913404\&doi=10.1109\%2fWCNC.2016.7565011\&partnerID=40\&md5=a195d901faec2cafa27156b093772baf}, author = {Naamane, F.E.a and Et-tolba, M.b and Belkasmi, M.c} } @article { ISI:000390576800001, title = {Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model}, journal = {MOBILE INFORMATION SYSTEMS}, year = {2016}, abstract = {Game theory may offer a useful mechanism to address many problems in mobile ad hoc networks (MANETs). One of the key concepts in the research field of such networks with Optimized Link State Routing Protocol (OLSR) is the security problem. Relying on applying game theory to study this problem, we consider two strategies during this suggested model: cooperate and not-cooperate. However, in such networks, it is not easy to identify different actions of players. In this paper, we have essentially been inspired from recent advances provided in game theory to propose a new model for security in MANETs. Our proposal presents a powerful tool with a large number of players where interactions are played multiple times. Moreover, each node keeps a cooperation rate (CR) record of other nodes to cope with the behaviors and mitigate aggregate effect of other malicious devices. Additionally, our suggested security mechanism does not only take into consideration security requirements, but also take into account system resources and network performances. The simulation results using Network Simulator 3 are presented to illustrate the effectiveness of the proposal.}, issn = {1574-017X}, doi = {10.1155/2016/5653010}, author = {Amraoui, Hicham and Habbani, Ahmed and Hajami, Abdelmajid and Bilal, Essaid} } @article {Amraoui2016, title = {Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model}, journal = {Mobile Information Systems}, volume = {2016}, year = {2016}, note = {cited By 0}, abstract = {Game theory may offer a useful mechanism to address many problems in mobile ad hoc networks (MANETs). One of the key concepts in the research field of such networks with Optimized Link State Routing Protocol (OLSR) is the security problem. Relying on applying game theory to study this problem, we consider two strategies during this suggested model: cooperate and not-cooperate. However, in such networks, it is not easy to identify different actions of players. In this paper, we have essentially been inspired from recent advances provided in game theory to propose a new model for security in MANETs. Our proposal presents a powerful tool with a large number of players where interactions are played multiple times. Moreover, each node keeps a cooperation rate (CR) record of other nodes to cope with the behaviors and mitigate aggregate effect of other malicious devices. Additionally, our suggested security mechanism does not only take into consideration security requirements, but also take into account system resources and network performances. The simulation results using Network Simulator 3 are presented to illustrate the effectiveness of the proposal. {\textcopyright} 2016 Hicham Amraoui et al.}, doi = {10.1155/2016/5653010}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85008883716\&doi=10.1155\%2f2016\%2f5653010\&partnerID=40\&md5=5aaffd8b2d52f8958a3f2543444109fe}, author = {Amraoui, H.a and Habbani, A.a b and Hajami, A.c and Bilal, E.d} } @article {Ayoub20162179, title = {Serially concatenated OSMLD codes: Design and iterative decoding}, journal = {Applied Mathematical Sciences}, volume = {10}, number = {41-44}, year = {2016}, note = {cited By 0}, pages = {2179-2188}, abstract = {In this paper, the performance of serially concatenated one-step ma- jority logic decodable (SC-OSMLD) codes is investigated. The iterative decoding process uses a soft-input soft-output threshold decoding algo- rithm [1] as component decoder with our proposed connection scheme [2]. The effect of various components codes, interleaver size (Number of sub-blocks), and the number of iterations are investigated. Simulation results for SC-OSMLD codes transmitted over Additive White Gaussian Noise channel(AWGN) are provided. The simulation result will show that the slope of curves and coding gain are improved by increasing the number of decoder iterations and/or the interleaver size. {\textcopyright} 2016 Fouad Ayoub et al.}, doi = {10.12988/ams.2016.6387}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84983503792\&doi=10.12988\%2fams.2016.6387\&partnerID=40\&md5=46efa596ad7d8a871fc411883576d89c}, author = {Ayoub, F.a and Farchane, A.b and Mohamed, A.c and Belkasmi, M.c and Himmi, M.M.d} } @article {Aylaj2016175, title = {Simulated annealing decoding of linear block codes}, journal = {Lecture Notes in Electrical Engineering}, volume = {380}, year = {2016}, note = {cited By 0}, pages = {175-183}, abstract = {In this paper, we present a hard-decision decoding algorithm using Simulated Annealing (SA) technique. The main idea is to find the optimal solution of the transmitted codeword by a process hopping between two different tasks. The simulations, applied on some binary linear block codes over the AWGN channel, show that the Simulated Annealing decoder has the same performance as the Berlekamp-Massey Algorithm (BM). Furthermore SA Decoder is more efficient compared to other Decoder based on Genetic algorithms in terms of performance and run time. {\textcopyright} Springer International Publishing Switzerland 2016.}, doi = {10.1007/978-3-319-30301-7_19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964495058\&doi=10.1007\%2f978-3-319-30301-7_19\&partnerID=40\&md5=d6baed6c15bb3a2d4e616c03caff9e9f}, author = {Aylaj, B.a and Belkasmi, M.b} } @conference { ISI:000376431400019, title = {Simulated Annealing Decoding of Linear Block Codes}, booktitle = {PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION \& COMMUNICATION TECHNOLOGIES 2015, VOL 1}, series = {Lecture Notes in Electrical Engineering}, volume = {380}, year = {2016}, note = {Mediterranean Conference on Information and Communication Technologies (MedCT), MOROCCO, MAY 07-09, 2015}, pages = {175-183}, abstract = {In this paper, we present a hard-decision decoding algorithm using Simulated Annealing (SA) technique. The main idea is to find the optimal solution of the transmitted codeword by a process hopping between two different tasks. The simulations, applied on some binary linear block codes over the AWGN channel, show that the Simulated Annealing decoder has the same performance as the Berlekamp-Massey Algorithm (BM). Furthermore SA Decoder is more efficient compared to other Decoder based on Genetic algorithms in terms of performance and run time.}, isbn = {978-3-319-30301-7; 978-3-319-30299-7}, issn = {1876-1100}, doi = {10.1007/978-3-319-30301-7\_19}, author = {Aylaj, Bouchaib and Belkasmi, Mostafa}, editor = {ElOualkadi, A and Choubani, F and ElMoussati, A} } @conference { ISI:000389502600045, title = {SNA: Detecting Influencers over Social Networks}, booktitle = {Networked Systems, NETYS 2016}, series = {Lecture Notes in Computer Science}, volume = {9944}, year = {2016}, note = {4th International Conference on Networked Systems (NETYS), Marrakech, MOROCCO, MAY 18-20, 2016}, pages = {388}, isbn = {978-3-319-46140-3; 978-3-319-46139-7}, issn = {0302-9743}, author = {Aghmadi, Ali and Erradi, Mohammed and Kobbane, Abdellatif}, editor = {Abdulla, PA and DelporteGallet, C} } @article {Chadli2016, title = {Software project management tools in global software development: a systematic mapping study}, journal = {SpringerPlus}, volume = {5}, number = {1}, year = {2016}, note = {cited By 0}, abstract = {Global software development (GSD) which is a growing trend in the software industry is characterized by a highly distributed environment. Performing software project management (SPM) in such conditions implies the need to overcome new limitations resulting from cultural, temporal and geographic separation. The aim of this research is to discover and classify the various tools mentioned in literature that provide GSD project managers with support and to identify in what way they support group interaction. A systematic mapping study has been performed by means of automatic searches in five sources. We have then synthesized the data extracted and presented the results of this study. A total of 102 tools were identified as being used in SPM activities in GSD. We have classified these tools, according to the software life cycle process on which they focus and how they support the 3C collaboration model (communication, coordination and cooperation). The majority of the tools found are standalone tools (77\%). A small number of platforms (8\%) also offer a set of interacting tools that cover the software development lifecycle. Results also indicate that SPM areas in GSD are not adequately supported by corresponding tools and deserve more attention from tool builders. {\textcopyright} 2016, The Author(s).}, doi = {10.1186/s40064-016-3670-7}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84996484137\&doi=10.1186\%2fs40064-016-3670-7\&partnerID=40\&md5=303aaf83e70281377e2a1497382f7f9f}, author = {Chadli, S.Y.a and Idri, A.a and Ros, J.N.b and Fern{\'a}ndez-Alem{\'a}n, J.L.b and de Gea, J.M.C.b and Toval, A.b} } @article { ISI:000391824800005, title = {Software project management tools in global software development: a systematic mapping study}, journal = {SPRINGERPLUS}, volume = {5}, year = {2016}, month = {NOV 24}, abstract = {Global software development (GSD) which is a growing trend in the software industry is characterized by a highly distributed environment. Performing software project management (SPM) in such conditions implies the need to overcome new limitations resulting from cultural, temporal and geographic separation. The aim of this research is to discover and classify the various tools mentioned in literature that provide GSD project managers with support and to identify in what way they support group interaction. A systematic mapping study has been performed by means of automatic searches in five sources. We have then synthesized the data extracted and presented the results of this study. A total of 102 tools were identified as being used in SPM activities in GSD. We have classified these tools, according to the software life cycle process on which they focus and how they support the 3C collaboration model (communication, coordination and cooperation). The majority of the tools found are standalone tools (77\%). A small number of platforms (8\%) also offer a set of interacting tools that cover the software development lifecycle. Results also indicate that SPM areas in GSD are not adequately supported by corresponding tools and deserve more attention from tool builders.}, issn = {2193-1801}, doi = {10.1186/s40064-016-3670-7}, author = {Yasser Chadli, Saad and Idri, Ali and Nicolas Ros, Joaquin and Luis Fernandez-Aleman, Jose and Carrillo de Gea, Juan M. and Toval, Ambrosio} } @conference {Annouch2016, title = {Split delivery and pickup vehicle routing problem with two-dimensional loading constraints}, booktitle = {SITA 2016 - 11th International Conference on Intelligent Systems: Theories and Applications}, year = {2016}, note = {cited By 0}, abstract = {In this paper, we address the distribution problem of liquefied petroleum gas (LPG). In particular we are targeting the optimization of pickup and split delivery of gas bottles to a set of customers with loading constraints. The problem combines the loading of a heterogeneous fleet of vehicles through a set of different size racks and then the establishment of divisible deliveries (split delivery: SDVRP). The problem discussed in this paper can be presented as a Multi-depot Two-Loading Split Delivery and Pickup using Heterogeneous fleet of Vehicles with Time Windows vehicle Routing Problem and with Multi-Product (2L-SDP-HVRPTW-MP). After proposing a mathematical formulation for this problem (MILP), we tested our model firstly by a small instances using ILOG CPLEX solver following this by testing and discussing numerical results. {\textcopyright} 2016 IEEE.}, doi = {10.1109/SITA.2016.7772277}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010366293\&doi=10.1109\%2fSITA.2016.7772277\&partnerID=40\&md5=dcf8e30d18c805be9f705a1c130183cf}, author = {Annouch, A. and Bellabdaoui, A. and Minkhar, J.} } @conference { ISI:000391420300022, title = {Split delivery and pickup vehicle routing problem with two-dimensional loading constraints}, booktitle = {2016 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, series = {International Conference on Intelligent Systems, Theories and Applications}, year = {2016}, note = {11th International Conference on Intelligent Systems - Theories and Applications (SITA), Mohammedia, MOROCCO, OCT 19-20, 2016}, publisher = {IEEE; Univ Hassan Casablanca; IEEE Morocco Sect; Fac Sci Tech Mohammedia}, organization = {IEEE; Univ Hassan Casablanca; IEEE Morocco Sect; Fac Sci Tech Mohammedia}, abstract = {In this paper, we address the distribution problem of liquefied petroleum gas (LPG). In particular we are targeting the optimization of pickup and split delivery of gas bottles to a set of customers with loading constraints. The problem combines the loading of a heterogeneous fleet of vehicles through set of different size racks and then the establishment of divisible deliveries (split delivery: SDVRP). The problem discussed in this paper can be presented as a Multi-depot Two-Loading Split Delivery and Pickup using Heterogeneous fleet of Vehicles with Time Windows vehicle Routing Problem and with Multi-Product (2L-SDP-HVRPTW-MP). After proposing a mathematical formulation for this problem (MILP), we tested our model firstly by a small instances using ILOG CPLEX solver following this by testing and discussing numerical results.}, isbn = {978-1-5090-5781-8}, issn = {2378-2528}, author = {Annouch, Anouar and Bellabdaoui, Adil and Minkhar, Jawad} } @conference {Chafik2016, title = {Stacking policy for solving the container stacking problem at a containers terminal}, booktitle = {ILS 2016 - 6th International Conference on Information Systems, Logistics and Supply Chain}, year = {2016}, note = {cited By 0}, abstract = {Maritime container terminals are facilities where cargo containers are transshipped between ships or between ships and land vehicles (tucks or trains). They can be automated; semi- Automated or static ones depend on the type of the equipments that they contain. There are crucial resources at container terminals; the yard, cranes and the vehicles. The yard refers to the temporary storage area where inbound, outbound containers can be stored. While we have two kinds of cranes depending on the type of the yard we are working on: yard crane and quay crane. Vehicles are used to transfer the container between the seaside and yard side (the external trucks XTs are not considerable in our study). The decision of the container stacking position is the most important operational task for the incoming containers which affects not only the productivity of the stacking but also for the later retrieval and also to avoid the unproductive moves to access to the requested containers stored in the stack. Our aim is to define a new approach to design the container stacking problem using an approach of optimization and simulation. Thus in this paper we will define a new MIP which has as objective the minimization of the number of the stacks used to store a given number of inbound containers, and to define afterwards a simulation model using a simulation software (Arena) which has as input the result of the optimization model. So we will try first to define a relocation model using the standard (FCFS) then the Best fit decrease (BFD) from the bin packing algorithm to store and maintain the storage area and to avoid unproductive moves and reshuffles to find out the requested container sequence. The main inputs are high, weight, destination and the delivery time of each container. Our objective is to have, based on heuristics, a guide to the planner to obtain an optimized stacking / reshuffling plan, given a stacking state and a container demand. We will try to minimize the number of reshuffles as well as the number of stacks used and obtaining a conclusion about possible yard configurations.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84985990061\&partnerID=40\&md5=fc357733313d1ef8bc1eb86ae909b126}, author = {Chafik, R.a and Benadada, Y.b and Boukachour, J.c} } @conference {Brinis2016547, title = {Strategic data gathering in wireless sensor networks}, booktitle = {2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016}, year = {2016}, note = {cited By 0}, pages = {547-552}, abstract = {Prolonging the network lifetime is a challenging problem in wireless sensor networks. Using additional mobile agents able to gather data from static sensor nodes reveals to be one of the convenient solutions in order to conserve static sensor nodes energy. In this paper, we focus on a conflictual situation between two Data Collectors (DCs) tending to gather maximum sensed data and deliver them to a sink node before a required deadline. A non-cooperative game is used to model this behavior and evaluate the performance of the gathering scheme when two DCs are competing with each other to gain more sensed data. Under this scheme, aggressive behavior is discouraged since each data gathering operation incurs sensor nodes energy decrease and data delivery delay increase. {\textcopyright} 2016 IEEE.}, doi = {10.1109/IWCMC.2016.7577116}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84994137830\&doi=10.1109\%2fIWCMC.2016.7577116\&partnerID=40\&md5=9c385bde486970ab7cb87df7e747837e}, author = {Brinis, N.a and Koulali, M.-A.b and Saidane, L.A.a and Minet, P.c and Kobbane, A.d} } @conference { ISI:000387181100093, title = {Strategic Data Gathering in Wireless Sensor Networks}, booktitle = {2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC)}, series = {International Wireless Communications and Mobile Computing Conference}, year = {2016}, note = {12th International Wireless Communications \& Mobile Computing Conference (IWCMC), Paphos, CYPRUS, SEP 05-09, 2016}, pages = {547-552}, publisher = {IEEE; IEEE Cyprus Sect; Frederick Univ}, organization = {IEEE; IEEE Cyprus Sect; Frederick Univ}, abstract = {Prolonging the network lifetime is a challenging problem in wireless sensor networks. Using additional mobile agents able to gather data from static sensor nodes reveals to be one of the convenient solutions in order to conserve static sensor nodes energy. In this paper, we focus on a conflictual situation between two Data Collectors (DCs) tending to gather maximum sensed data and deliver them to a sink node before a required deadline. A non-cooperative game is used to model this behavior and evaluate the performance of the gathering scheme when two DCs are competing with each other to gain more sensed data. Under this scheme, aggressive behavior is discouraged since each data gathering operation incurs sensor nodes energy decrease and data delivery delay increase.}, isbn = {978-1-5090-0304-4}, issn = {2376-6492}, author = {Brinis, Nour and Koulali, Mohamed-Amine and Saidane, Leila Azouz and Minet, Pascale and Kobbane, Abdellatif} } @conference { ISI:000392439200008, title = {Strategic planning problem represented by a three-echelon logistics network-modeling and solving}, booktitle = {PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON LOGISTICS OPERATIONS MANAGEMENT (GOL{\textquoteright}16)}, year = {2016}, note = {3rd IEEE International Conference on Logistics Operations Management (GOL), Fes, MOROCCO, MAY 23-25, 2016}, publisher = {Sidi Mohammed Ben Abdellah Univ Fes, Fac Sci \& Technol; Mohammed V Univ Rabat, ENSIAS Sch; Univ Havre; IEEE}, organization = {Sidi Mohammed Ben Abdellah Univ Fes, Fac Sci \& Technol; Mohammed V Univ Rabat, ENSIAS Sch; Univ Havre; IEEE}, abstract = {This article aims to elaborate a strategic plan allowing to decision makers to take right decisions (Selecting suppliers, Selecting plants that can produce a specific product, ..) in the right moment in order to minimize the generated costs. Our work consists, then to optimize a multi-scales and multi-periods location-distribution problem. The problem belongs to the FLNP family with a complexity of order of NP-difficult. The objective of our problem MIP is to maximize the incomes of a production company via the minimization of costs: the cost of supplying, the cost of producing and the cost of transportation. Several aspects would be treated in this subject: the horizon of planning -multi-periods and the structure of network (multi-echelons). Based on the limits of exact methods, we have proposed to resolve this problem on the basis of a heuristic method, the choice which seems to be the most adequate for our problem is LNS (Large Neighborhood Search). It is in this perspective that we have reformulated our model {[}12] in order to be represented under the form of a logistic network based on paths before the application of LNS.}, isbn = {978-1-4673-8571-8}, author = {Hamada, Yahya and Benadada, Youssef and Gendron, Bernard}, editor = {Alaoui, AE and Benadada, Y and Boukachour, J} } @conference {Hamada2016, title = {Strategic planning problem represented by a three-echelon logistics network-modeling and solving}, booktitle = {Proceedings of the 3rd IEEE International Conference on Logistics Operations Management, GOL 2016}, year = {2016}, note = {cited By 0}, abstract = {This article aims to elaborate a strategic plan allowing to decision makers to take right decisions (Selecting suppliers, Selecting plants that can produce a specific product,...) in the right moment in order to minimize the generated costs. Our work consists, then to optimize a multi-scales and multi-periods location-distribution problem. The problem belongs to the FLNP family with a complexity of order of NP-difficult. The objective of our problem MIP is to maximize the incomes of a production company via the minimization of costs: the cost of supplying, the cost of producing and the cost of transportation. Several aspects would be treated in this subject: the horizon of planning-multi-periods and the structure of network (multi-echelons). Based on the limits of exact methods, we have proposed to resolve this problem on the basis of a heuristic method, the choice which seems to be the most adequate for our problem is LNS (Large Neighborhood Search). It is in this perspective that we have reformulated our model [12] in order to be represented under the form of a logistic network based on paths before the application of LNS. {\textcopyright} 2016 IEEE.}, doi = {10.1109/GOL.2016.7731666}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85001967788\&doi=10.1109\%2fGOL.2016.7731666\&partnerID=40\&md5=f27cc09ffbc35696dbe95da6401b9d4f}, author = {Hamada, Y.a and Benadada, Y.b and Gendron, B.c} } @conference {ElIdrissi2016, title = {Supporting collaborative work on ontology learning from Relational Databases}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, volume = {2016-July}, year = {2016}, note = {cited By 0}, abstract = {We present in this paper, one important feature of our approach that draws on a semantic enrichment process of the RDB model for learning application ontologies from Relational Databases (RDB)s. In fact, our approach supports collaborative work on the enrichment process and considers the partitioning of the input RDB model into a set of business modules. The objectives behind the collaborative support are threefold: (i) to allow each user to work on the RDB part that fits his/her domain knowledge; (ii) to save time in manual semantic enrichment; and (iii) to make easiest human evaluation of the ontology. We present the principle behind our approach, its features and its benefits. {\textcopyright} 2015 IEEE.}, doi = {10.1109/AICCSA.2015.7507133}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84980315537\&doi=10.1109\%2fAICCSA.2015.7507133\&partnerID=40\&md5=6c845ad8d51b40c22dba58c3aa06c4b7}, author = {El Idrissi, B. and Baina, S. and Baina, K.} } @conference {Elmidaoui2016, title = {A survey of empirical studies in software product maintainability prediction models}, booktitle = {SITA 2016 - 11th International Conference on Intelligent Systems: Theories and Applications}, year = {2016}, note = {cited By 0}, abstract = {Software product maintainability is critical to the achievement of the software product quality. In order to keep the software useful as long as possible, software product maintainability prediction (SPMP) has become an important endeavor. The objective of this paper is to identify and present the current research on SPMP. The search was conducted using digital libraries to And as much research papers as possible. Selected papers are classified according to the following survey classification criteria (SCs): research type, empirical type, publication year and channel. Based on the results of the survey, we provide a discussion of the current state of the art in software maintainability prediction models or techniques. We believe that this study will be a reliable basis for further research in software maintainability studies. {\textcopyright} 2016 IEEE.}, doi = {10.1109/SITA.2016.7772267}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010468522\&doi=10.1109\%2fSITA.2016.7772267\&partnerID=40\&md5=8184d51d9fbbba990544f8dc158d2375}, author = {Elmidaoui, S. and Cheikhi, L. and Idri, A.} } @conference { ISI:000391420300012, title = {A Survey of Empirical Studies in Software Product Maintainability Prediction Models}, booktitle = {2016 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, series = {International Conference on Intelligent Systems, Theories and Applications}, year = {2016}, note = {11th International Conference on Intelligent Systems - Theories and Applications (SITA), Mohammedia, MOROCCO, OCT 19-20, 2016}, publisher = {IEEE; Univ Hassan Casablanca; IEEE Morocco Sect; Fac Sci Tech Mohammedia}, organization = {IEEE; Univ Hassan Casablanca; IEEE Morocco Sect; Fac Sci Tech Mohammedia}, abstract = {Software product maintainability is critical to the achievement of the software product quality. In order to keep the software useful as long as possible, software product maintainability prediction (SPMP) has become an important endeavor. The objective of this paper is to identify and present the current research on SPMP. The search was conducted using digital libraries to find as much research papers as possible. Selected papers are classified according to the following survey classification criteria (SCs): research type, empirical type, publication year and channel. Based on the results of the survey, we provide a discussion of the current state of the art in software maintainability prediction models or techniques. We believe that this study will be a reliable basis for further research in software maintainability studies.}, isbn = {978-1-5090-5781-8}, issn = {2378-2528}, author = {Elmidaoui, Sara and Cheikhi, Laila and Idri, Ali} } @article { ISI:000378664500010, title = {Systematic literature review of ensemble effort estimation}, journal = {JOURNAL OF SYSTEMS AND SOFTWARE}, volume = {118}, year = {2016}, month = {AUG}, pages = {151-175}, abstract = {The need to overcome the weaknesses of single estimation techniques for prediction tasks has given rise to ensemble methods in software development effort estimation (SDEE). An ensemble effort estimation (EEE) technique combines several of the single/classical models found in the SDEE literature. However, to the best of our knowledge, no systematic review has yet been performed with a focus on the use of EEE techniques in SDEE. The purpose of this review is to analyze EEE techniques from six viewpoints: single models used to construct ensembles, ensemble estimation accuracy, rules used to combine single estimates, accuracy comparison of EEE techniques with single models, accuracy comparison between EEE techniques and methodologies used to construct ensemble methods. We performed a systematic review of EEE studies published between 2000 and 2016, and we selected 24 of them to address the questions raised in this review. We found that EEE techniques may be separated into two types: homogeneous and heterogeneous, and that the machine learning single models are the most frequently employed in constructing EEE techniques. We also found that EEE techniques usually yield acceptable estimation accuracy, and in fact are more accurate than single models. (C) 2016 Elsevier Inc. All rights reserved.}, issn = {0164-1212}, doi = {10.1016/j.jss.2016.05.016}, author = {Idri, Ali and Hosni, Mohamed and Abran, Alain} } @article {Idri2016151, title = {Systematic literature review of ensemble effort estimation}, journal = {Journal of Systems and Software}, volume = {118}, year = {2016}, note = {cited By 1}, pages = {151-175}, abstract = {The need to overcome the weaknesses of single estimation techniques for prediction tasks has given rise to ensemble methods in software development effort estimation (SDEE). An ensemble effort estimation (EEE) technique combines several of the single/classical models found in the SDEE literature. However, to the best of our knowledge, no systematic review has yet been performed with a focus on the use of EEE techniques in SDEE. The purpose of this review is to analyze EEE techniques from six viewpoints: single models used to construct ensembles, ensemble estimation accuracy, rules used to combine single estimates, accuracy comparison of EEE techniques with single models, accuracy comparison between EEE techniques and methodologies used to construct ensemble methods. We performed a systematic review of EEE studies published between 2000 and 2016, and we selected 24 of them to address the questions raised in this review. We found that EEE techniques may be separated into two types: homogeneous and heterogeneous, and that the machine learning single models are the most frequently employed in constructing EEE techniques. We also found that EEE techniques usually yield acceptable estimation accuracy, and in fact are more accurate than single models. {\textcopyright} 2016 Elsevier Inc. All rights reserved.}, doi = {10.1016/j.jss.2016.05.016}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84969531836\&doi=10.1016\%2fj.jss.2016.05.016\&partnerID=40\&md5=4217c2107911348615a692540959501e}, author = {Idri, A.a and Hosni, M.a and Abran, A.b} } @conference { ISI:000386649000023, title = {Systematic Mapping Study of Dealing with Error in Software Development Effort Estimation}, booktitle = {2016 42ND EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA)}, year = {2016}, note = {42nd Euromicro Conference Series on Software Engineering and Advanced Applications (SEAA), Limassol, CYPRUS, AUG 31-SEP 02, 2016}, pages = {140-147}, publisher = {Univ Cyprus; Technolog Educ Inst Western Greece}, organization = {Univ Cyprus; Technolog Educ Inst Western Greece}, abstract = {Over the last decades, the software engineering community has investigated new techniques for software development effort estimation. Unfortunately, the estimates were not always accurate. Error approaches are then, an interesting track for improving the projects running performances and their financial profitability. The aim of this systematic mapping study is to summarize and synthesize the existing studies dealing with effort estimation error and uncertainty and to classify them based on research approaches, contribution types, accuracy criteria, datasets, error approaches and effort estimation techniques used. In total 19 papers published between 1990 and 2015 were selected. We observed a balance between the managerial approaches and the technical ones. Furthermore, the proposed error techniques and frameworks improve in general the accuracy of effort estimation techniques. Fuzzy logic, bootstrapping and risk analysis are promising avenues that could be combined with various estimation techniques.}, isbn = {978-1-5090-2819-1}, doi = {10.1109/SEAA.2016.39}, author = {El Koutbi, Salma and Idri, Ali and Abran, Alain} } @conference {Idri2016132, title = {Systematic mapping study of ensemble effort estimation}, booktitle = {ENASE 2016 - Proceedings of the 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering}, year = {2016}, note = {cited By 0}, pages = {132-139}, abstract = {Ensemble methods have been used recently for prediction in data mining area in order to overcome the weaknesses of single estimation techniques. This approach consists on combining more than one single technique to predict a dependent variable and has attracted the attention of the software development effort estimation (SDEE) community. An ensemble effort estimation (EEE) technique combines several existing single/classical models. In this study, a systematic mapping study was carried out to identify the papers based on EEE techniques published in the period 2000-2015 and classified them according to five classification criteria: research type, research approach, EEE type, single models used to construct EEE techniques, and rule used the combine single estimates into an EEE technique. Publication channels and trends were also identified. Within the 16 studies selected, homogeneous EEE techniques were the most investigated. Furthermore, the machine learning single models were the most frequently employed to construct EEE techniques and two types of combiner (linear and non-linear) have been used to get the prediction value of an ensemble. Copyright {\textcopyright} 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979496940\&partnerID=40\&md5=8108d3f05a4d4c689c6237a0019141b7}, author = {Idri, A.a and Hosni, M.a and Abran, A.b} } @conference { ISI:000391107900013, title = {Systematic Mapping Study of Ensemble Effort Estimation}, booktitle = {ENASE: PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL SOFTWARE APPROACHES TO SOFTWARE ENGINEERING}, year = {2016}, note = {11th International Conference on Evaluation of Novel Software Approaches to Software Engineering, Rome, ITALY, APR 27-28, 2016}, pages = {132-139}, abstract = {Ensemble methods have been used recently for prediction in data mining area in order to overcome the weaknesses of single estimation techniques. This approach consists on combining more than one single technique to predict a dependent variable and has attracted the attention of the software development effort estimation (SDEE) community. An ensemble effort estimation (EEE) technique combines several existing single/classical models. In this study, a systematic mapping study was carried out to identify the papers based on EEE techniques published in the period 2000-2015 and classified them according to five classification criteria: research type, research approach, EEE type, single models used to construct EEE techniques, and rule used the combine single estimates into an EEE technique. Publication channels and trends were also identified. Within the 16 studies selected, homogeneous EEE techniques were the most investigated. Furthermore, the machine learning single models were the most frequently employed to construct EEE techniques and two types of combiner (linear and non-linear) have been used to get the prediction value of an ensemble.}, isbn = {978-989-758-189-2}, doi = {10.5220/0005822701320139}, author = {Idri, Ali and Hosni, Mohamed and Abran, Alain}, editor = {Maciaszek, L and Filipe, J} } @article {Bensitel2015206, title = {Secure data in cloud computing using homomorphic encryption}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {82}, number = {2}, year = {2015}, note = {cited By 0}, pages = {206-211}, abstract = {The emergence of cloud computing and cyber-physical systems made of security in processing data a major challenge. In order to ensure privacy and confidentiality of the data being manipulated, the use of cryptography is widely used today. In 2009, C. Gentry proposed the first fully homomorphic cryptosystem, to perform calculations on data previously encrypted without having to decrypt. This progress has allowed the opening of many industrial and research perspectives. However, despite recent progress, many limitations remain today on the lack of performance of these systems and their strong memory requirements. In this paper we focus on cloud computing along with its various security and privacy issues, we describe the role of homomorphic encryption scheme for ensuring data privacy and compare its types based on different characteristics. {\textcopyright} 2005-2015 JATIT \& LLS.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84950315880\&partnerID=40\&md5=62cb74290f6540e4888cf8b681e3cc9c}, author = {Bensitel, Y.a and Romadi, R.b} } @conference { ISI:000380509200002, title = {A secure multi-hops routing for VANETs}, booktitle = {2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM)}, year = {2015}, note = {International conference on wireless networks and mobile communications, Marrakech, MOROCCO, OCT 20-23, 2015}, pages = {6-10}, abstract = {Vehicular ad-hoc networks (VANETs) are a promising communication technology. they offers many applications, which will improve traffic management and safety. Nevertheless, those applications have stringent security requirements, as they affect road traffic safety. Security requirement like authentication, privacy and Integrity are crucial to VANETs, as they avoid attacks against vehicle-to-vehicle and vehicle-to-roadside communication. In this paper, we investigate the authentication and privacy issues in VANETs. We explore the Attribute Based Signature (ABS) primitive and its variants. We then select among existing ABS literature, an efficient scheme (the best known) that achieve both traceability and user-privacy (anonymity). Finally, we propose a protocol for VANETs that uses traceable ABS in general context of multi-hop routing.}, isbn = {978-1-4673-8224-3}, author = {Mrabet, Khalid and El Bouanani, Faissal and Ben-Azza, Hussain} } @conference {Mrabet2015, title = {A secure multi-hops routing for VANETs}, booktitle = {International Conference on Wireless Networks and Mobile Communications, WINCOM 2015}, year = {2015}, note = {cited By 0}, abstract = {Vehicular ad-hoc networks (VANETs) are a promising communication technology. They offers many applications, which will improve traffic management and safety. Nevertheless, those applications have stringent security requirements, as they affect road traffic safety. Security requirement like authentication, privacy and Integrity are crucial to VANETs, as they avoid attacks against vehicle-To-vehicle and vehicle-To-roadside communication. In this paper, we investigate the authentication and privacy issues in VANETs. We explore the Attribute Based Signature (ABS) primitive and its variants. We then select among existing ABS literature, an efficient scheme (the best known) that achieve both traceability and user-privacy (anonymity). Finally, we propose a protocol for VANETs that uses traceable ABS in general context of multi-hop routing. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WINCOM.2015.7381299}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84965035944\&doi=10.1109\%2fWINCOM.2015.7381299\&partnerID=40\&md5=a95209c9fc1370e4e3c1b1783cc54c3e}, author = {Mrabet, K.a and Bouanani, F.E.a and Ben-Azza, H.b} } @conference {Chanyour201557, title = {Secure sparse network coding for reliable routing in large scale DTMN}, booktitle = {Proceedings - 2015 3rd International Workshop on RFID and Adaptive Wireless Sensor Networks, RAWSN 2015 - In conjunction with the International Conference on NETworked sYStems, NETYS 2015}, year = {2015}, note = {cited By 0}, pages = {57-62}, abstract = {Security issue occupies an important part in all communication system and especially for new generation networks. Among these networks, we find Delay Tolerant Mobile Networks (DTMNs) which are a class of useful but challenging networks. Combining Network Coding (NC) and clustering for routing in such networks gives more efficiency and copes with routing reliability problem among large scale networks. Our work{\textquoteright}s concern is to build a secure network coding scheme in the presence of eavesdroppers in large-scale DTMNs. Therefore, we used a cluster based routing protocol dedicated to DTMN specificities. In addition, we used Sparse Random Linear Network Coding (SRLNC) to feat low computational capabilities requirement in such networks. Furthermore, we addressed the packets retransmission decision problem for SRLNC with a fair trade-off throughput/overhead. The results are very encouraging and the proposed routing scheme has the advantage to be reliable as well as secure for large scale DTMN. {\textcopyright} 2015 IEEE.}, doi = {10.1109/RAWSN.2015.7173280}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84966552832\&doi=10.1109\%2fRAWSN.2015.7173280\&partnerID=40\&md5=3d0cbb4c0c91e93d68d64811357a6f36}, author = {Chanyour, T.a and Saadane, R.b and Belkasmi, M.a} } @conference { ISI:000380408200012, title = {Secure Sparse Network Coding for Reliable Routing in Large Scale DTMN}, booktitle = {2015 THIRD INTERNATIONAL WORKSHOP ON RFID AND ADAPTIVE WIRELESS SENSOR NETWORKS (RAWSN)}, year = {2015}, note = {3rd International Workshop on RFID and Adaptive Wireless Sensor Networks (RAWSN), Agadir, MOROCCO, MAY 13-15, 2015}, pages = {57-62}, publisher = {FST FES; IEEE Morocco Sect; CNRST; MobiTic; Laboratoire Signaux Systemes Composants; LiMs Laboratoire}, organization = {FST FES; IEEE Morocco Sect; CNRST; MobiTic; Laboratoire Signaux Systemes Composants; LiMs Laboratoire}, abstract = {Security issue occupies an important part in all communication system and especially for new generation networks. Among these networks, we find Delay Tolerant Mobile Networks (DTMNs) which are a class of useful but challenging networks. Combining Network Coding (NC) and clustering for routing in such networks gives more efficiency and copes with routing reliability problem among large scale networks. Our work{\textquoteright}s concern is to build a secure network coding scheme in the presence of eavesdroppers in large-scale DTMNs. Therefore, we used a cluster based routing protocol dedicated to DTMN specificities. In addition, we used Sparse Random Linear Network Coding (SRLNC) to feat low computational capabilities requirement in such networks. Furthermore, we addressed the packets retransmission decision problem for SRLNC with a fair trade-off throughput/overhead. The results are very encouraging and the proposed routing scheme has the advantage to be reliable as well as secure for large scale DTMN.}, isbn = {978-1-4673-8096-6}, author = {Chanyour, Tarik and Saadane, Rachid and Belkasmi, Mostafa}, editor = {Berrada, I and Ghennioui, H} } @conference {L{\textquoteright}Amrani201556, title = {The security of web services: Secure communication and identity management}, booktitle = {CEUR Workshop Proceedings}, volume = {1580}, year = {2015}, note = {cited By 0}, pages = {56-60}, abstract = {Service Oriented Architectures have become the new trend in the world of communication on the web. Especially web services are the high-performance specification of service-oriented architectures. The use of confidential data on the Web becomes the primary problem in the secure communication over the web. The solution proposed in this paper is a secure communication tool OCS based on the principals of SAML standard and Single Sign-On. Our solution proposes a new approach which collaborates strong points of SAML standard and single sign-on method. The implementation of this approach is in the form of a platform or a tool which provide a secure communication between web services. Thus, a future approach that exceeds the level of authentication and address the level of access control, likewise and as a further step, prepare an evaluation of the most important technologies which provide Single Sign-On possibility and secure communication context between heterogeneous web services.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84977540481\&partnerID=40\&md5=947fc7d5e6948e0dbe24131531e28dc1}, author = {L{\textquoteright}Amrani, H.a and El Bouzekri El Idrissi, Y.b and Ajhoun, R.a} } @conference { ISI:000380407100034, title = {Security, Privacy and Trust in Cloud Computing: A Comparative Study}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {23-30}, abstract = {{\textquoteleft}{\textquoteleft}Use the computer without a computer,{{\textquoteright}{\textquoteright}} this is the dream of all managers who believe in {\textquoteleft}{\textquoteleft}Cloud Computing{{\textquoteright}{\textquoteright}}. The Cloud has become a dream and an obsession for all fans of the computer because of the many benefits this service offers: availability of services and data is ensured, cost is relative to consumption, ease of deployment, technical infrastructure is adaptable to the volume of business activity, its convenience to the common business applications (CRM, HR, BI, ERP, mail, etc.), the fact that this service provides a business function and not the technical components requiring computer skills. Besides these advantages, there are serious risks related to the use of Cloud computing, such as: temporary or permanent loss of data, security of data, lack of traceability and accountability. These risks are the main challenges faced while adopting a Cloud computing architecture. In this paper, we studied the literature focusing on three major notions on collaborative systems in Cloud computing: Security, privacy and trust. That{\textquoteright}s why we will try to bring out the main requirements regarding these three concepts from both points of view (user{\textquoteright}s and provider{\textquoteright}s), before presenting some related approaches which treat these three concepts.}, isbn = {978-1-4673-8149-9}, author = {Alouane, Meryeme and El Bakkali, Hanan} } @conference {Alouane2015, title = {Security, privacy and trust in cloud computing: A comparative study}, booktitle = {Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015}, year = {2015}, note = {cited By 0}, abstract = {"Use the computer without a computer," this is the dream of all managers who believe in "Cloud Computing". The Cloud has become a dream and an obsession for all fans of the computer because of the many benefits this service offers: availability of services and data is ensured, cost is relative to consumption, ease of deployment, technical infrastructure is adaptable to the volume of business activity, its convenience to the common business applications (CRM, HR, BI, ERP, mail, etc.), the fact that this service provides a business function and not the technical components requiring computer skills..., Besides these advantages, there are serious risks related to the use of Cloud computing, such as: temporary or permanent loss of data, security of data, lack of traceability and accountability... These risks are the main challenges faced while adopting a Cloud computing architecture., In this paper, we studied the literature focusing on three major notions on collaborative systems in Cloud computing: Security, privacy and trust. That{\textquoteright}s why we will try to bring out the main requirements regarding these three concepts from both points of view (user{\textquoteright}s and provider{\textquoteright}s), before presenting some related approaches which treat these three concepts. {\textcopyright} 2015 IEEE.}, doi = {10.1109/CloudTech.2015.7336995}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962795004\&doi=10.1109\%2fCloudTech.2015.7336995\&partnerID=40\&md5=18b4f331589250a98e192c8087786f17}, author = {Alouane, M. and El Bakkali, H.} } @conference {Younes2015115, title = {Segmentation of Arabic Handwritten Text to Lines}, booktitle = {Procedia Computer Science}, volume = {73}, year = {2015}, note = {cited By 0}, pages = {115-121}, abstract = {Automatic recognition of writing is among the most important axes in the NLP (Natural language processing). Several entities of different areas demonstrated the need in recognition of handwritten Arabic characters; particularly banks check processing, post office for the automation of mail sorting, the insurance for the treatment of forms and many other industries. One of the most important operations in a handwriting recognition system is segmentation. Segmentation of handwritten text is a necessary step in the development of a system of automatic writing recognition. Its goal is to try to extract all areas of the lines of the text, and this operation is made difficult in the case of handwriting, by the presence of irregular gaps or overlap between lines and fluctuations of the guidance of scripture to the horizontal. In this paper, we have developed three approaches of handwritten Arabic text segmentation, then we compared between these three approaches. {\textcopyright} 2015 The Authors.}, doi = {10.1016/j.procs.2015.12.056}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962654008\&doi=10.1016\%2fj.procs.2015.12.056\&partnerID=40\&md5=36628c8cc1ed417c96dd04a97f7a2623}, author = {Younes, M.a and Abdellah, Y.b} } @conference { ISI:000373736100014, title = {Segmentation of Arabic handwritten text to lines}, booktitle = {INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015)}, series = {Procedia Computer Science}, volume = {73}, year = {2015}, note = {International Conference on Advanced Wireless Information and Communication Technologies (AWICT), Natl Sch Engineers Sousse, TUNISIA, OCT 05-07, 2015}, pages = {115-121}, abstract = {Automatic recognition of writing is among the most important axes in the NLP (Natural language processing). Several entities of different areas demonstrated the need in recognition of handwritten Arabic characters; particularly banks check processing, post office for the automation of mail sorting, the insurance for the treatment of forms and many other industries. One of the most important operations in a handwriting recognition system is segmentation. Segmentation of handwritten text is a necessary step in the development of a system of automatic writing recognition. Its goal is to try to extract all areas of the lines of the text, and this operation is made difficult in the case of handwriting, by the presence of irregular gaps or overlap between lines and fluctuations of the guidance of scripture to the horizontal. In this paper, we have developed three approaches of handwritten Arabic text segmentation, then we compared between these three approaches.}, issn = {1877-0509}, doi = {10.1016/j.procs.2015.12.056}, author = {Mokhtari, Younes and Yousfi, Abdellah}, editor = {Boubiche, DE and Hidoussi, F and Cruz, HT} } @article {Adadi2015460, title = {A semantic web service composition for E-Government services}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {71}, number = {3}, year = {2015}, note = {cited By 0}, pages = {460-467}, abstract = {Emerging from e-business ideas in the late 1990s, e-Government is seen as a concept that is focused on fully exploiting Internet and information and communication technologies to deliver effective government services to citizens, businesses, and other stakeholders. However e-Government has some specific features as opposed to traditional e-business scenarios, because of the enormous challenges it faces in achieving interoperability, integration and security, which are of interest to our dynamic Web service composition research and on which semantic Web service composition architecture could be properly demonstrated. From these reasons, we propose in this paper an approach for the composition of semantically described e- Government Web services, enabling citizens to dynamically compose services according to their goals and through a single point of access. {\textcopyright} 2005 - 2015 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84921987930\&partnerID=40\&md5=7328572edfa35d36ddcd880d57061a60}, author = {Adadi, A.a b and Berrada, M.a b and Chenouni, D.a b and Bounabat, B.a b} } @article {11060479520151029, title = {A semi-analytical performance prediction of a digital communication system using Fourier transform inversion.}, journal = {EURASIP Journal on Wireless Communications \& Networking}, volume = {2015}, number = {1}, year = {2015}, pages = {1 - 13}, abstract = {Analytical performance evaluation of a digital communication system remains a serious problem especially when a sophisticated digital signal processing is considered. Moreover, it is difficult to obtain the expected performance of such system using the Monte Carlo simulation method. In this paper, we propose a new semi-analytical approach for predicting error probability in a digital communication system. This approach is based on Fourier transform inversion formula to estimate the probability density function (pdf) of the observed soft sample at the receiver. Furthermore, we applied a bootstrap method for selecting the optimal smoothing parameter to make the proposed semi-analytical method more accurate. Simulation results show that the obtained semi-analytical error probability is close to the one measured using Monte Carlo simulation and provides a significant gain in terms of computing time. Besides, the use of the bootstrap method decreases the squared error between the true pdf}, keywords = {Bit error probability, Bit error rate {\textendash} Research, Digital communications {\textendash} Research, Fourier transform infrared spectroscopy {\textendash} Research, Fourier transform inversion, Monte Carlo method {\textendash} Research, pdf, Semi-analytical approach, Signal processing {\textendash} Digital techniques {\textendash} Research, Smoothing parameter}, issn = {16871472}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=110604795\&site=ehost-live}, author = {Naamane, Fatima and Et-tolba, Mohamed and Belkasmi, Mostafa} } @article {Naamane2015, title = {A semi-analytical performance prediction of a digital communication system using Fourier transform inversion}, journal = {Eurasip Journal on Wireless Communications and Networking}, volume = {2015}, number = {1}, year = {2015}, note = {cited By 0}, abstract = {Analytical performance evaluation of a digital communication system remains a serious problem especially when a sophisticated digital signal processing is considered. Moreover, it is difficult to obtain the expected performance of such system using the Monte Carlo simulation method. In this paper, we propose a new semi-analytical approach for predicting error probability in a digital communication system. This approach is based on Fourier transform inversion formula to estimate the probability density function (pdf) of the observed soft sample at the receiver. Furthermore, we applied a bootstrap method for selecting the optimal smoothing parameter to make the proposed semi-analytical method more accurate. Simulation results show that the obtained semi-analytical error probability is close to the one measured using Monte Carlo simulation and provides a significant gain in terms of computing time. Besides, the use of the bootstrap method decreases the squared error between the true pdf and the estimated one. {\textcopyright} 2015, Naamane et al.}, doi = {10.1186/s13638-015-0467-2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84945334687\&doi=10.1186\%2fs13638-015-0467-2\&partnerID=40\&md5=65b273dd6e260c94dadf1b8ec22e96ac}, author = {Naamane, F.E.a and Et-tolba, M.b and Belkasmi, M.a} } @article { ISI:000379488000001, title = {A semi-analytical performance prediction of a digital communication system using Fourier transform inversion}, journal = {EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING}, year = {2015}, month = {OCT 29}, abstract = {Analytical performance evaluation of a digital communication system remains a serious problem especially when a sophisticated digital signal processing is considered. Moreover, it is difficult to obtain the expected performance of such system using the Monte Carlo simulation method. In this paper, we propose a new semi-analytical approach for predicting error probability in a digital communication system. This approach is based on Fourier transform inversion formula to estimate the probability density function (pdf) of the observed soft sample at the receiver. Furthermore, we applied a bootstrap method for selecting the optimal smoothing parameter to make the proposed semi-analytical method more accurate. Simulation results show that the obtained semi-analytical error probability is close to the one measured using Monte Carlo simulation and provides a significant gain in terms of computing time. Besides, the use of the bootstrap method decreases the squared error between the true pdf and the estimated one.}, issn = {1687-1499}, doi = {10.1186/s13638-015-0467-2}, author = {Ezzahra Naamane, Fatima and Et-tolba, Mohamed and Belkasmi, Mostafa} } @conference {Mabrouk2015, title = {A signaling game-based mechanism to meet always best connected service in VANETs}, booktitle = {2015 IEEE Global Communications Conference, GLOBECOM 2015}, year = {2015}, note = {cited By 0}, abstract = {In heterogeneous network environments, users need to have mechanisms in place to decide which network is the most suitable at each moment in time for every application that the user requires. Always Best Connected is considered as a special concept to allow users to get connected to Internet using the access technology that best suits their needs or profile at any point in time. Clearly, this concept provides multiple access simultaneously for mobile users moving in heterogeneous access network environment. In this paper, we introduce a signaling game approach to achieve an always best connected service in vehicular networks. Under the considered scenario, we consider two smart vehicles named player 1 and player 2 moving in a road network area equipped with heterogeneous access networks. We assume that player 1 (super player) only has complete information on the road network, whilst player 2 has not any information. Player 1 plays first and sends a signal to player 2 which can be accurate or distorted. Based on the received signal and his belief about that signal, player 2 chooses its own action: it computes its suitable path which provides it an always best connected service. {\textcopyright} 2015 IEEE.}, doi = {10.1109/GLOCOM.2014.7417000}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964825756\&doi=10.1109\%2fGLOCOM.2014.7417000\&partnerID=40\&md5=0828f76d9a6461e859d500b7196f2452}, author = {Mabrouk, A.a and Kobbane, A.a and Sabir, E.b and Ben-Othman, J.c and El Koutbi, M.a} } @conference { ISI:000382389300061, title = {A Signaling Game-based Mechanism to Meet Always Best Connected Service in VANETs}, booktitle = {2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)}, series = {IEEE Global Communications Conference}, year = {2015}, note = {IEEE Global Communications Conference (GLOBECOM), San Diego, CA, DEC 06-10, 2015}, publisher = {IEEE; QUALCOMM; Keysight Technologies; Huawei; Natl Instruments; Intel; InterDigital; LG Elect; IEEE Big Data; IEEE Stand Assoc; ViaSat; IEEE Commun Soc}, organization = {IEEE; QUALCOMM; Keysight Technologies; Huawei; Natl Instruments; Intel; InterDigital; LG Elect; IEEE Big Data; IEEE Stand Assoc; ViaSat; IEEE Commun Soc}, abstract = {In heterogeneous network environments, users need to have mechanisms in place to decide which network is the most suitable at each moment in time for every application that the user requires. Always Best Connected is considered as a special concept to allow users to get connected to Internet using the access technology that best suits their needs or profile at any point in time. Clearly, this concept provides multiple access simultaneously for mobile users moving in heterogeneous access network environment. In this paper, we introduce a signaling game approach to achieve an always best connected service in vehicular networks. Under the considered scenario, we consider two smart vehicles named player 1 and player 2 moving in a road network area equipped with heterogeneous access networks. We assume that player 1 (super player) only has complete information on the road network, whilst player 2 has not any information. Player 1 plays first and sends a signal to player 2 which can be accurate or distorted. Based on the received signal and his belief about that signal, player 2 chooses its own action: it computes its suitable path which provides it an always best connected service.}, isbn = {978-1-4799-5952-5}, issn = {2334-0983}, author = {Mabrouk, Abdelfettah and Kobbane, Abdellatif and Sabir, Essaid and Ben-Othman, Jalel and El Koutbi, Mohammed} } @conference {Talei2015, title = {Smart campus microgrid: Advantages and the main architectural components}, booktitle = {Proceedings of 2015 IEEE International Renewable and Sustainable Energy Conference, IRSEC 2015}, year = {2015}, note = {cited By 0}, abstract = {With a world wild increase in electricity demand, smart grids emerged as a solution for various problems within the current electrical grid. Some novel aspects about smart grids are the use renewable energy sources, energy storage and also allowing the user to take some decisions to control energy use. Microgrids are building blocks of smart grids and given that academic campuses are very good contributors to energy consumption, their energy consumption can be efficiently controlled by using an energy management system. This paper focuses on the importance of smart campuses with an emphasis on the importance of an energy management system. {\textcopyright} 2015 IEEE.}, doi = {10.1109/IRSEC.2015.7455093}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84968584100\&doi=10.1109\%2fIRSEC.2015.7455093\&partnerID=40\&md5=0b0289ab22afeb7da6d364c794b3c54a}, author = {Talei, H.a and Zizi, B.a and Abid, M.R.a and Essaaidi, M.b and Benhaddou, D.c and Khalil, N.c} } @conference { ISI:000382162300171, title = {Smart Campus Microgrid: Advantages and the Main Architectural Components}, booktitle = {PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC{\textquoteright}15)}, year = {2015}, note = {3rd IEEE International Renewable and Sustainable Energy Conference (IRSEC), Marrakech, MOROCCO, DEC 10-13, 2015}, pages = {810-816}, publisher = {IEEE}, organization = {IEEE}, abstract = {With a world wild increase in electricity demand, smart grids emerged as a solution for various problems within the current electrical grid. Some novel aspects about smart grids are the use renewable energy sources, energy storage and also allowing the user to take some decisions to control energy use. Microgrids are building blocks of smart grids and given that academic campuses are very good contributors to energy consumption, their energy consumption can be efficiently controlled by using an energy management system. This paper focuses on the importance of smart campuses with an emphasis on the importance of an energy management system.}, isbn = {978-1-4673-7894-9}, author = {Talei, Hanaa and Zizi, Badr and Abid, Mohamed Riduan and Essaaidi, Mohamed and Benhaddou, Driss and Khalil, Nacer}, editor = {Essaaidi, M and Zaz, Y} } @conference {Berkani2015, title = {Soft-decision decoding by a compact genetic algorithm using higher selection pressure}, booktitle = {International Conference on Wireless Networks and Mobile Communications, WINCOM 2015}, year = {2015}, note = {cited By 1}, abstract = {Selection pressure controls the selection of individuals from one population to the next. It gives individuals of higher quality, higher probability of being used to create the next generation, and so for the algorithm to focus on promising regions in the search space. This paper introduces higher selection pressure to soft-decision decoding based on compact Genetic Algorithms(cGAD), and shows the effectiveness of tournament selection in the performances of the decoder. The effect of tournament size is also studied, and the new decoder based on higher selection pressure outperforms Chase-2 algorithm. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WINCOM.2015.7381308}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84965013753\&doi=10.1109\%2fWINCOM.2015.7381308\&partnerID=40\&md5=b9dbc3ea41fe5d23850cbcb72d0df592}, author = {Berkani, A.a and Azouaoui, A.b and Belkasmi, M.a} } @conference { ISI:000380509200011, title = {Soft-decision Decoding by a compact Genetic Algorithm using higher selection pressure}, booktitle = {2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM)}, year = {2015}, note = {International conference on wireless networks and mobile communications, Marrakech, MOROCCO, OCT 20-23, 2015}, pages = {58-63}, abstract = {Selection pressure controls the selection of individuals from one population to the next. It gives individuals of higher quality, higher probability of being used to create the next generation, and so for the algorithm to focus on promising regions in the search space. This paper introduces higher selection pressure to soft-decision decoding based on compact Genetic Algorithms(cGAD), and shows the effectiveness of tournament selection in the performances of the decoder. The effect of tournament size is also studied, and the new decoder based on higher selection pressure outperforms Chase-2 algorithm.}, isbn = {978-1-4673-8224-3}, author = {Berkani, Ahlam and Azouaoui, Ahmed and Belkasmi, Mostafa} } @conference {ElBajta2015197, title = {Software cost estimation for global software development: A systematic map and review study}, booktitle = {ENASE 2015 - Proceedings of the 10th International Conference on Evaluation of Novel Approaches to Software Engineering}, year = {2015}, note = {cited By 1}, pages = {197-206}, abstract = {Software cost estimation plays a central role in the success of software project management in the context of global software development (GSD). The importance of mastering software cost estimation may appear to be obvious. However, as regards the issue of customer satisfaction, end-users are often unsatisfied with software project management results. In this paper, a systematic mapping study (SMS) is carried out with the aim of summarising software cost estimation in the context of GSD research by answering nine mapping questions. A total, of 16 articles were selected and classified according to nine criteria: publication source, publication year, research type, research approach, contribution type, software cost estimation techniques, software cost estimation activity, cost drivers and cost estimation performances for GSD projects. The results show that the interest in estimating software cost for GSD projects has increased in recent years and reveal that conferences are the most frequently targeted publications. Most software cost estimation for GSD research has focused on theory. The dominant contribution type of software cost estimation for GSD research is that of models, while the predominant activity was identified as being software development cost. Identifying empirical solutions to address software cost estimation for GSD is a promising direction for researchers.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84933555636\&partnerID=40\&md5=3e6ff23ed380cdb81d078b9b47e09964}, author = {El Bajta, M.a and Idri, A.a and Fern{\'a}ndez-Alem{\'a}n, J.L.b and Ros, J.N.b and Toval, A.b} } @conference { ISI:000380403000023, title = {Software Cost Estimation for Global Software Development A Systematic Map and Review Study}, booktitle = {ENASE 2015 - PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING}, year = {2015}, note = {10th International Conference on Evaluation of Novel Approaches to Software Engineering, Barcelona, SPAIN, APR 29-30, 2015}, pages = {197-206}, publisher = {Inst Syst \& Technol Information, Control \& Commun; Tech Council Software Engn; IEEE Comp Soc}, organization = {Inst Syst \& Technol Information, Control \& Commun; Tech Council Software Engn; IEEE Comp Soc}, abstract = {Software cost estimation plays a central role in the success of software project management in the context of global software development (GSD). The importance of mastering software cost estimation may appear to be obvious. However, as regards the issue of customer satisfaction, end-users are often unsatisfied with software project management results. In this paper, a systematic mapping study (SMS) is carried out with the aim of summarising software cost estimation in the context of GSD research by answering nine mapping questions. A total, of 16 articles were selected and classified according to nine criteria: publication source, publication year, research type, research approach, contribution type, software cost estimation techniques, software cost estimation activity, cost drivers and cost estimation performances for GSD projects. The results show that the interest in estimating software cost for GSD projects has increased in recent years and reveal that conferences are the most frequently targeted publications. Most software cost estimation for GSD research has focused on theory. The dominant contribution type of software cost estimation for GSD research is that of models, while the predominant activity was identified as being software development cost. Identifying empirical solutions to address software cost estimation for GSD is a promising direction for researchers.}, isbn = {978-9-8975-8143-4}, author = {El Bajta, Manal and Idri, Ali and Luis Fernandez-Aleman, Jose and Nicolas Ros, Joaquin and Toval, Ambrosio}, editor = {Filipe, J and Maciaszek, L} } @conference { ISI:000382162300064, title = {A State-Feedback Approach for Controlling Ventilation Systems in Energy Efficient Buildings}, booktitle = {PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC{\textquoteright}15)}, year = {2015}, note = {3rd IEEE International Renewable and Sustainable Energy Conference (IRSEC), Marrakech, MOROCCO, DEC 10-13, 2015}, pages = {665-670}, publisher = {IEEE}, organization = {IEEE}, abstract = {On the fast actual demographic trend and increasing comfort level, consumers are becoming more and more demanding in the areas of heating, cooling, ventilation, air conditioning, and lighting. Heating, Ventilating and Air Conditioning (HVAC) is one of most studied systems in energy efficient buildings within the aim to keep occupants{\textquoteright} comfort with desired temperature ranges, a suitable level of humidity, and good air quality. Recent studies showed that using information and communication technologies will have a significant impact on improving energy efficiency in real buildings. The main aim of these studies is to develop energy control approaches to improve energy performance and occupant comfort in buildings. In this paper, a CO2-based strategy using a state feedback technique for controlling mechanical ventilation systems in energy-efficient building is proposed. The principal objective of the developed controller is to improve optimal balance between energy efficiency and indoor air quality by maintaining the indoor CO2 concentration at the comfort set point with an efficient ventilation rate while reducing energy consumption. The ventilation system is analysed, modeled, and simulated. The simulation results are reported to show the efficiency of the proposed control approach compared to the traditional On/Off and the PI ventilation control.}, isbn = {978-1-4673-7894-9}, author = {Lachhab, Fadwa and Essaaidi, Mohammed and Bakhouya, Mohamed and Ouladsine, Radouane}, editor = {Essaaidi, M and Zaz, Y} } @conference {Lachhab2015, title = {A state-feedback approach for controlling ventilation systems in energy efficient buildings}, booktitle = {Proceedings of 2015 IEEE International Renewable and Sustainable Energy Conference, IRSEC 2015}, year = {2015}, note = {cited By 0}, abstract = {On the fast actual demographic trend and increasing comfort level, consumers are becoming more and more demanding in the areas of heating, cooling, ventilation, air conditioning, and lighting. Heating, Ventilating and Air Conditioning (HVAC) is one of most studied systems in energy efficient buildings within the aim to keep occupants{\textquoteright} comfort with desired temperature ranges, a suitable level of humidity, and good air quality. Recent studies showed that using information and communication technologies will have a significant impact on improving energy efficiency in real buildings. The main aim of these studies is to develop energy control approaches to improve energy performance and occupant comfort in buildings. In this paper, a CO2-based strategy using a state feedback technique for controlling mechanical ventilation systems in energy-efficient building is proposed. The principal objective of the developed controller is to improve optimal balance between energy efficiency and indoor air quality by maintaining the indoor CO2 concentration at the comfort set point with an efficient ventilation rate while reducing energy consumption. The ventilation system is analysed, modeled, and simulated. The simulation results are reported to show the efficiency of the proposed control approach compared to the traditional On/Off and the PI ventilation control. {\textcopyright} 2015 IEEE.}, doi = {10.1109/IRSEC.2015.7454986}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84968698110\&doi=10.1109\%2fIRSEC.2015.7454986\&partnerID=40\&md5=0d48ca55b85b4622262ec6f0a5b868d2}, author = {Lachhab, F.a and Essaaidi, M.a and Bakhouya, M.b and Ouladsine, R.b} } @conference {Bennasar2015, title = {State-of-The-Art of cloud computing cyber-security}, booktitle = {Proceedings of 2015 IEEE World Conference on Complex Systems, WCCS 2015}, year = {2015}, note = {cited By 0}, abstract = {During the last few years, there has been a rapid and an increasing development and adoption of cloud computing systems, technologies, applications and services. This is owing mainly to many benefits this technology offers for businesses and organizations. However, Cyber-security is considered among the most important issues and concerns for widespread adoption of cloud computing. Among the major issues related with Cloud Computing security we can mention data security, intrusions attacks, confidentiality and data integrity. This paper is dedicated to an overview study of the state of the art of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed. {\textcopyright} 2015 IEEE.}, doi = {10.1109/ICoCS.2015.7483283}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978370423\&doi=10.1109\%2fICoCS.2015.7483283\&partnerID=40\&md5=ed4ec91d44f7a0c8d8539a8666bf48f0}, author = {Bennasar, H.a and Essaaidi, M.b and Bendahmane, A.c and Ben-Othman, J.d} } @conference { ISI:000380409500011, title = {Strategic Alignment and Information System project portfolio optimization model}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {With the evolution of Information and Communication Technology (ICT), Information Systems (IS) have become complex and difficult to control in the absence of definite necessary accompanying measures and lack of adherence of all stakeholders. Thus, a serious problem has faced organizations: how to develop Information Systems that provide both a better alignment with the organization{\textquoteright}s business strategy and a better added value? In this paper, we propose an optimization model that addresses this problem by providing a strategic alignment (SA) approach of IS projects while maximizing the value of projects. Strategic alignment is evaluated according to a well defined process that determines strategic axes, operational objectives, processes and functions of the information system to be developed according to a target of functional architecture. The project value is calculated according to criteria that each organization could define (estimated financial benefit, risk control, environmental efficiency, etc.). The model allows for determining IS project portfolio by taking into account the synergy created by projects that are located in the same portfolio, the constraints related to projects and resources.}, isbn = {978-1-5090-0220-7}, author = {Jadda, Salah and Janati Idrissi, Mohammed Abdou} } @conference {Jadda2015, title = {Strategic Alignment and Information System project portfolio optimization model}, booktitle = {2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015}, year = {2015}, note = {cited By 0}, abstract = {With the evolution of Information and Communication Technology (ICT), Information Systems (IS) have become complex and difficult to control in the absence of definite necessary accompanying measures and lack of adherence of all stakeholders. Thus, a serious problem has faced organizations: how to develop Information Systems that provide both a better alignment with the organization{\textquoteright}s business strategy and a better added value? In this paper, we propose an optimization model that addresses this problem by providing a strategic alignment (SA) approach of IS projects while maximizing the value of projects. Strategic alignment is evaluated according to a well defined process that determines strategic axes, operational objectives, processes and functions of the information system to be developed according to a target of functional architecture. The project value is calculated according to criteria that each organization could define (estimated financial benefit, risk control, environmental efficiency, etc.). The model allows for determining IS project portfolio by taking into account the synergy created by projects that are located in the same portfolio, the constraints related to projects and resources. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SITA.2015.7358385}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962467704\&doi=10.1109\%2fSITA.2015.7358385\&partnerID=40\&md5=6edfeae3235041e1db4422fa70da3d8d}, author = {Jadda, S. and Janati Idrissi, M.A.} } @conference {Naciri2015, title = {A strategic release planning model from TPM point of view}, booktitle = {2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015}, year = {2015}, note = {cited By 0}, abstract = {Release planning is a tedious task, especially within the context of Third Party Application Maintenance (TPM). Software engineering fields acknowledge multiple methods and techniques applied to solve problems of release planning. However, few of them propose a pragmatic and decision support dedicated to TPM managers. This research attempts to apply theory and methods Searchbased software engineering (SBSE) area such as meta-heuristic techniques to solve complex release planning problems faced by TPM organizations. The aim of this paper is to introduce a strategic release planning model based on several TPM factors and constraints, allowing the TPM manager to carry out an effective roadmap and industrialize the planning process of software maintenance. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SITA.2015.7358396}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962468901\&doi=10.1109\%2fSITA.2015.7358396\&partnerID=40\&md5=bbfbc768cb33ef2e5678536a26d6e8ca}, author = {Naciri, S. and Janati Idrissi, M.A. and Kerzazi, N.} } @conference { ISI:000380409500022, title = {A Strategic Release Planning model from TPM point of view}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {Release planning is a tedious task, especially within the context of Third Party Application Maintenance (TPM). Software engineering fields acknowledge multiple methods and techniques applied to solve problems of release planning. However, few of them propose a pragmatic and decision support dedicated to TPM managers. This research attempts to apply theory and methods Search-based software engineering (SBSE) area such as meta-heuristic techniques to solve complex release planning problems faced by TPM organizations. The aim of this paper is to introduce a strategic release planning model based on several TPM factors and constraints, allowing the TPM manager to carry out an effective roadmap and industrialize the planning process of software maintenance.}, isbn = {978-1-5090-0220-7}, author = {Naciri, Samia and Janati Idrissi, Mohammed Abdou and Kerzazi, Noureddine} } @article { ISI:000366991600005, title = {Students{\textquoteright} Perceptions Towards Using Web 2.0 Technologies in Education}, journal = {INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING}, volume = {10}, number = {6}, year = {2015}, pages = {32-36}, abstract = {The purpose of this paper is to evaluate the usefulness of Web 2.0 technologies in education. For this purpose, a survey was carried out to explore the students{\textquoteright} perceptions towards using these tools for learning purposes. Results of the research study revealed that all the respondents are greatly immersed in these social platforms and use them for many reasons. However, it was found out that almost half of the surveyed students (i.e. 47\%) devote more than 40\% of the time they spend on Web 2.0 technologies to enhance their learning in different subjects. Taking these findings into consideration, we can stipulate that Web 2.0 applications present many educational advantages for students, hence, contribute in providing opportunities for further learning. Consequently, these online tools provide schools and universities with more opportunities to go beyond traditional delivery formats and develop learnercentered personalized learning environments.}, issn = {1868-8799}, doi = {10.3991/ijet.v10i6.4858}, author = {Faizi, Rdouan and Chiheb, Raddouane and El Afia, Abdellatif} } @article {Faizi201532, title = {Students{\textquoteright} perceptions towards using Web 2.0 technologies in education}, journal = {International Journal of Emerging Technologies in Learning}, volume = {10}, number = {6}, year = {2015}, note = {cited By 0}, pages = {32-36}, abstract = {The purpose of this paper is to evaluate the usefulness of Web 2.0 technologies in education. For this purpose, a survey was carried out to explore the students{\textquoteright} perceptions towards using these tools for learning purposes. Results of the research study revealed that all the respondents are greatly immersed in these social platforms and use them for many reasons. However, it was found out that almost half of the surveyed students (i.e. 47\%) devote more than 40\% of the time they spend on Web 2.0 technologies to enhance their learning in different subjects. Taking these findings into consideration, we can stipulate that Web 2.0 applications present many educational advantages for students, hence, contribute in providing opportunities for further learning. Consequently, these online tools provide schools and universities with more opportunities to go beyond traditional delivery formats and develop learnercentered personalized learning environments.}, doi = {10.3991/ijet.v10i6.4858}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84952788796\&doi=10.3991\%2fijet.v10i6.4858\&partnerID=40\&md5=c22befa5ff5f3e9fcbbfe17e466aeee9}, author = {Faizi, R. and Chiheb, R. and El Afia, A.} } @conference { ISI:000380439700114, title = {Systematic Mapping Study of Missing Values Techniques in Software Engineering Data}, booktitle = {2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD)}, year = {2015}, note = {16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Takamatsu, JAPAN, JUN 01-03, 2015}, pages = {671-678}, publisher = {IEEE; ACIS}, organization = {IEEE; ACIS}, abstract = {Missing Values (MV) present a serious problem facing research in software engineering (SE) which is mainly based on statistical and/or data mining analysis of SE data. The simple method of dealing with MV is to ignore data with missing observations. This leads to losing valuable information and then obtaining biased results. Therefore, various techniques have been developed to deal adequately with MV, especially those based on imputation methods. In this paper, a systematic mapping study was carried out to summarize the existing techniques dealing with MV in SE datasets and to classify the selected studies according to six classification criteria: research type, research approach, MV technique, MV type, data types and MV objective. Publication channels and trends were also identified. As results, 35 papers concerning MV treatments of SE data were selected. This study shows an increasing interest in machine learning (ML) techniques especially the K-nearest neighbor algorithm (KNN) to deal with MV in SE datasets and found that most of the MV techniques are used to serve software development effort estimation techniques.}, isbn = {978-1-4799-8676-7}, author = {Idri, Ali and Abnane, Ibtissam and Abran, Alain}, editor = {Saisho, K} } @conference {Idri2015, title = {Systematic mapping study of missing values techniques in software engineering data}, booktitle = {2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015 - Proceedings}, year = {2015}, note = {cited By 0}, abstract = {Missing Values (MV) present a serious problem facing research in software engineering (SE) which is mainly based on statistical and/or data mining analysis of SE data. The simple method of dealing with MV is to ignore data with missing observations. This leads to losing valuable information and then obtaining biased results. Therefore, various techniques have been developed to deal adequately with MV, especially those based on imputation methods. In this paper, a systematic mapping study was carried out to summarize the existing techniques dealing with MV in SE datasets and to classify the selected studies according to six classification criteria: research type, research approach, MV technique, MV type, data types and MV objective. Publication channels and trends were also identified. As results, 35 papers concerning MV treatments of SE data were selected. This study shows an increasing interest in machine learning (ML) techniques especially the K-nearest neighbor algorithm (KNN) to deal with MV in SE datasets and found that most of the MV techniques are used to serve software development effort estimation techniques. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SNPD.2015.7176280}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84947080832\&doi=10.1109\%2fSNPD.2015.7176280\&partnerID=40\&md5=d82d376ab83550a21470787ee8a42f45}, author = {Idri, A.a and Abnane, I.a and Abran, A.b} } @conference {Maarof201411, title = {Security analysis of low cost RFID systems}, booktitle = {WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems}, year = {2014}, note = {cited By 2}, pages = {11-16}, abstract = {RFID technology attracts strong interest worldwide; it provides a means for automatic identification of objects and is regarded as an indispensable part in the vision of the Internet of things. With the aid of RFID systems, life shall become more convenient and businesses shall become more productive. The low cost RFID technology faces serious security and privacy threats, wireless communication and cost-down consideration on RFID systems are the two main factors that cause these security threats. In order to comply with the resource constraint, a few new authentication protocols with lightweight encryptions are invented to fit the physical limitation of a passive tag. However, those proposed schemes cannot provide enough security level in general; more specifically, they cannot prevent all major or general attacks such as eavesdropping, tracking, replay attack and Denial of Service, and preserve the forward secrecy of tagged object at the same time. {\textcopyright} 2014 IEEE.}, doi = {10.1109/WCCCS.2014.7107902}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84949928462\&doi=10.1109\%2fWCCCS.2014.7107902\&partnerID=40\&md5=6a46bc68b72d6d71ccd82de1c152cc52}, author = {Maarof, A. and Senhadji, M. and Labbi, Z. and Belkasmi, M.} } @conference { ISI:000349979900075, title = {A Semantic Approach for Service Adaptation in Context-Aware Environment}, booktitle = {9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC{\textquoteright}14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC{\textquoteright}14) / AFFILIATED WORKSHOPS}, series = {Procedia Computer Science}, volume = {34}, year = {2014}, note = {9th International Conference on Future Networks and Communications (FNC), Niagara Falls, CANADA, AUG 17-20, 2014}, pages = {587-592}, abstract = {With pervasive computing, Service oriented architectures become more mobile and distributed and are executed in varying contexts. Context is understood as any information about the user needs and operating environment which vary dynamically and have an impact on design choices. Context aware Services oriented systems have emerged as an underlying design and development paradigm. An important challenge in such systems is context modeling, reasoning and adaptating services behavior. Using ontologies and semantic web services to deal with context aware services has attracted a lot of interest. In this paper, we present an architecture for the development of context aware services based on ontologies. We highlight our context metamodel and discuss about reasoning process. we also present our semantic approach for service adaptation in context aware environment. (c) 2014 Elsevier B.V.}, issn = {1877-0509}, doi = {10.1016/j.procs.2014.07.077}, author = {Guermah, Hatim and Fissaa, Tarik and Hafiddi, Hatim and Nassar, Mahmoud and Kriouile, Abdelaziz}, editor = {Shakshuki, EM} } @conference {Faquih2014131, title = {Semantic variability modeling in business processes: A comparative study}, booktitle = {2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014}, year = {2014}, note = {cited By 2}, pages = {131-136}, abstract = {Business Process Management (BPM) is an approach that aligns information systems (IT view) with business processes (Business view). Both the dynamic environment of business and the fast changes in requirements have created the need to reuse business processes in order to gain in cost and time. To enhance reuse in BPM, significant research efforts have been made on the development of methods and languages in order to support variability modeling. However, there is no single standard for modeling variability in configurable process models. Each modeling language integrating variability proposes its own method for representing variability, and different representations are used to express the same variability concepts. In addition to that, human intervention is still mandatory in order to create, configure and evolve configurable process models. With semantic annotations and the usage of ontology, these tasks could be automated. In this paper, we propose a comparative study to assess variability modeling approaches in software engineering domains, which include software product line engineering, services engineering and process engineering. This comparative study is conducted in terms of semantics use. {\textcopyright} 2014 Infonomics Society.}, doi = {10.1109/ICITST.2014.7038792}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962362206\&doi=10.1109\%2fICITST.2014.7038792\&partnerID=40\&md5=f5188b09e77e3ca69d35da9a3d953678}, author = {Faquih, L.E. and Sba{\"\i}, H. and Fredj, M.} } @conference { ISI:000380428300019, title = {Semantic Variability Modeling in Business Processes: A Comparative Study}, booktitle = {2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST)}, year = {2014}, note = {International Conference for Internet Technology and Secured Transactions{*}, London, ENGLAND, DEC 08-10, 2014}, pages = {131-136}, abstract = {Business Process Management (BPM) is an approach that aligns information systems (IT view) with business processes (Business view). Both the dynamic environment of business and the fast changes in requirements have created the need to reuse business processes in order to gain in cost and time. To enhance reuse in BPM, significant research efforts have been made on the development of methods and languages in order to support variability modeling. However, there is no single standard for modeling variability in configurable process models. Each modeling language integrating variability proposes its own method for representing variability, and different representations are used to express the same variability concepts. In addition to that, human intervention is still mandatory in order to create, configure and evolve configurable process models. With semantic annotations and the usage of ontology, these tasks could be automated. In this paper, we propose a comparative study to assess variability modeling approaches in software engineering domains, which include software product line engineering, services engineering and process engineering. This comparative study is conducted in terms of semantics use.}, isbn = {978-1-908320-39-1}, author = {El Faquih, Loubna and Sbai, Hanae and Fredj, Mounia} } @conference {Bassiti20141173, title = {Semantic-based framework for innovation management}, booktitle = {Proceedings of the European Conference on Knowledge Management, ECKM}, volume = {3}, year = {2014}, note = {cited By 0}, pages = {1173-1182}, abstract = {In a turbulent and more competition-oriented environment, organizations need to develop their ability to adapt quickly. To be able to adapt, an organization must, of course, be innovative and attractive, and successful innovation should be carefully planned and efficiently managed. Even if some researchers treat the early stages of innovation as "fuzzy" because of their uncertainty, we suppose, as many others that a well structured processes, a clear representation and a good designed management framework are crucial for the ultimate success of any innovation. Understanding the process of innovation is to understand the factors that facilitate and inhibit the success of innovations. A best understanding of how these factors are related will lead to define a proper representation and an efficient management framework supporting the innovation full lifecycle. In addition, organizations have become more aware of external knowledge and technology to maintain their competitiveness in the global market and they feel a growing need to open up their innovation processes. Therefore, to achieve successful innovation in an open context, it is necessary to overcome the challenge of integrating distributed and heterogeneous knowledge management systems. The emerging and rapid development of semantic technologies brings new opportunities and provides a promising direction for such challenge. Semantic technologies focus on the formalization of knowledge to create schemes that allow knowledge to be effectively stored, modified, shared, exchanged and reasoned. In this paper, a semantically-powered framework for innovation management is presented. This framework includes a new Lifecycle Model supporting all activities of innovation with a special focus on its front end stages; a Semantic Representation of innovation, based on three factors we have identified as cornerstones of any successful innovation and that supports a set of automatic and intelligent services such as annotation, relationship retrieval and semantic search; used to power the Core Services of our framework that aim to promote innovation, notably within an open context.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962909325\&partnerID=40\&md5=8b920d5c601c78dbb64678ed6a21c234}, author = {Bassiti, L.E. and Ajhoun, R.} } @conference { ISI:000351503500139, title = {Semantic-Based Framework for Innovation Management}, booktitle = {PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON KNOWLEDGE MANAGEMENT (ECKM 2014), VOLS 1-3}, series = {Proceedings of the European Conference on Knowledge Management}, year = {2014}, note = {15th European Conference on Knowledge Management (ECKM), Polytechn Inst Santarem, Santarem Sch Management \& Technol, Santarem, PORTUGAL, SEP 04-05, 2014}, pages = {1173-1182}, abstract = {In a turbulent and more competition- oriented environment, organizations need to develop their ability to adapt quickly. To be able to adapt, an organization must, of course, be innovative and attractive, and successful innovation should be carefully planned and efficiently managed. Even if some researchers treat the early stages of innovation as {\textquoteleft}{\textquoteleft}fuzzy{{\textquoteright}{\textquoteright}} because of their uncertainty, we suppose, as many others that a well structured processes, a clear representation and a good designed management framework are crucial for the ultimate success of any innovation. Understanding the process of innovation is to understand the factors that facilitate and inhibit the success of innovations. A best understanding of how these factors are related will lead to define a proper representation and an efficient management framework supporting the innovation full lifecycle. In addition, organizations have become more aware of external knowledge and technology to maintain their competitiveness in the global market and they feel a growing need to open up their innovation processes. Therefore, to achieve successful innovation in an open context, it is necessary to overcome the challenge of integrating distributed and heterogeneous knowledge management systems. The emerging and rapid development of semantic technologies brings new opportunities and provides a promising direction for such challenge. Semantic technologies focus on the formalization of knowledge to create schemes that allow knowledge to be effectively stored, modified, shared, exchanged and reasoned. In this paper, a semantically-powered framework for innovation management is presented. This framework includes a new Lifecycle Model supporting all activities of innovation with a special focus on its front end stages; a Semantic Representation of innovation, based on three factors we have identified as cornerstones of any successful innovation and that supports a set of automatic and intelligent services such as annotation, relationship retrieval and semantic search; used to power the Core Services of our framework that aim to promote innovation, notably within an open context.}, isbn = {978-1-910309-35-3}, issn = {2048-8963}, author = {El Bassiti, Lamyaa and Ajhoun, Rachida}, editor = {Vivas, C and Sequeira, P} } @article {Assad2014324, title = {Short: Intrusion detection quality analysis for homogeneous wireless sensor networks}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {8593 LNCS}, year = {2014}, note = {cited By 0}, pages = {324-329}, abstract = {In this paper we analyze the intrusion detection in a homogeneous Wireless Sensor Network that is defined as a mechanism to monitor and detect unauthorized intrusions or anomalous moving attackers in area of interest. The quality of deterministic deployment can be determined sufficiently by analysis, before the deployment. However, when random deployment is required, determining the deployment quality becomes challenging and depends directly on node density. The major question is centered on the network coverage problem, how can we guarantee that each point of the region is covered by the required number of sensors? To deal with this, probabilistic intrusion detection models are adopted, called single and multi sensing probability detection and the deployment quality issue is surveyed and analyzed in terms of coverage. We evaluate our probabilistic model in homogeneous wireless sensor network, in term of sensing range, node density, and intrusion distance. {\textcopyright} 2014 Springer International Publishing.}, doi = {10.1007/978-3-319-09581-3_24}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84905899551\&doi=10.1007\%2f978-3-319-09581-3_24\&partnerID=40\&md5=e868b83abeca52460109a066d8ddde51}, author = {Assad, N.a and Elbhiri, B.b and El Fkihi, S.c and Faqihi, M.A.c and Ouadou, M.a and Aboutajdine, D.a} } @article {Faizi201464, title = {Social media: An optimal virtual environment for learning foreign languages}, journal = {International Journal of Emerging Technologies in Learning}, volume = {9}, number = {5}, year = {2014}, note = {cited By 3}, pages = {64-66}, abstract = {The present paper aims at exploring the potential role that social media technologies play in learning foreign languages. For this purpose, a survey was carried out to examine students{\textquoteright} and language learners{\textquoteright} perceptions and attitudes about using these platforms. Results of the research study revealed that the great majority of the respondents actually use these web-based applications to enhance their language skills. Most importantly, they noted that social media contribute in improving their listening, reading, speaking and writing skills. Accordingly, we strongly recommend that instructors use these online tools in distant, blended, or face-to-face language learning settings.}, doi = {10.3991/ijet.v9i5.3911}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84907689668\&doi=10.3991\%2fijet.v9i5.3911\&partnerID=40\&md5=22bc806cdbaebe7f28f0b9664aa83c8f}, author = {Faizi, R. and El Afia, A. and Chiheb, R.} } @conference { ISI:000367082904073, title = {SOCIAL MEDIA AND EDUCATION: FRIENDS OR FOES?}, booktitle = {ICERI2014: 7TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION}, series = {ICERI Proceedings}, year = {2014}, note = {7th International Conference of Education, Research and Innovation (ICERI), Seville, SPAIN, NOV 17-19, 2014}, pages = {4410-4414}, abstract = {Though being relatively a recent addition to the internet landscape, social media have witnessed an exponential growth in the last few years. These are used today in every aspect of our personal and professional lives and are infiltrating nearly every field, including education. In fact, students all over the world are greatly immersed in these web-based applications and have recourse to them to interact with friends, play games and watch television and most importantly to learn. Given the increasing use of these technologies for educational purposes, many educators have started questioning the validity and usefulness of such tools in education, stating that they may distract students and disengage them from learning. The objective of this paper is, therefore, to evaluate the use of these social online platforms in education. To this end, a survey was conducted to examine the perceptions and attitudes of higher education students towards using these tools for learning purposes. Results of the research study revealed that 49\% of the informants devote more than 40\% of the time they spend on social media to enhance their learning experience. Concerning the students{\textquoteright} contributions on these social online platforms, it has been noticed that the great majority of the participants in the survey are active members in these networks as they tend to share learning materials and resources. Taking these findings into account, we may claim that social media applications present many educational advantages for students, hence, contribute in providing opportunities for further learning. As such, they provide educators with an opportunity to go beyond traditional delivery formats and design student-centered customized learning environments.}, isbn = {978-84-617-2484-0}, issn = {2340-1095}, author = {Faizi, Rdouan and El Afia, Abdellatif and Chiheb, Raddouane}, editor = {Chova, LG and Martinez, AL and Torres, IC} } @article {Amazal2014, title = {Software development effort estimation using classical and fuzzy analogy: A cross-validation comparative study}, journal = {International Journal of Computational Intelligence and Applications}, volume = {13}, number = {3}, year = {2014}, note = {cited By 4}, abstract = {Software effort estimation is one of the most important tasks in software project management. Of several techniques suggested for estimating software development effort, the analogy-based reasoning, or Case-Based Reasoning (CBR), approaches stand out as promising techniques. In this paper, the benefits of using linguistic rather than numerical values in the analogy process for software effort estimation are investigated. The performance, in terms of accuracy and tolerance of imprecision, of two analogy-based software effort estimation models (Classical Analogy and Fuzzy Analogy, which use numerical and linguistic values respectively to describe software projects) is compared. Three research questions related to the performance of these two models are discussed and answered. This study uses the International Software Benchmarking Standards Group (ISBSG) dataset and confirms the usefulness of using linguistic instead of numerical values in analogy-based software effort estimation models. {\textcopyright} Imperial College Press.}, doi = {10.1142/S1469026814500138}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908567208\&doi=10.1142\%2fS1469026814500138\&partnerID=40\&md5=7cc9c1aeaf80c1739df9a20546ac1885}, author = {Amazal, F.A.a and Idri, A.a and Abran, A.b} } @article { ISI:000345075300010, title = {Solving a mixed integer linear program with times setup for the steel-continuous casting planning and scheduling problem}, journal = {INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH}, volume = {52}, number = {24}, year = {2014}, month = {DEC 17}, pages = {7276-7296}, abstract = {In this paper, we present a novel model that generalise the steelmaking continuous casting planning and scheduling problem. The model includes three stages: converters namely CV, refining stands namely RS and continuous castings namely CC. The obtained problem can be formulated as a mathematical program with typical constraints, namely the times setup constraints. We develop a mixed integer linear program (MILP) to schedule several sequences of charges for more than two continuous castings devices. The aim is: (i) on one hand, to schedule a list of several sequences that are already ordered for each continuous casting with times setup between two successive sequences, (ii) on the other hand, to determine the optimal order of the successive sequences. We use a benchmark and randomly generated instances to test the model and solved by mean of the commercial software solver Cplex v12.5. These problems span a variety of instances varying from small to large sized instances with different intrinsec parameters as the availability date for a converter CV or the variation intervals of the start time for the first charge at the continuous casting CC stage. We analyse the efficiency of the proposed model based on the CPU time and show the time limitations of the model for large instances. Also, we show the robustness of the model when modifying the initial (starting) state.}, issn = {0020-7543}, doi = {10.1080/00207543.2014.919421}, author = {Sbihi, Abdelkader and Bellabdaoui, Adil and Teghem, Jacques} } @article {Sbihi20147276, title = {Solving a mixed integer linear program with times setup for the steel-continuous casting planning and scheduling problem}, journal = {International Journal of Production Research}, volume = {52}, number = {24}, year = {2014}, note = {cited By 3}, pages = {7276-7296}, abstract = {In this paper, we present a novel model that generalise the steelmaking continuous casting planning and scheduling problem. The model includes three stages: converters namely CV, refining stands namely RS and continuous castings namely CC. The obtained problem can be formulated as a mathematical program with typical constraints, namely the times setup constraints. We develop a mixed integer linear program (MILP) to schedule several sequences of charges for more than two continuous castings devices. The aim is: (i) on one hand, to schedule a list of several sequences that are already ordered for each continuous casting with times setup between two successive sequences, (ii) on the other hand, to determine the optimal order of the successive sequences. We use a benchmark and randomly generated instances to test the model and solved by mean of the commercial software solver Cplex v12.5. These problems span a variety of instances varying from small to large sized instances with different intrinsec parameters as the availability date for a converter CV or the variation intervals of the start time for the first charge at the continuous casting CC stage. We analyse the efficiency of the proposed model based on the CPU time and show the time limitations of the model for large instances. Also, we show the robustness of the model when modifying the initial (starting) state. {\textcopyright} 2014 Taylor \& Francis.}, doi = {10.1080/00207543.2014.919421}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84911986589\&doi=10.1080\%2f00207543.2014.919421\&partnerID=40\&md5=92cb3ea55263ea6884dc60521a45bded}, author = {Sbihi, A.a and Bellabdaoui, A.b and Teghem, J.c} } @article {9954595520141215, title = {Solving a mixed integer linear program with times setup for the steel-continuous casting planning and scheduling problem.}, journal = {International Journal of Production Research}, volume = {52}, number = {24}, year = {2014}, pages = {7276 - 7296}, abstract = {In this paper, we present a novel model that generalise the steelmaking continuous casting planning and scheduling problem. The model includes three stages: converters namely CV, refining stands namely RS and continuous castings namely CC. The obtained problem can be formulated as a mathematical program with typical constraints, namely the times setup constraints. We develop a mixed integer linear program (MILP) to schedule several sequences of charges for more than two continuous castings devices. The aim is: (i) on one hand, to schedule a list of several sequences that are already ordered for each continuous casting with times setup between two successive sequences, (ii) on the other hand, to determine the optimal order of the successive sequences. We use a benchmark and randomly generated instances to test the model and solved by mean of the commercial software solverCplex v12.5. These problems span a variety of instances varying from small to large sized instances with different i}, keywords = {Continuous casting, Linear programming, Mathematical models, Mathematical optimization, MILP, Mixed integer linear programming, optimisation, planning, Scheduling, setup, steel}, issn = {00207543}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=bth\&AN=99545955\&site=ehost-live}, author = {Sbihi, Abdelkader and Bellabdaoui, Adil and Teghem, Jacques} } @article { ISI:000345075300025, title = {Solving a Mixed Integer Linear Program with Times Setup for the Steel-Continuous Casting Planning and Scheduling Problem (vol 52, pg 7276, 2014)}, journal = {INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH}, volume = {52}, number = {24}, year = {2014}, month = {DEC 17}, pages = {7549}, issn = {0020-7543}, doi = {10.1080/00207543.2014.969490}, author = {Sbihi, Abdelkader and Bellabdaoui, Adil and Teghem, Jacques} } @conference { ISI:000346582400027, title = {Stochastic Model Predictive Control for costs optimization in a supply chain under a stochastic demand}, booktitle = {PROCEEDINGS OF 2014 2ND IEEE INTERNATIONAL CONFERENCE ON LOGISTICS AND OPERATIONS MANAGEMENT (GOL 2014)}, year = {2014}, note = {2nd IEEE International Conference on Logistics Operations Management (GOL), Rabat, MOROCCO, JUN 05-07, 2014}, pages = {172-175}, publisher = {IEEE; Mohammed VI Souissi Univ, ENSIAS Sch; Univ Le Havre; Sidi Mohamed Ben Abdellah Univ, FST}, organization = {IEEE; Mohammed VI Souissi Univ, ENSIAS Sch; Univ Le Havre; Sidi Mohamed Ben Abdellah Univ, FST}, abstract = {This paper aims to present a Stochastic Model Predictive Control to optimize the costs of shipping and storage in a supply chain. The goal is to minimize the objective function of the combined costs in a multi-stage and a multi-level supply chain responding to a stochastic multi-product demand. The simulation using Matlab provides a comparison between classical models and the proposed model, and shows that the Affine Recourse Stochastic Model Predictive Control - AR SMPC offers better results.}, isbn = {978-1-4799-4650-1}, author = {Kawtar, Tikito and Said, Achchab and Youssef, Benadada}, editor = {Benadada, Y} } @conference {Kawtar2014171, title = {Stochastic Model Predictive Control for costs optimization in a supply chain under a stochastic demand}, booktitle = {Proceedings of 2nd IEEE International Conference on Logistics Operations Management, GOL 2014}, year = {2014}, note = {cited By 1}, pages = {171-175}, abstract = {This paper aims to present a Stochastic Model Predictive Control to optimize the costs of shipping and storage in a supply chain. The goal is to minimize the objective function of the combined costs in a multi-stage and a multi-level supply chain responding to a stochastic multi-product demand. The simulation using Matlab provides a comparison between classical models and the proposed model, and shows that the Affine Recourse Stochastic Model Predictive Control - AR SMPC offers better results. {\textcopyright} 2014 IEEE.}, doi = {10.1109/GOL.2014.6887436}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908611786\&doi=10.1109\%2fGOL.2014.6887436\&partnerID=40\&md5=4a6eec4c578041a83cf910609deb9598}, author = {Kawtar, T. and Said, A. and Youssef, B.} } @conference { ISI:000366999600190, title = {Support for resources changes in configurable process models}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {1082-1087}, abstract = {Today, researches on business process models reuse are interested in configurable process modeling which is an important approach for reusing and customizing business process models with a set of process variants. However, enterprises are involved in a competitive environment which imposes them to often evolve their configurable process models in terms of activity, data and resource. So, creating configurable process models becomes insufficient since the configurable process models should evolve to meet new needs. To address this issue, we propose a reusable process patterns system for guiding designers in managing changes and evolution of configurable process models. In this paper, we focus on how to manage resources changes. We present one pattern of our proposed system, the variation point resource insertion process pattern.}, isbn = {978-1-4799-3824-7}, author = {Sbai, Hanae and Fredj, Mounia and Kjiri, Laila} } @conference {Sbai20141082, title = {Support for resources changes in configurable process models}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 1}, pages = {1082-1087}, abstract = {Today, researches on business process models reuse are interested in configurable process modeling which is an important approach for reusing and customizing business process models with a set of process variants. However, enterprises are involved in a competitive environment which imposes them to often evolve their configurable process models in terms of activity, data and resource. So, creating configurable process models becomes insufficient since the configurable process models should evolve to meet new needs. To address this issue, we propose a reusable process patterns system for guiding designers in managing changes and evolution of configurable process models. In this paper, we focus on how to manage resources changes. We present one pattern of our proposed system, the variation point resource insertion process pattern. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911319}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928751275\&doi=10.1109\%2fICMCS.2014.6911319\&partnerID=40\&md5=c8fd1066a03aedd1bcdb5fedc72a9dec}, author = {Sba{\"\i}, H. and Fredj, M. and Kjiri, L.} } @conference { ISI:000366999600115, title = {A Support Model for Tutoring to Facilitate and Automate Tutoring Interventions}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {652-657}, abstract = {Several approaches have been used to improve online learning systems and make training more attractive and beneficial for learners. One of a prominent approach is to the e-Tutoring that can provide a personalized and continuous support aiming to increase learners{\textquoteright} motivation, reduce feelings of isolation and avoid failure and abandonment in training. We offer in our work a support model for tutoring supporting the tutor{\textquoteright}s actions; this model collects and organize the majority of tutoring interventions to be exploited by a tutor agent in order to (1) facilitate the work of human tutor in the reuse of recorded interventions and in the choice of the most suitable to learning context and learner{\textquoteright}s learning profile, and (2) automate certain procedures for alleviate the work of human tutor of repetitive tasks, simple but boring, and for assist him in order to cope with the important number of learners requiring personalized support.}, isbn = {978-1-4799-3824-7}, author = {Fatima-Zahra, Ammor and Driss, Bouzidi and Amina, Elomri} } @conference {Ammor2014646, title = {A support model for tutoring to facilitate and automate tutoring interventions}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 1}, pages = {646-651}, abstract = {Several approaches have been used to improve online learning systems and make training more attractive and beneficial for learners. One of a prominent approach is to the e-Tutoring that can provide a personalized and continuous support aiming to increase learners{\textquoteright} motivation, reduce feelings of isolation and avoid failure and abandonment in training. We offer in our work a support model for tutoring supporting the tutor{\textquoteright}s actions; this model collects and organize the majority of tutoring interventions to be exploited by a tutor agent in order to (1) facilitate the work of human tutor in the reuse of recorded interventions and in the choice of the most suitable to learning context and learner{\textquoteright}s learning profile, and (2) automate certain procedures for alleviate the work of human tutor of repetitive tasks, simple but boring, and for assist him in order to cope with the important number of learners requiring personalized support. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911202}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928715410\&doi=10.1109\%2fICMCS.2014.6911202\&partnerID=40\&md5=df16d9a89e964ca8412394ddb9ff85de}, author = {Ammor, F.-Z.a and Bouzidi, D.b and Elomri, A.a} } @article {9898253620141001, title = {Supporting collaborative development using process models: a tooled integration-focused approach.}, journal = {Journal of Software: Evolution \& Process}, volume = {26}, number = {10}, year = {2014}, pages = {890 - 909}, abstract = {ABSTRACT Collaboration in software engineering projects is usually intensive and requires adequate support by well-integrated tools. However, process-centered software engineering environments (PSEE) have traditionally been designed to exploit integration facilities in other tools, while offering themselves little to no such facilities. This is in line with the vision of the PSEE as the central orchestrator of project support tools. We argue that this view has hindered the widespread adoption of process-based collaboration support tools by incurring too much adoption and switching costs. We propose a new process-based collaboration support architecture, backed by a process metamodel, that can easily be integrated with existing tools. The proposed architecture revolves around the central concepts of {\textquoteright}deep links{\textquoteright} and {\textquoteright}hooks{\textquoteright}. Our approach is validated by analyzing a collection of open-source projects, and integration utilities based on the implemented process model server have been deve}, keywords = {Client/server computing, collaboration, Computer software, Computer software development, process-support, Software architecture, Software engineering, Switching costs, tool integration}, issn = {20477473}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=98982536\&site=ehost-live}, author = {Kedji, Komlan Akp{\'e}dj{\'e} and Lbath, Redouane and Coulette, Bernard and Nassar, Mahmoud and Baresse, Laurent and Racaru, Florin} } @conference { ISI:000345780700059, title = {Survey of Non-Functional Requirements Modeling and Verification of Software Product Lines}, booktitle = {2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS)}, series = {International Conference on Research Challenges in Information Science}, year = {2014}, note = {IEEE 8th International Conference on Research Challenges in Information Science (RCIS), Marrakesh, MOROCCO, MAY 28-30, 2014}, publisher = {IEEE; IEEE Morocco Sect; EMSI; Lab Math Informatique \& Applicat}, organization = {IEEE; IEEE Morocco Sect; EMSI; Lab Math Informatique \& Applicat}, abstract = {Undoubtedly, Non-Functional Requirements (NFR) such as security, performance and reliability are critical to software systems as there is a growing demand on a higher quality of software. Simultaneously, the increasing pressure to develop software in less time and at lower costs drives software industry towards the promising paradigm of Software Product Line (SPL). However, different approaches have been advanced for modeling NFR of the traditional individual products and few approaches focused on a family of products. On the other hand, as a product line contains several products, it is impracticable and not feasible to verify NFR for each possible product. Therefore, there is a major need for verification approaches specific to product lines. In this paper, we present and analyze the main NFR modeling and verification approaches of SPL.}, isbn = {978-1-4799-2393-9}, issn = {2151-1349}, author = {Hammani, Fatima Zahra}, editor = {Bajec, M and Collard, M and Deneckere, R} } @conference {Faqihi201356, title = {Semantic Interoperability in the d-learning in the era of cloud computing: Simplicity or complexity}, booktitle = {2013 International Conference on Interactive Collaborative Learning, ICL 2013}, year = {2013}, note = {cited By 3}, pages = {56-60}, abstract = {Since traditional computing of the 60s, to the innovations of the 80s, passing by emergence of internet, the virtualization advances, the concept of cloud computing have a promising future. Certainly much remains to be done especially for interoperability but also the establishment of norms and standards that will allow to build a set of heterogeneous systems. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ICL.2013.6644536}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84898656730\&doi=10.1109\%2fICL.2013.6644536\&partnerID=40\&md5=761c2a496eee37edd0f6c37413f7ff35}, author = {Faqihi, B.a and Daoudi, N.b and Ajhoun, R.a} } @book {Khaled2013166, title = {A semi-structured methodology for ERP system selection based on MACBETH and choquet integral applied to small and medium sized enterprises}, series = {Modern Entrepreneurship and E-Business Innovations}, year = {2013}, note = {cited By 1}, pages = {166-185}, abstract = {Historically, Enterprise Resource Planning (ERP) systems were initially destined to large companies in order to standardize and streamline their key business processes. Recently, they have been increasingly adopted by Small and Medium Enterprises (SMEs). However, making strategic tradeoffs among the various marketplace solutions is a troublesome balance task for SMEs without the rescue of systematic multicriteria decision approaches. This paper addresses the question of how to choose an ERP solution that best suits a given SME. It serves twofold objectives; firstly it defines a set of selection criteria related to SMEs{\textquoteright} context. Secondly, it presents a selection methodology based on the construction of an induced decision model through capturing the decision maker{\textquoteright}s preferences. The key contribution of this paper is the introduction of a new iterative learning based approach destined to make enlightened decisions through the consideration of interdependencies among the adopted selection criteria thanks to the Choquet Integral. {\textcopyright} 2013 by IGI Global. All rights reserved.}, doi = {10.4018/978-1-4666-2946-2.ch012}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84944072492\&doi=10.4018\%2f978-1-4666-2946-2.ch012\&partnerID=40\&md5=f8329adbf7b7c52fdb6edb6d35746c09}, author = {Khaled, A. and Idrissi, M.A.J.} } @article {Mountassir201373, title = {Sentiment classification on arabic corpora: A preliminary cross-study}, journal = {Document Numerique}, volume = {16}, number = {1}, year = {2013}, note = {cited By 2}, pages = {73-96}, abstract = {The rise of social media (such as online web forums and social networking sites) has attracted interests to mining and analyzing opinions available on the web. The online opinion has become the object of studies in many research areas; especially that called "Opinion Mining and Sentiment Analysis". Several interesting and advanced works were performed on few languages (in particular English). However, there were very few studies on Morphologically Rich Languages such as Arabic. This paper presents the study we have carried out to investigate supervised sentiment classification in an Arabic context. We use two Arabic Corpora which are different in many aspects. We use three common classifiers known by their effectiveness, namely Na{\"\i}ve Bayes, Support Vector Machines and k-Nearest Neighbor. We investigate some settings to identify those that allow achieving the best results. These settings are about stemming type, term frequency thresholding, term weighting and ngram words. We show that Na{\"\i}ve Bayes and Support Vector Machines are competitively effective; however k-Nearest Neighbor{\textquoteright}s effectiveness depends on the corpus. Through this study, we recommend to use light-stemming rather than stemming, to remove terms that occur once, to combine unigram and bigram words and to use presence-based weighting rather than frequency-based one. Our results show also that classification performance can be influenced by documents length, documents homogeneity and the nature of document authors. However, the size of data sets does not have an impact on classification results. {\textcopyright} 2013 Lavoisier.}, doi = {10.3166/DN.16.1.73-96}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84879022187\&doi=10.3166\%2fDN.16.1.73-96\&partnerID=40\&md5=203c5325261be58119451ab15e8141b5}, author = {Mountassir, A. and Benbrahim, H. and Berrada, I.} } @article {Khaled20132477, title = {SEVALERPS a new EX-ANTE multi-criteria method for ERP selection}, journal = {International Review on Computers and Software}, volume = {8}, number = {10}, year = {2013}, note = {cited By 1}, pages = {2477-2485}, abstract = {Selecting the right ERP system is one of the most risky, tedious and complex decision making activity for any organization. This paper develops a new multi-criteria method for ERP systems evaluation and selection, which addresses some of the most important shortcomings relating to the methods found in the literature. The proposed method serves mainly twofold objectives; firstly it introduces a new systematic evaluation process that considers ERP tailoring and mismatch handling as the corner stone of the evaluation activity. Secondly, it presents a semi-structured evaluation model that helps the selection team to voice out its preferences. The evaluation model relies on many mathematical techniques to handle the various aspects of the evaluation: 0-1 linear programming systems to define the anticipated functional coverage of ERP candidates, MACBETH cardinal scales to represent, in an interactive way, the selection team{\textquoteright}s preferences, and the Choquet integral to address interdependencies among evaluation criteria. {\textcopyright} 2013 Praise Worthy Prize S.r.l. - All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84891532111\&partnerID=40\&md5=7c529f2d8b2248d12908e7ac15da5fe7}, author = {Khaled, A. and Janati-Idrissi, M.A.} } @conference { ISI:000326538300127, title = {Sharing demand forecasts in a basic supply chain using game theory}, booktitle = {2013 5TH INTERNATIONAL CONFERENCE ON MODELING, SIMULATION AND APPLIED OPTIMIZATION (ICMSAO)}, year = {2013}, note = {5th International Conference on Modeling, Simulation and Applied Optimization (ICMSAO), Hammamet, TUNISIA, APR 28-30, 2013}, abstract = {Supply chain can be defined as a set of distributed entities composed of manufacturers, suppliers, distributors, retailers and costumers. Supply chain management (SCM) is the supervision of its three flows: the finances flow, the materials flow and the information flow. Indeed, this paper focuses on the information flow, more precisely on sharing information within a one echelon supply chain. It examines a game theory approach applied on a basic supply chain composed of three entities called players: a retailer, a distributor and a supplier with probabilistic demand. Each player is rational: tries to maximize his profit, and consequently tries to find a local optimum; this situation leads to a loss of performance of the whole chain. The goal of our work is to optimize both inventory and transportation costs by using the concept of Game Theory.}, isbn = {978-1-4673-5814-9; 978-1-4673-5812-5}, author = {Slimani, Ilham and Achchab, Said} } @article {ElHami2013348, title = {Simulation and optimization of interoperability planning}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {52}, number = {3}, year = {2013}, note = {cited By 0}, pages = {348-356}, abstract = {Optimizing Resource allocation and effort dispatching of interoperability enhancement is a key requirement to effectively setup, develop and evolve intra and inter organizational collaboration. To ensure this obiective of effectiveness, this paper proposes initially an approach for representation of interoperability evolution and planning. Interoperability degree is assessed using a ratio metric taking into account all the significant aspects such as potentiality, compatibility and operational performance. In a second stage, a Modified Particle Swarm optimization (MPSO) algorithm is used as a heuristic optimization method to find the best distribution of effort needed in collaborative networks. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84879575390\&partnerID=40\&md5=405b39b0db0b22739a5cce1480c2eff8}, author = {El Hami, N.a and Elmir, A.b and Elmir, B.b and Ellaia, R.a and Itmi, M.c and Bounabat, B.b} } @conference {Benhaddi2013, title = {SOA for the masses: End users as services composers}, booktitle = {Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA}, year = {2013}, note = {cited By 0}, abstract = {The end user service development known as the user-centric SOA emerged as a new approach that allows giving the end user the ability to create on the fly his own applications that meet a situational need. In fact, the classical SOA was designed for developers and is characterized by a heavy technical stack which is out of reach of end users. Lightweight Web 2.0 technologies such as Mashup appeared to bridge this gap and provide a new agile and quick way to compose and integrate different resources in a dynamic and on the fly manner. However, Mashups are emerging applications, and thus consist of immature, non intuitive and non formalized area. In this paper, we formalize the user-centric SOA development by introducing a new rich integration language based on the advanced Enterprise Integration Patterns (EIPS). We also propose a new intuitive and self-explanatory semantic methodology and interaction model for end users services integration. {\textcopyright} 2013 IEEE.}, doi = {10.1109/AICCSA.2013.6616485}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84887215517\&doi=10.1109\%2fAICCSA.2013.6616485\&partnerID=40\&md5=ab05e567efec19575ace07de6e812cdb}, author = {Benhaddi, M.a and Ba{\"\i}na, K.b and Abdelwahed, E.H.a} } @conference {Idri2013207, title = {Software cost estimation by classical and Fuzzy Analogy for Web Hypermedia Applications: A replicated study}, booktitle = {Proceedings of the 2013 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013}, year = {2013}, note = {cited By 1}, pages = {207-213}, abstract = {The aim of this paper is to evaluate and to compare the Classical Analogy and Fuzzy Analogy for software cost estimation on a Web software dataset. Hence, the paper aims to replicate the results of our precedent experiments on this dataset. Moreover, questions regarding the estimates accuracy, the tolerance of imprecision and uncertainty of cost drivers, and the favorable context to use estimation by analogy are discussed. This study approved the usefulness of Fuzzy Analogy for software cost estimation. {\textcopyright} 2013 IEEE.}, doi = {10.1109/CIDM.2013.6597238}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84885622172\&doi=10.1109\%2fCIDM.2013.6597238\&partnerID=40\&md5=a7c6b5315989675548f9310b89df6f32}, author = {Idri, A. and Zahi, A.} } @conference { ISI:000333756100029, title = {Software Cost Estimation by Classical and Fuzzy Analogy for Web Hypermedia Applications: A replicated study}, booktitle = {2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING (CIDM)}, year = {2013}, note = {IEEE Symposium on Computational Intelligence and Data Mining (CIDM), Singapore, SINGAPORE, APR 16-19, 2013}, pages = {207-213}, publisher = {IEEE; IEEE Computat Intelligence Soc}, organization = {IEEE; IEEE Computat Intelligence Soc}, abstract = {The aim of this paper is to evaluate and to compare the Classical Analogy and Fuzzy Analogy for software cost estimation on a Web software dataset. Hence, the paper aims to replicate the results of our precedent experiments on this dataset. Moreover, questions regarding the estimates accuracy, the tolerance of imprecision and uncertainty of cost drivers, and the favorable context to use estimation by analogy are discussed. This study approved the usefulness of Fuzzy Analogy for software cost estimation.}, isbn = {978-1-4673-5895-8}, author = {Idri, Ali and Zahi, Azeddine} } @conference { ISI:000358736600029, title = {Software Quality Requirements: a systematic mapping study}, booktitle = {2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1}, series = {Asia-Pacific Software Engineering Conference}, year = {2013}, note = {20th Asia-Pacific Software Engineering Conference (APSEC), Chulalongkorn Univ, Fac Engn, Dept Comp Engn, Bangkok, THAILAND, DEC 02-05, 2013}, pages = {231-238}, publisher = {Prov Elect Author; Metropolitan Elect Author; Thailand Convent \& Exhibit Bur; IEEE Comp Soc}, organization = {Prov Elect Author; Metropolitan Elect Author; Thailand Convent \& Exhibit Bur; IEEE Comp Soc}, abstract = {Software quality requirements (SQR) play a central role in software quality (SQ) success. The importance of mastering SQR can be seen as obvious; however, when it comes to customer satisfaction, end-users are often dissatisfied with SQ. In this paper, a systematic mapping study aims to summarize SQR research by answering nine mapping questions. In total, 51 articles were selected and classified according to multiple criteria: publication source, publication year, research type, research approach, contribution type of SQR literature, requirements engineering activity, well-known SQ model, software artifact and SQR type. The results show an increased interest in SQR research in recent years and reveal that conferences are the main SQR publication target. Most SQR research has used case studies. The dominant contribution type of SQR research is method while specification is the main requirements engineering activity identified. SQ models need to be more used for SQR identification. Design module and requirements documentation are the principal artifacts reported in SQR literature. External and internal SQR were the main SQR types addressed in literature. Identifying empirical solutions to address SQR is a promising research direction for researchers.}, isbn = {978-1-4799-2143-0}, issn = {1530-1362}, doi = {10.1109/APSEC.2013.40}, author = {Ouhbi, Sofia and Idri, Ali and Luis Fernandez-Aleman, Jose and Toval, Ambrosio}, editor = {Muenchaisri, P and Rothermel, G} } @conference {Ouhbi2013231, title = {Software quality requirements: A systematic mapping study}, booktitle = {Proceedings - Asia-Pacific Software Engineering Conference, APSEC}, volume = {1}, year = {2013}, note = {cited By 3}, pages = {231-238}, abstract = {Software quality requirements (SQR) play a central role in software quality (SQ) success. The importance of mastering SQR can be seen as obvious; however, when it comes to customer satisfaction, end-users are often dissatisfied with SQ. In this paper, a systematic mapping study aims to summarize SQR research by answering nine mapping questions. In total, 51 articles were selected and classified according to multiple criteria: publication source, publication year, research type, research approach, contribution type of SQR literature, requirements engineering activity, well-known SQ model, software artifact and SQR type. The results show an increased interest in SQR research in recent years and reveal that conferences are the main SQR publication target. Most SQR research has used case studies. The dominant contribution type of SQR research is method while specification is the main requirements engineering activity identified. SQ models need to be more used for SQR identification. Design module and requirements documentation are the principal artifacts reported in SQR literature. External and internal SQR were the main SQR types addressed in literature. Identifying empirical solutions to address SQR is a promising research direction for researchers. {\textcopyright} 2013 IEEE.}, doi = {10.1109/APSEC.2013.40}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84933501221\&doi=10.1109\%2fAPSEC.2013.40\&partnerID=40\&md5=f81ca9b922dd0cab1200996357d49459}, author = {Ouhbi, S.a and Idri, A.a and Fern{\'a}ndez-Alem{\'a}n, J.L.b and Toval, A.b} } @article { ISI:000328156400001, title = {Special Issue: Conceptual Models Of Complex Systems (In Memory Of The Late Professor Lorenzo Ferrer Figueras)}, journal = {SYSTEMS RESEARCH AND BEHAVIORAL SCIENCE}, volume = {30}, number = {6, SI}, year = {2013}, month = {NOV}, pages = {635}, issn = {1092-7026}, doi = {10.1002/sres.2233}, author = {Nemiche, Mohamed and Essaaidi, Mohamed} } @conference {Lakhrouit2013, title = {State of the art of the maturity models to an evaluation of the enterprise architecture}, booktitle = {2013 3rd International Symposium ISKO-Maghreb}, year = {2013}, note = {cited By 1}, abstract = {The evaluation of enterprise Architecture EA allows companies to evaluate their current situation. More specifically, it optimizes the alignment, the business strategy, the organization, the resources, the processes and the technology. This optimized architecture provides a cost-efficient solution and also contributes to ensure the successful implementation of the purposes of the organization. However it is very difficult to find a complete method of evaluation in term of indicators of evaluation and which ensures the follow-up of all the stages of development of the architecture of company. This article presents the possibility of evaluation starting from the methods of maturity of existing enterprise architecture. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ISKO-Maghreb.2013.6728119}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894142416\&doi=10.1109\%2fISKO-Maghreb.2013.6728119\&partnerID=40\&md5=3d7d580b1e6392067ca7ce4f1ab99530}, author = {Lakhrouit, J. and Baina, K.} } @conference { ISI:000350287800013, title = {State of the Art of the Maturity Models to an Evaluation of the Enterprise Architecture}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {the evaluation of enterprise Architecture EA allows companies to evaluate their current situation. More specifically, it optimizes the alignment, the business strategy, the organization, the resources, the processes and the technology. This optimized architecture provides a cost-efficient solution and also contributes to ensure the successful implementation of the purposes of the organization. However it is very difficult to find a complete method of evaluation in term of indicators of evaluation and which ensures the follow-up of all the stages of development of the architecture of company. This article presents the possibility of evaluation starting from the methods of maturity of existing enterprise architecture.}, isbn = {978-1-4799-3392-1}, author = {Lakhrouit, Jihane and Baina, Karim} } @article {Doumi201341, title = {Strategic business and IT alignment: Representation and evaluation}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {47}, number = {1}, year = {2013}, note = {cited By 1}, pages = {41-52}, abstract = {Nowadays, business IT alignment has become a priority in most large organization. It is a question of aligning the information system on the business strategies of the organization. This step is aimed at increasing the practical value of the information system and makes it a strategic asset for the organization. Many works showed the importance of documentation, the analysis and the evaluation of business IT alignment, but few proposed solutions applicable to the strategic and functional level. This paper aims has to fill this gap by proposing a simple approach for modeling and evaluate enterprise strategy in the context of strategic alignment. This approach is illustrated by case study of a real project in a Moroccan public administration. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84872399122\&partnerID=40\&md5=e21d6bf8d4eafc95c0d36f5a777618e3}, author = {Doumi, K. and Baina, S. and Baina, K.} } @article {Belaoud2013357, title = {Survey of SIP authentication mechanisms}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {58}, number = {2}, year = {2013}, note = {cited By 0}, pages = {357-365}, abstract = {In recent years Voice over Internet Protocol (VoIP) has become a popular NGN (Next Generation Network) technology. As this technology is built on internet protocol it is affected by a critical security problems. The Session Initiation Protocol (SIP) is considered as the most used signaling protocol for calls over the Internet for establishing, maintaining and terminating VoIP calls. The security of SIP is becoming more and more important. The prime security service required by SIP is authentication. This paper focuses on the SIP security mechanisms of authentication. We survey the newly proposed methods of authentication then we proceed to evaluate these methods in view of security efficiency and computational cost. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84890889665\&partnerID=40\&md5=350ed13308e43f7e4915fd0fd863b414}, author = {Belaoud, H.a and El Abbadi, J.a and Habbani, A.b} } @article {10115338720131101, title = {SV3R: un framework pour la gestion de la variabilit{\'e} des services.}, journal = {E-Ti: E-Review in Technologies Information}, number = {7}, year = {2013}, pages = {20 - 31}, abstract = {The emergence and expansion of the development paradigm based on service oriented approaches have been behind the elaboration of new models and methods that aim at facilitating the reuse of services within multiples context of use. This requires providing systematically services with several possible realizations. Among the promising approaches that achieve this objective is the management of variability which has been widely adopted by the software engineering disciplines and whose objective is to facilitate the adaptation or the configuration of software artifacts in a systematic way. Hence, in this work we provide a framework for the development (for and by reuse) of services supporting variability, called {\guillemotleft}SV3R{\guillemotright} (Service Variability Representation and Resolution for Reuse). This paper introduces at first the concept of variability. Afterwards, it presents some related work, before giving an overview of the framework SV3R and describing its components. (English) [ABSTRACT FROM AUTH}, keywords = {Gestion de la variabilit{\'e}, Ing{\'e}nierie des mod{\`e}les, Model engineering, Reuse, R{\'e}utilisation, SOA, Variability management, Web services}, issn = {11148802}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=101153387\&site=ehost-live}, author = {Chakir, Boutaina and Fredj, Mounia} } @conference {Hiba2012948, title = {An SNA-based evaluation framework for virtual Teams}, booktitle = {Proceedings of the 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2012}, year = {2012}, note = {cited By 0}, pages = {948-953}, doi = {10.1109/ASONAM.2012.241}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84874267883\&doi=10.1109\%2fASONAM.2012.241\&partnerID=40\&md5=097bf8b3528b33dec79c30e080e98ebe}, author = {Hiba, L.B. and Idrissi, M.A.J.} } @conference { ISI:000320443500153, title = {An SNA-based evaluation framework for virtual teams}, booktitle = {2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM)}, year = {2012}, note = {IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Kadir Has Univ, Istanbul, TURKEY, AUG 26-29, 2012}, pages = {948-953}, publisher = {ACM; IEEE; ACM Sigmod; IEEE Comp Soc; Springer; TCDE; TUBiTAK; TUBiTAK BiLGEM; ACTC SMCS; IEEE Tech Comm Data Engn; Univ Calgary; Hellen Amer Univ; sbtanaliz; EX tra Foreign Trade Co Ltd; inforcept; FNSS Savunma Sistemleri A S; raccoonize; Huawei}, organization = {ACM; IEEE; ACM Sigmod; IEEE Comp Soc; Springer; TCDE; TUBiTAK; TUBiTAK BiLGEM; ACTC SMCS; IEEE Tech Comm Data Engn; Univ Calgary; Hellen Amer Univ; sbtanaliz; EX tra Foreign Trade Co Ltd; inforcept; FNSS Savunma Sistemleri A S; raccoonize; Huawei}, abstract = {Organizations are increasingly aware of the underlying forces of social networks and their impact on information and knowledge dissemination within virtual teams. However, assessing these networks is a challenge for team managers who need more complete toolkits in order to master team metrics. Social Network Analysis (SNA) is a descriptive, empirical research method for mapping and measuring relationships and flows between people, groups, organizations and other connected information/knowledge entities. In this article we establish a framework based on SNA to evaluate virtual teams.}, isbn = {978-0-7695-4799-2}, doi = {10.1109/ASONAM.2012.241}, author = {Ben Hiba, Lamia and Idrissi, Mohammed Abdou Janati} } @article {BenHiba2012597, title = {An SNA-based evaluation framework for virtual teams}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {7567 LNCS}, year = {2012}, note = {cited By 1}, pages = {597-607}, doi = {10.1007/978-3-642-33618-8_79}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84873865183\&doi=10.1007\%2f978-3-642-33618-8_79\&partnerID=40\&md5=2f531200376e59543b085e40f49cc4e9}, author = {Ben Hiba, L. and Janati Idrissi, M.A.} } @conference {Kassou2012912, title = {SOASMM: A novel service oriented architecture Security Maturity Model}, booktitle = {Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012}, year = {2012}, note = {cited By 2}, pages = {912-918}, doi = {10.1109/ICMCS.2012.6320279}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869852204\&doi=10.1109\%2fICMCS.2012.6320279\&partnerID=40\&md5=906b15ed80beeb81f8012097b9a6bb6f}, author = {Kassou, M. and Kjiri, L.} } @conference { ISI:000310353000165, title = {SOASMM: a Novel Service Oriented Architecture Security Maturity Model}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {911-917}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {Ensuring SOA developed applications security has become crucial to protect against potential damage and is a sign of confidence for companies that would like to start collaboration based on SOA services. The aim of the present paper is to present the principles of a novel tool that supports the assessment of SOA security maturity of organizations: the SOASMM (SOA Security Maturity Model). This model was defined by incorporating information security best practice approaches in the paradigm of service-oriented architecture using an argued approach and mapping models. Security Indicators deduced in our study denote the complexity of security controls as SOA maturity levels get higher. Besides, as the model that we proposed is based on security standards and best practices, it can be further developed to support organizations to evaluate and adjust their security practices according to their SOA migration plan.}, isbn = {978-1-4673-1520-3}, author = {Kassou, Meryem and Kjiri, Laila}, editor = {Essaaidi, M and Zaz, Y} } @conference { ISI:000338165600142, title = {SOFTWARE COST ESTIMATION BY FUZZY ANALOGY FOR ISBSG REPOSITORY}, booktitle = {UNCERTAINTY MODELING IN KNOWLEDGE ENGINEERING AND DECISION MAKING}, series = {World Scientific Proceedings Series on Computer Engineering and Information Science}, volume = {7}, year = {2012}, note = {10th International Conference on Fuzzy Logic and Intelligent Technologies in Nuclear Science (FLINS), Istanbul, TURKEY, AUG 26-29, 2012}, pages = {863-868}, publisher = {Istanbul Tech Univ; Bahcesehir Univ; Belgian Nucl Res Ctr; Ghent Univ}, organization = {Istanbul Tech Univ; Bahcesehir Univ; Belgian Nucl Res Ctr; Ghent Univ}, abstract = {Software cost estimation is one of the most important and complex tasks in software project management. As a result, several techniques for estimating development effort have been suggested. Fuzzy Analogy is one of these techniques suggested to estimate project effort when it is described either by linguistic or numerical values. Based on reasoning by analogy and fuzzy logic, this technique uses fuzzy representation of software project attributes by using expert knowledge or clustering techniques. From this work, we evaluate the accuracy of this approach to estimate the software effort using the International Software Benchmarking Standards Group (ISBSG) repository.}, isbn = {978-981-4417-73-0}, author = {Idri, Ali and Amazal, Fatima Azzahra}, editor = {Kahraman, C and Kerre, EE and Bozbura, FT} } @conference {Idri2012863, title = {Software cost estimation by fuzzy analogy for ISBSG repository}, booktitle = {World Scientific Proc. Series on Computer Engineering and Information Science 7; Uncertainty Modeling in Knowledge Engineering and Decision Making - Proceedings of the 10th International FLINS Conf.}, volume = {7}, year = {2012}, note = {cited By 0}, pages = {863-868}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84892659716\&partnerID=40\&md5=2001b51ce67b133f56f1ca779fc56611}, author = {Idri, A. and Amazal, F.A.} } @article {7391589120120201, title = {Software Productivity: Harmonization in ISO/IEEE Software Engineering Standards.}, journal = {Journal of Software (1796217X)}, volume = {7}, number = {2}, year = {2012}, pages = {462 - 470}, abstract = {The software productivity is an important key of software quality factors. The productivity measure has become a tool for managers since it is used to compare the performance between different companies (benchmarking) and to compare the efficiency of different developers in the same company. Therefore, it allows doing strategic planning and decision making based on such measurement. A variety of international standardization bodies such as IEEE and ISO as well as software engineering researchers have proposed a set of factors which influence the software productivity attribute, and also a set of measures to evaluate it. However, there is no unique model that integrates all the software productivity best practices. The aim of this paper is to survey the available international standards and research work on software productivity and figure out the key differences in order to propose a standards-based model. Such model will include the set of quality attributes that could be used to ref}, keywords = {Benchmark problems (Computer science), Computer programmers, Decision making, IEEE 802.11 (Standard), IEEE Std. 1045, International Organization for Standardization, ISO 9126, Measurement, Measurements, Productivity Drivers, Quality Attributes, Quality Models, Software Developers Productivity, Standards}, issn = {1796217X}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=73915891\&site=ehost-live}, author = {Cheikhi, Laila and Al-Qutaish, Rafa E. and Idri, Ali} } @article {Cheikhi2012462, title = {Software productivity: Harmonization in ISO/IEEE software engineering standards}, journal = {Journal of Software}, volume = {7}, number = {2}, year = {2012}, note = {cited By 2}, pages = {462-470}, doi = {10.4304/jsw.7.2.462-470}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84857929017\&doi=10.4304\%2fjsw.7.2.462-470\&partnerID=40\&md5=55088a24a8af596776fe0e2ddf74892c}, author = {Cheikhi, L. and Al-Qutaish, R.E. and Idri, A.} } @conference {Mountassir201243, title = {Some methods to address the problem of unbalanced sentiment classification in an arabic context}, booktitle = {CiSt 2012 - Proceedings: 2012 Colloquium in Information Science and Technology}, year = {2012}, note = {cited By 2}, pages = {43-48}, doi = {10.1109/CIST.2012.6388061}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84872535822\&doi=10.1109\%2fCIST.2012.6388061\&partnerID=40\&md5=81312470e1e0a89c333acbcd558540a2}, author = {Mountassir, A. and Benbrahim, H. and Berrada, I.} } @conference {Rahimi201218, title = {State of the art of reputation systems in e-commerce [Etat de l{\textquoteright}art des syst{\`e}mes de r{\'e}putation en e-commerce]}, booktitle = {Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012}, year = {2012}, note = {cited By 0}, pages = {18-23}, doi = {10.1109/JNS2.2012.6249233}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867055626\&doi=10.1109\%2fJNS2.2012.6249233\&partnerID=40\&md5=368c130ee772a86590d0ca7515f35412}, author = {Rahimi, H. and El Bakkali, H.} } @conference {Salah2012314, title = {Strategies for applying rules in OWL entailment regimes}, booktitle = {Innovation Vision 2020: Sustainable growth, Entrepreneurship, and Economic Development - Proceedings of the 19th International Business Information Management Association Conference}, volume = {1}, year = {2012}, note = {cited By 0}, pages = {314-324}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84896326867\&partnerID=40\&md5=7b168c4068f656c83a4db115af183fb6}, author = {Salah, A. and El Koutbi, M. and Khriss, I.} } @conference { ISI:000371495900008, title = {Some methods to address the problem of Unbalanced Sentiment Classification in an Arabic context}, booktitle = {2012 COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST{\textquoteright}12)}, series = {Colloquium in Information Science and Technology}, year = {2011}, note = {IEEE Colloquium on Information Science and Technology (CIST), Fez, MOROCCO, OCT 22-24, 2012}, pages = {43-48}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Comp \& Commun Joint Chapter; USMBA IEEE Student Branch; Faculty of Sciences Dhar Mahraz; Faculty of Technical Sciences of Fez; IEEE Comp Soc; IEEE Commun Soc}, abstract = {The rise of social media (such as online web forums and social networking sites) has attracted interests to mining and analyzing opinions available on the web. The online opinion has become the object of studies in many research areas; especially that called {\textquoteleft}{\textquoteleft}Opinion Mining and Sentiment Analysis{{\textquoteright}{\textquoteright}}. Several interesting and advanced works were performed on few languages (in particular English). However, there were very few studies on some languages such as Arabic. This paper presents the study we have carried out to address the problem of unbalanced data sets in supervised sentiment classification in an Arabic context. We propose three different methods to under-sample the majority class documents. Our goal is to compare the effectiveness of the proposed methods with the common random under-sampling. We also aim to evaluate the behavior of the classifier toward different under-sampling rates. We use two different common classifiers, namely Naive Bayes and Support Vector Machines. The experiments are carried out on an Arabic data set that we have built from Aljazeera{\textquoteright}s web site and labeled manually. The results show that Naive Bayes is sensitive to data set size, the more we reduce the data the more the results degrade. However, it is not sensitive to unbalanced data sets on the contrary of Support Vector Machines which is highly sensitive to unbalanced data sets. The results show also that we can rely on the proposed techniques and that they are typically competitive with random under-sampling.}, isbn = {978-1-4673-2725-1}, issn = {2327-185X}, author = {Mountassir, Asmaa and Benbrahim, Houda and Berrada, Ilham}, editor = {ElMohajir, M and Begdouri, A and ElMohajir, BE and Zarghili, A} } @conference {Koudougnon2011, title = {Sphere decoding based on QR decomposition in STBC}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 1}, doi = {10.1109/ICMCS.2011.5945624}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961243030\&doi=10.1109\%2fICMCS.2011.5945624\&partnerID=40\&md5=909487fa6b86a92432568997aba2bdb6}, author = {Koudougnon, H. and Saadane, R. and Belkasmi, M.} } @article {Doumi2011345, title = {Strategic alignment: Comparison of approaches}, journal = {Communications in Computer and Information Science}, volume = {220 CCIS}, number = {PART 2}, year = {2011}, note = {cited By 1}, pages = {345-355}, doi = {10.1007/978-3-642-24355-4_35}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-80054072370\&doi=10.1007\%2f978-3-642-24355-4_35\&partnerID=40\&md5=ecff31b0d65253fbf27c7a3a20d8f462}, author = {Doumi, K. and Baina, S. and Baina, K.} } @conference { ISI:000309893900035, title = {Strategic Alignment: Comparison of Approaches}, booktitle = {ENTERPRISE INFORMATION SYSTEMS, PT 2}, series = {Communications in Computer and Information Science}, volume = {220}, year = {2011}, note = {International Conference on Enterprise Information Systems, Vilamoura, PORTUGAL, OCT 05-07, 2011}, pages = {345-355}, publisher = {Polytechn Inst Cavado \& Ave; Univ Tras os Montes \& Alto Douro}, organization = {Polytechn Inst Cavado \& Ave; Univ Tras os Montes \& Alto Douro}, abstract = {Nowadays, the strategic alignment of information systems has become a priority in most large organizations. It is a question of aligning the information system on the business strategies of the organization. This step is aimed at increasing the practical value of the information system and makes it a strategic asset for the organization. In the literature several approaches have been developed to solve the problem of alignment. For example the approach of alignment between architecture and the business context, the approach needs oriented, approach alignment between process and information system ... etc. In this paper we propose a detailed study of each approach (benefits and limitation) and we propose a comparison between these different approaches.}, isbn = {978-3-642-24354-7}, issn = {1865-0929}, author = {Doumi, Karim and Baina, Salah and Baina, Karim}, editor = {CruzCunha, MM and Varajao, J and Powell, P and Martinho, R} } @article {4980748920100419, title = {Stacked complementary metasurfaces for ultraslow microwave metamaterials.}, journal = {Applied Physics Letters}, volume = {96}, number = {16}, year = {2010}, pages = {164103}, abstract = {We have experimentally realized at microwaves a dual-band ultraslow regime by constructing a metamaterial based upon the alternative stack of conventional- and complementary-split-ring-resonators-surfaces. The group delay reaches values larger than two orders of magnitude than those obtained when the electromagnetic wave propagates the same thickness in free-space. The ultraslow waves have been initially predicted by a numerical eigenmode analysis and finite-integration frequency domain simulations. Such ultraslow modes can be integrated into free-space technology for spatial delay lines, and traveling wave amplifier as well as sensors due to the enhanced interaction between different beams or radiation and matter. [ABSTRACT FROM AUTHOR]}, keywords = {Electromagnetic waves, Metamaterials, Microwaves, Resonators, Simulation methods \& models}, issn = {00036951}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=49807489\&site=ehost-live}, author = {Navarro-C{\'\i}a, M. and Aznabet, M. and Beruete, M. and Falcone, F. and El Mrabet, O. and Sorolla, M. and Essaaidi, M.} } @conference { ISI:000259298600002, title = {Software cost estimation models using Radial Basis Function Neural Networks}, booktitle = {SOFTWARE PROCESS AND PRODUCT MEASUREMENT}, series = {Lecture Notes in Computer Science}, volume = {4895}, year = {2008}, note = {Joint Meeting of the International Workshop on Software Measurement (IWSM)/International Conference on Software Process and Product Measurement (MENSURA), Palma de Mallorca, SPAIN, NOV 05-07, 2007}, pages = {21+}, abstract = {Radial Basis Function Neural Networks (RBFN) have been recently studied due to their qualification as an universal function approximation. This paper investigates the use of RBF neural networks for software cost estimation, The focus of this study is on the design of these networks, especially their middle layer composed of receptive fields, using two clustering techniques: the C-means and the APC-III algorithms. A comparison between a RBFN using C-means and a RBFN using APC-III, in terms of estimates accuracy, is hence presented. This study uses the COCOMO{\textquoteright}81 dataset and data on Web applications from the Tukutuku database.}, isbn = {978-3-540-85552-1}, issn = {0302-9743}, author = {Idri, Ali and Zahi, Azeddine and Mendes, Emilia and Zakrani, Abdelali}, editor = {CuadradoGallego, JJ and Braungarten, R and Dumke, RR and Abran, A} } @article {Idri200821, title = {Software cost estimation models using radial basis function neural networks}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {4895 LNCS}, year = {2008}, note = {cited By 4}, pages = {21-31}, doi = {10.1007/978-3-540-85553-8_2}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-54249149525\&doi=10.1007\%2f978-3-540-85553-8_2\&partnerID=40\&md5=483abae3a29ef61079aab5da6a389786}, author = {Idri, A. and Zahi, A. and Mendes, E. and Zakrani, A.} } @conference {Saidi200853, title = {Specification of business components: An approach by multi-view variability expression [Sp{\'e}cification de composants m{\'e}tier: Une approche par expression de variabilit{\'e} multi-vue]}, booktitle = {XXVIeme Congres INFORSID 2008}, year = {2008}, note = {cited By 0}, pages = {53-68}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84884667023\&partnerID=40\&md5=c280035ed6b4033e34d9900b70598566}, author = {Saidi, R. and Fredj, M. and Mouline, S. and Front, A. and Rieu, D.} } @conference {Ba{\"\i}na200831, title = {Strategic business/IT alignment using goal models}, booktitle = {CEUR Workshop Proceedings}, volume = {336}, year = {2008}, note = {cited By 2}, pages = {31-43}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84875194981\&partnerID=40\&md5=9da7e48abcceaa5f0d8cee4b42cce2e5}, author = {Baina, S. and Ansias, P.-Y. and Petit, M. and Castiaux, A.} } @article { ISI:000251549200037, title = {Simple noncircular correlation method for exhaustive sum square difference matching}, journal = {OPTICAL ENGINEERING}, volume = {46}, number = {10}, year = {2007}, month = {OCT}, abstract = {We propose a new algorithm to calculate the sum square difference (SSD) metric for estimating translational motion. Using some substitutions and complex arithmetics, computation of the SSD is derived to be a correlation function of two substituting functions. The former can be computed using the fast Fourier transform (FFT) approach, which is less computationally expensive than the direct computation of the SSD. Zero padding of the block is useful both to avoid the circular character of the FFT and to computes the SSD function at once. We prove the existence of a simple and optimal correlation method for noncircular SSD matching. (c) 2007 Society of Photo-Optical Instrumentation Engineers.}, issn = {0091-3286}, doi = {10.1117/1.2786469}, author = {Essannouni, F. and Thami, R. Oulad Haj and Aboutajdine, D. and Salam, A.} }