@article {Bennouri20225746, title = {U-NewReno transmission control protocol to improve TCP performance in Underwater Wireless Sensors Networks}, journal = {Journal of King Saud University - Computer and Information Sciences}, volume = {34}, number = {8}, year = {2022}, note = {cited By 0}, pages = {5746-5758}, abstract = {Advances in the different fields of application on Underwater Wireless Sensor Networks (UWSNs) makes this environment more attractive for researchers and industry. Communication in this environment faces exceptional challenges, since its data transmission is experiencing a limitation in the use of bandwidth, the presence of surrounding noise and also the long delays of acoustic propagation. It is of great benefit to design an adaptive transmission control protocol (TCP) for the underwater environment. In this work, we propose U-New Reno a transmission control protocol suitable for the marine environment wherein we consider both the adaptation of the maximum size of the congestion window and the expiry of the round-trip time (RTT). U-New Reno can achieve a very significant improvement concerning the retransmission rate of the packets and the evolution of the number of packets delivered. The performances of both metrics are closely observed during the comparison of simulation results between the standard New Reno and our proposed U-New Reno. {\textcopyright} 2021 King Saud University}, doi = {10.1016/j.jksuci.2021.08.006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85114818664\&doi=10.1016\%2fj.jksuci.2021.08.006\&partnerID=40\&md5=3a92e142cf64f316d890032a44316881}, author = {Bennouri, H. and Berqia, A. and Patrick, N.K.} } @article {Benhar2022791, title = {Univariate and Multivariate Filter Feature Selection for Heart Disease Classification}, journal = {Journal of Information Science and Engineering}, volume = {38}, number = {4}, year = {2022}, note = {cited By 0}, pages = {791-803}, abstract = {Feature selection (FS) is a data preprocessing task that can be applied before the classification phase, and aims at improving the performance and interpretability of classifiers by finding only a few highly informative features. The present study aims at evaluating and comparing the performances of six univariate and two multivariate filter FS techniques for heart disease classification. The FS techniques were evaluated with two white-box and two black-box classification techniques using five heart disease datasets. Furthermore, this study deals with the setting of the hyperparameters{\textquoteright} values of the four classifiers. This study evaluates 600 variants of classifiers. Results show that white-box classification techniques such as K-Nearest Neighbors and Decision Trees can be very competitive with black-box ones when hyperparameters{\textquoteright} optimization and feature selection were applied. {\textcopyright} 2022 Institute of Information Science. All rights reserved.}, keywords = {Black boxes, Cardiology, Classification (of information), Data preprocessing, Decision trees, disease classification, Diseases, feature selection, Features selection, Filter, Heart, heart disease, Nearest neighbor search, Performance, Selection techniques, Univariate, White box}, doi = {10.6688/JISE.202207_38(4).0006}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85137170374\&doi=10.6688\%2fJISE.202207_38\%284\%29.0006\&partnerID=40\&md5=f75bca8ff78e6782d4c11e88d338784f}, author = {Benhar, H. and Hosni, M. and Idri, A.} } @article {Hebroune2022581, title = {User-Enriched Embedding for Fake News Detection on Social Media}, journal = {Lecture Notes in Networks and Systems}, volume = {489 LNNS}, year = {2022}, note = {cited By 1}, pages = {581-599}, abstract = {Recent political, pandemic, and social turmoil events have led to an increase in the popularity and spread of misinformation. As demonstrated by the widespread effects of the large onset of fake news, humans are inconsistent if not outright poor detectors of fake news. Thereby, many efforts are being made to automate the process of fake news detection. The most popular of these approaches include blacklisting sources and authors that are unreliable. While these tools are useful, in order to create a more complete end to end solution, we need to account for more difficult cases where reliable sources and authors release fake news. As such, the goal of this paper is to propose an approach for detecting the language and behavioral patterns that characterize fake and real news through the use of social network analysis and natural language processing techniques. We have built a model that catches many intuitive indications of real and fake news using users and submissions attributes, and thus laid the foundation for an approach that concatenates multiple embeddings for better fake news detection on social media. {\textcopyright} 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.}, doi = {10.1007/978-3-031-07969-6_44}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85135051740\&doi=10.1007\%2f978-3-031-07969-6_44\&partnerID=40\&md5=d606f2faefcf64892e7ecc776b39da96}, author = {Hebroune, O. and Benhiba, L.} } @conference {Brihi2020, title = {UAV for IoT Communications: Beam Selection Using Matching Game and Network Slicing}, booktitle = {Proceedings - 2020 International Conference on Wireless Networks and Mobile Communications, WINCOM 2020}, year = {2020}, note = {cited By 0}, abstract = {In cellular communication networks, researchers are trying to improve network communication and adapt it to meet the requirements of new technologies such as the Internet of Things. The next generation of wireless networks (5G) promises new network features such as low latency, peripheral computing and radio convergence that will pave the way for a world that is ubiquitously connected. In this context and for the provision of the necessary high-quality services and connection, continuously and everywhere, even under poor network conditions, any network failures must be managed quickly and efficiently. Covering the network in remote areas, providing services in overcrowded areas, or safeguarding the network in the event of damage to the cellular infrastructure (for example, a physical disaster) are a number of challenges. In this paper we discuss the architecture and possible applications of flight modes as a part of a 5G network supporting network splitting and lightweight virtualization at the extent of relay Unmanned Aerial Vehicles (UAVs) as being small cells. It also provides 5G aerial measurement results to support the feasibility check of UAV use in two possible scenarios, namely improving the position of UAVs relative to the position and circulation of users (UEs) additionally because the increased network coverage through algorithms supported theory of games. {\textcopyright} 2020 IEEE.}, keywords = {5G mobile communication systems, Antennas, Beam selection, Cellular communication networks, Communication beams, Computation theory, Flying relay unmanned aerial vehicle, Game theory, Internet of things, Matching game, Matching networks, Network communications, Network features, Network function virtualization, Network slicing, SDN, Unmanned aerial vehicles (UAV)}, doi = {10.1109/WINCOM50532.2020.9272510}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85098730582\&doi=10.1109\%2fWINCOM50532.2020.9272510\&partnerID=40\&md5=2fd59efd80efa8be8e20ec7601c73dc9}, author = {Brihi, S. and Ghamizi, A. and Chakri, K.} } @conference {Lhazmir2020, title = {UAV for Wireless Power Transfer in IoT Networks: A GMDP approach}, booktitle = {IEEE International Conference on Communications}, volume = {2020-June}, year = {2020}, note = {cited By 3}, abstract = {Unmanned aerial vehicles (UAVs) are a promising technology employed as moving aggregators and wireless power transmitters for IoT networks. In this paper, we consider an UAV-IoT wireless energy and data transmission system and the decision-making problem is investigated. We aim at optimizing the nodes{\textquoteright} utilities by defining a good packet delivery and energy transfer policy according to the system state. We formulate the problem as a Markov Decision Process (MDP) to tackle the successive decision issues. As the MDP formalism achieves its limits when the neighbors{\textquoteright} interactions are considered, we formulate the problem as a Graph-based MDP (GMDP). We then propose a Mean-Field Approximation (MFA) algorithm to find a solution. The simulation results show that our framework achieves a good analysis of the system behavior. {\textcopyright} 2020 IEEE.}, keywords = {Antennas, Approximation algorithms, Behavioral research, Decision making, Decision-making problem, Energy transfer, Graphic methods, Inductive power transmission, Internet of things, Markov Decision Processes, Markov processes, Mean field approximation, Packet Delivery, System behaviors, System state, Unmanned aerial vehicles (UAV), Wireless energy, Wireless power}, doi = {10.1109/ICC40277.2020.9148956}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85089418365\&doi=10.1109\%2fICC40277.2020.9148956\&partnerID=40\&md5=a3d1ed58b9a7436f2191be8372102f51}, author = {Lhazmir, S. and Oualhaj, O.A. and Kobbane, A. and Amlioud, E.M. and Ben-Othman, J.} } @article {Mikram202071, title = {Unit load devices (Uld) demand forecasting in the air cargo fooptimal cost management}, journal = {Journal of Automation, Mobile Robotics and Intelligent Systems}, volume = {14}, number = {3}, year = {2020}, note = {cited By 0}, pages = {71-80}, abstract = {In recent decades, the airline industry has become very competitive. With the advent of large aircraft in service, unit load devices (ULD) have become an essential element for efficient air transport. They can load a large amount of baggage, cargo or mail using only one unit. Since this results in fewer units to load, saving time and efforts of ground crews and helping to avoid delayed flights. However, a deficient loading of the units causes operating irregularities, costing the company and contributing to the dissatisfaction of the customers. In contrast, an excess load of containers is at the expense of cargo. In this paper we propose an approach to predict the demand for baggage in order to optimize the management of its ULD flow. Specifically, we build prediction models: ARIMA following the BOX-JENKINS approach and exponential smoothing methods, in order to obtain more accurate forecasts. The approach is tested using the operational data of flight processing and the results are compared with four benchmark method (SES, DES, Holt-Winters and Naive prediction) using different performance indicators: MAE, MSE, MAPE, WAPE, RMSE, SMPE. The results obtained with the exponential smoothing methods surpass the benchmarks by providing more accurate forecasts. {\textcopyright} 2020, Industrial Research Institute for Automation and Measurements. All rights reserved.}, doi = {10.14313/JAMRIS/3-2020/37}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85100524740\&doi=10.14313\%2fJAMRIS\%2f3-2020\%2f37\&partnerID=40\&md5=2a7b355fdf9b83161cf3d7a9c85f19b8}, author = {Mikram, M. and Rhanoui, M. and Yousfi, S. and Briwa, H.} } @article {AlAfandy2020770, title = {Using classic networks for classifying remote sensing images: Comparative study}, journal = {Advances in Science, Technology and Engineering Systems}, volume = {5}, number = {5}, year = {2020}, note = {cited By 3}, pages = {770-780}, abstract = {This paper presents a comparative study for using the deep classic convolution networks in remote sensing images classification. There are four deep convolution models that used in this comparative study; the DenseNet 196, the NASNet Mobile, the VGG 16, and the ResNet 50 models. These learning convolution models are based on the use of the ImageNet pre-trained weights, transfer learning, and then adding a full connected layer that compatible with the used dataset classes. There are two datasets are used in this comparison; the UC Merced land use dataset and the SIRI-WHU dataset. This comparison is based on the inspection of the learning curves to determine how well the training model is and calculating the overall accuracy that determines the model performance. This comparison illustrates that the use of the ResNet 50 model has the highest overall accuracy and the use of the NASNet Mobile model has the lowest overall accuracy in this study. The DenseNet 169 model has little higher overall accuracy than the VGG 16 model. {\textcopyright} 2020 ASTES Publishers. All rights reserved.}, doi = {10.25046/AJ050594}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85095877228\&doi=10.25046\%2fAJ050594\&partnerID=40\&md5=763c007cae5730097994ccc641ce3f60}, author = {AlAfandy, K.A. and Omara, H. and Lazaar, M. and Achhab, M.A.} } @conference {Chaayra2018106, title = {Union bound on the bit error probability of TCM coded with TAS/MRC MIMO system subject to weibull fading channels}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, pages = {106-111}, doi = {10.1145/3289100.3289118}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85058642340\&doi=10.1145\%2f3289100.3289118\&partnerID=40\&md5=eb942c9b4a115381f43ab2d3015f0a49}, author = {Chaayra, T. and Bouanani, F.E. and Benazza, H.} } @conference {Abouaomar201814, title = {Users-Fogs association within a cache context in 5G networks:Coalition game model}, booktitle = {Proceedings - IEEE Symposium on Computers and Communications}, volume = {2018-June}, year = {2018}, pages = {14-19}, doi = {10.1109/ISCC.2018.8538500}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85059221795\&doi=10.1109\%2fISCC.2018.8538500\&partnerID=40\&md5=e324f3454d662cef58a9c78528c68a60}, author = {Abouaomar, A. and Elmachkour, M. and Kobbane, A. and Tembine, H. and Ayaida, M.} } @conference {Guermah2018, title = {Using context ontology and linear SVM for chronic kidney disease prediction}, booktitle = {ACM International Conference Proceeding Series}, year = {2018}, doi = {10.1145/3230905.3230941}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85053485109\&doi=10.1145\%2f3230905.3230941\&partnerID=40\&md5=41a05c4c09330c364082c52d6546e08f}, author = {Guermah, H. and Fissaa, T. and Guermah, B. and Hafiddi, H. and Nassar, M.} } @conference {Ennasar2017465, title = {A UHF RFID tag antenna with improved bandwidth}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2017}, note = {cited By 0}, pages = {465-467}, abstract = {in this paper, a new broadband RFID tag antenna is presented. The antenna has a simple structure and low profile with only one layer of FR4 dielectric substrate and metallization. By choosing a proper dimension of the short dipole and the T-matching network, a good and broadband impedance matching can be achieved. The obtained impedance bandwidth (S11\<-10 dB) across the operating band can reach about 232 MHz (24.57\%) for the UHF band, which is from 860 to 960 MHz The proposed design has an omnidirectional radiation pattern and a simulated flat read range (almost 4.05 m) over the entire RFID bandwidth. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICMCS.2016.7905571}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019074619\&doi=10.1109\%2fICMCS.2016.7905571\&partnerID=40\&md5=44b596ce0566805925e89ab907dc466b}, author = {Ennasar, M.A. and Essaaidi, M. and Aznabet, I. and El Mrabet, O.} } @article { ISI:000392517100026, title = {Unified analysis of EGC diversity over Weibull fading channels}, journal = {INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS}, volume = {30}, number = {1}, year = {2017}, month = {JAN 10}, abstract = {In this paper, the performance analysis based on PDF approach of an L-branch equal gain combiner (EGC) over independent and not necessarily identical Weibull fading channels is presented. Several closed-form approximate expressions are derived in terms of only one Fox H-function as PDF, cumulative distribution function, and moments of the EGC output Signal-to-noise ratio (SNR), outage probability, amount of fading, channel capacity, and the average symbol error rate for various digital modulation schemes. All results are illustrated and verified by simulations using computer algebra systems. Copyright (C) 2015 John Wiley \& Sons, Ltd.}, issn = {1074-5351}, doi = {10.1002/dac.2925}, author = {El Bouanani, Faissal and Ben-Azza, Hussain} } @article {ElBouanani2017, title = {Unified analysis of EGC diversity over Weibull fading channels}, journal = {International Journal of Communication Systems}, volume = {30}, number = {1}, year = {2017}, note = {cited By 0}, abstract = {In this paper, the performance analysis based on PDF approach of an L-branch equal gain combiner (EGC) over independent and not necessarily identical Weibull fading channels is presented. Several closed-form approximate expressions are derived in terms of only one Fox H-function as PDF, cumulative distribution function, and moments of the EGC output Signal-to-noise ratio (SNR), outage probability, amount of fading, channel capacity, and the average symbol error rate for various digital modulation schemes. All results are illustrated and verified by simulations using computer algebra systems. Copyright {\textcopyright} 2015 John Wiley \& Sons, Ltd.}, doi = {10.1002/dac.2925}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84922802970\&doi=10.1002\%2fdac.2925\&partnerID=40\&md5=62842fbf8c8f0c9da8c8fc59e1320de5}, author = {El Bouanani, F. and Ben-Azza, H.} } @conference {Haqiq201742, title = {Using BECAMEDA method to specify and verify a smart home system}, booktitle = {ACM International Conference Proceeding Series}, volume = {Part F130526}, year = {2017}, note = {cited By 0}, pages = {42-47}, abstract = {Designing a correct model for smart systems requires an accurate specification and verification prior to development. This paper proposes the use of BECAMEDA (Behavioral SpEcification and VerifiCAtion of RMAS based on E-MDRA) method, which helps the designer predicting the system behaviour, and verifying the relevant behaviour of the system properties. BECAMEDA method is based on Multi-Agent concept and formal method, and it proposes an iterative process consisted of four phases: identification, definition, modelling and verification, to help understanding the system starting from goals identification that captures the system needs, and ending with a formal verification of the system properties. The proposed method is illustrated with an example of a Smart Home System1. {\textcopyright} 2017 Copyright is held by the owner/author(s).}, doi = {10.1145/3128128.3128135}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85030309106\&doi=10.1145\%2f3128128.3128135\&partnerID=40\&md5=41be1e2c80793b0eb4a66d538b1df778}, author = {Haqiq, A. and Bounabat, B.} } @article {Moumane2016, title = {Usability evaluation of mobile applications using ISO 9241 and ISO 25062 standards}, journal = {SpringerPlus}, volume = {5}, number = {1}, year = {2016}, note = {cited By 3}, abstract = {This paper presents an empirical study based on a set of measures to evaluate the usability of mobile applications running on different mobile operating systems, including Android, iOS and Symbian. The aim is to evaluate empirically a framework that we have developed on the use of the Software Quality Standard ISO 9126 in mobile environments, especially the usability characteristic. To do that, 32 users had participated in the experiment and we have used ISO 25062 and ISO 9241 standards for objective measures by working with two widely used mobile applications: Google Apps and Google Maps. The QUIS 7.0 questionnaire have been used to collect measures assessing the users{\textquoteright} level of satisfaction when using these two mobile applications. By analyzing the results we highlighted a set of mobile usability issues that are related to the hardware as well as to the software and that need to be taken into account by designers and developers in order to improve the usability of mobile applications. {\textcopyright} 2016, Moumane et al.}, doi = {10.1186/s40064-016-2171-z}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964771111\&doi=10.1186\%2fs40064-016-2171-z\&partnerID=40\&md5=a8cf9ebe6e65c0ea9863ef6d1ce8bca8}, author = {Moumane, K.a and Idri, A.a and Abran, A.b} } @article { ISI:000375706200001, title = {Usability evaluation of mobile applications using ISO 9241 and ISO 25062 standards}, journal = {SPRINGERPLUS}, volume = {5}, year = {2016}, month = {APR 29}, abstract = {This paper presents an empirical study based on a set of measures to evaluate the usability of mobile applications running on different mobile operating systems, including Android, iOS and Symbian. The aim is to evaluate empirically a framework that we have developed on the use of the Software Quality Standard ISO 9126 in mobile environments, especially the usability characteristic. To do that, 32 users had participated in the experiment and we have used ISO 25062 and ISO 9241 standards for objective measures by working with two widely used mobile applications: Google Apps and Google Maps. The QUIS 7.0 questionnaire have been used to collect measures assessing the users{\textquoteright} level of satisfaction when using these two mobile applications. By analyzing the results we highlighted a set of mobile usability issues that are related to the hardware as well as to the software and that need to be taken into account by designers and developers in order to improve the usability of mobile applications.}, issn = {2193-1801}, doi = {10.1186/s40064-016-2171-z}, author = {Moumane, Karima and Idri, Ali and Abran, Alain} } @conference {Afyf2016425, title = {UWB thin film flexible antenna for microwave thermography for breast cancer detection}, booktitle = {Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016}, year = {2016}, note = {cited By 0}, pages = {425-429}, abstract = {A novel low-cost flexible antenna for a non-invasive and highly sensitive method to detect malign tumors in the early stages, contributing to diminishing the mortality which appears in the cases where the breast cancer was detected in late incurable stages. Using thin film Kapton substrate the flexible antenna has been built and carried out by the use of CST Microwave Studio software. The proposed structure operate in S-band (with reflection coefficient (S11) below-10dB) and has an ultra-wide band (UWB) characteristic providing an important bandwidth of about 2,4 GHz with a center frequency around 3 GHz. In order to predict the effect of the human body on the S-parameter response of the developed antenna design, an inhomogeneous multi-layer model of the women breast is used. The simulated results indicate that the proposed antenna kept it UWB property. The overall size of the miniaturized antenna is 20mm{\texttimes}22mm which make it very suitable for a radar-based breast cancer detection system. {\textcopyright} 2016 IEEE.}, doi = {10.1109/EITech.2016.7519635}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84992195805\&doi=10.1109\%2fEITech.2016.7519635\&partnerID=40\&md5=348267fc2a9e46d247350579e616bbe7}, author = {Afyf, A.a and Bellarbi, L.a and Achour, A.a and Yaakoubi, N.b and Errachid, A.c and Adel Sennouni, M.d} } @conference { ISI:000391354500075, title = {UWB Thin Film Flexible Antenna for Microwave Thermography for Breast Cancer Detection}, booktitle = {2016 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT)}, year = {2016}, note = {2nd International Conference on Electrical and Information Technologies (ICEIT), Tangier, MOROCCO, MAY 04-07, 2016}, pages = {425-429}, abstract = {A novel low-cost flexible antenna for a non-invasive and highly sensitive method to detect malign tumors in the early stages, contributing to diminishing the mortality which appears in the cases where the breast cancer was detected in late incurable stages. Using thin film Kapton substrate the flexible antenna has been built and carried out by the use of CST Microwave Studio software. The proposed structure operate in S-band (with reflection coefficient (S11) below -10dB) and has an ultra-wide band (UWB) characteristic providing an important bandwidth of about 2,4 GHz with a center frequency around 3 GHz. In order to predict the effect of the human body on the S-parameter response of the developed antenna design, an inhomogeneous multi-layer model of the women breast is used. The simulated results indicate that the proposed antenna kept it UWB property. The overall size of the miniaturized antenna is 20mmx22mm which make it very suitable for a radar-based breast cancer detection system.}, isbn = {978-1-4673-8469-8}, author = {Afyf, Amal and Bellarbi, Larbi and Achour, Anouar and Yaakoubi, Nourdin and Errachid, Abdelhamid and Sennouni, M. Adel}, editor = {Essaaidi, M and ElHani, S} } @article {ElBouanani2015, title = {Unified analysis of EGC diversity over Weibull fading channels}, journal = {International Journal of Communication Systems}, volume = {30}, number = {1}, year = {2015}, note = {cited By 0}, abstract = {In this paper, the performance analysis based on PDF approach of an L-branch equal gain combiner (EGC) over independent and not necessarily identical Weibull fading channels is presented. Several closed-form approximate expressions are derived in terms of only one Fox H-function as PDF, cumulative distribution function, and moments of the EGC output Signal-to-noise ratio (SNR), outage probability, amount of fading, channel capacity, and the average symbol error rate for various digital modulation schemes. All results are illustrated and verified by simulations using computer algebra systems. Copyright {\textcopyright} 2015 John Wiley \& Sons, Ltd.}, doi = {10.1002/dac.2925}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84922802970\&doi=10.1002\%2fdac.2925\&partnerID=40\&md5=62842fbf8c8f0c9da8c8fc59e1320de5}, author = {El Bouanani, F.a and Ben-Azza, H.b} } @article {Ettazi2015479, title = {A user centered design approach for transactional service adaptation in context aware environment}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {9466}, year = {2015}, note = {cited By 0}, pages = {479-484}, abstract = {Today, information systems are radically marked by considerable progress in the areas of software engineering, telecommunications and ubiquitous computing. This has led to the development of new interaction pattern where the service oriented architecture is the de facto pattern. In this article, we are particularly interested in transactional services. We position our approach in the context of a user-centered model driven engineering (MDE) approach in order to move from one perspective where models were contemplative artifacts to a perspective where they become productive artifacts. For this, we first present our approach for managing context-aware transactional services (CATS). Then, we propose a CATS specification and metamodel. The adaptation mechanism is also detailed in this paper. {\textcopyright} Springer International Publishing Switzerland 2015.}, doi = {10.1007/978-3-319-26850-7_35}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961168931\&doi=10.1007\%2f978-3-319-26850-7_35\&partnerID=40\&md5=161ddb896204ff4729d19420302d0566}, author = {Ettazi, W.a and Hafiddi, H.a b and Nassar, M.a} } @conference {Ouaftouh2015, title = {User profile model: A user dimension based classification}, booktitle = {2015 10th International Conference on Intelligent Systems: Theories and Applications, SITA 2015}, year = {2015}, note = {cited By 0}, abstract = {As the amount of information offered by information systems is increasing exponentially, the need of personalized approaches for information access increases. This work discusses user profiles designed for providing personalized information access. We first present a general classification of research directions on adaptive systems, followed by a state-of-the-art study about user profiling. We propose then a new classification approach of user profile model. This classification is based on the user dimensions considered to build the user profile. {\textcopyright} 2015 IEEE.}, doi = {10.1109/SITA.2015.7358378}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84962408714\&doi=10.1109\%2fSITA.2015.7358378\&partnerID=40\&md5=ca06e7ab84ba76c5e6dfa5355f6faed2}, author = {Ouaftouh, S. and Zellou, A. and Idri, A.} } @conference { ISI:000380409500004, title = {User profile model: a user dimension based classification}, booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)}, year = {2015}, note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015}, publisher = {IEEE}, organization = {IEEE}, abstract = {As the amount of information offered by information systems is increasing exponentially, the need of personalized approaches for information access increases. This work discusses user profiles designed for providing personalized information access. We first present a general classification of research directions on adaptive systems, followed by a state-of-the-art study about user profiling. We propose then a new classification approach of user profile model. This classification is based on the user dimensions considered to build the user profile.}, isbn = {978-1-5090-0220-7}, author = {Ouaftouh, Sara and Zellou, Ahmed and Idri, Ali} } @conference { ISI:000383221800006, title = {Using Cloud SaaS to ensure interoperability and standardization in heterogeneous Cloud based environment}, booktitle = {PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT)}, year = {2015}, note = {5th World Congress on Information and Communication Technologies (WICT), Marrakesh, MOROCCO, DEC 14-16, 2015}, pages = {29-34}, publisher = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, organization = {IEEE; IEEE Morocco Sect; IEEE Morocco Sect; IEEE SMC Tech Comm Soft Comp; Lab Informatique, Reseaux Mobilite Modelisation; lab Res Grp Intelligent Machines; MIR Labs}, abstract = {During the last years, because of the evolution of Cloud applications and the attractive advantages given to consumers, many companies outsource their data and Information Technology (IT) system to the Cloud based technology. With the growth in the number of Cloud Service Providers, many enterprises and organizations can use and associate services from multiple providers. There may be many Internet protocols for service access standards that are used to ensure interoperability between users browser and Web server, such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP). Each service has its specific characteristics such as authentication and security requirements. Hence, Cloud providers attempt to lock customers into proprietary interfaces so consumers can find themselves at not expects inevitable vendor lock-in. Therefore, the focus of our paper is to propose a solution to this problem by using Cloud intermediate between Cloud providers and consumer in heterogeneous Cloud environments interfaces. This is to achieve benefits such as standardization and interoperability, minimizing lock-in of Cloud providers. To reach such benefits, we propose a Cloud SaaS based on two interfaces and an interne component. These interfaces are used in Cloud Consumer and Provider sides and therefore guarantee communication between Cloud Consumer and Provider using different Internet protocols for Web service access such as REST and SOAP. Our approach guarantees interoperability and standardization in heterogeneous Cloud based environments because in this case Cloud Consumer and Provider using REST interface can communicate easily with Cloud Provider and Consumer using SOAP interface.}, isbn = {978-1-4673-8712-5}, author = {Majda, Elhozmari and Ahmed, Ettalbi}, editor = {Abrahim, A and Alimi, AM and Haqiq, A and Karray, H and Mousannif, H and BenHalima, M and Choo, YH and Ma, K} } @conference {Majda201529, title = {Using cloud SaaS to ensure interoperability and standardization in heterogeneous Cloud based environment}, booktitle = {Proceedings of the 2015 5th World Congress on Information and Communication Technologies, WICT 2015}, year = {2015}, note = {cited By 0}, pages = {29-34}, abstract = {During the last years, because of the evolution of Cloud applications and the attractive advantages given to consumers, many companies outsource their data and Information Technology (IT) system to the Cloud based technology. With the growth in the number of Cloud Service Providers, many enterprises and organizations can use and associate services from multiple providers. There may be many Internet protocols for service access standards that are used to ensure interoperability between users browser and Web server, such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP). Each service has its specific characteristics such as authentication and security requirements. Hence, Cloud providers attempt to lock customers into proprietary interfaces so consumers can find themselves at not expects inevitable vendor lock-in. Therefore, the focus of our paper is to propose a solution to this problem by using Cloud intermediate between Cloud providers and consumer in heterogeneous Cloud environments interfaces. This is to achieve benefits such as standardization and interoperability, minimizing lock-in of Cloud providers. To reach such benefits, we propose a Cloud SaaS based on two interfaces and an interne component. These interfaces are used in Cloud Consumer and Provider sides and therefore guarantee communication between Cloud Consumer and Provider using different Internet protocols for Web service access such as REST and SOAP. Our approach guarantees interoperability and standardization in heterogeneous Cloud based environments because in this case Cloud Consumer and Provider using REST interface can communicate easily with Cloud Provider and Consumer using SOAP interface. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WICT.2015.7489640}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979763191\&doi=10.1109\%2fWICT.2015.7489640\&partnerID=40\&md5=8ecb7e7a0281a3ec056175d9af0dba04}, author = {Majda, E. and Ahmed, E.} } @article {Idrissi2014138, title = {Upgrading the semantics of the relational model for rich OWL 2 ontology learning}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {68}, number = {1}, year = {2014}, note = {cited By 3}, pages = {138-148}, abstract = {This paper is interested in the ontology learning from relational databases (RDB) that exploits already approved semantics about a domain and translates them to application ontology. However, the relational model is recognized to be less expressive and incapable to support some conceptualizations. Without an explicit model of the domain semantics in the relational model, the automatic learning of ontology risks to infer incorrect semantics. In this paper, we give some proof case studies and we propose a model to upgrade the semantics of the relational model, before the ontology learning. The paper presents the constructs of the proposed model and it shows how they are translated to constructs of OWL 2 ontology. {\textcopyright} 2005 - 2014 JATIT and LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84907749311\&partnerID=40\&md5=f93c558897cf83811272e803b0d298e7}, author = {Idrissi, B.E. and Baina, S. and Baina, K.} } @conference {Laghouaouta2014, title = {On the use of graph transformations for model composition traceability}, booktitle = {Proceedings - International Conference on Research Challenges in Information Science}, year = {2014}, note = {cited By 1}, abstract = {The model composition provides support to build systems based on a set of less complex sub-models. This operation allows managing complexity while supporting the modularity and reusability tasks. Due to the increase number of the involving models, their composition becomes a tedious task. For that, the need for maintaining traceability information is raised to help managing the composition operation. We propose in this work a graph-based model transformations approach, which aims to keep track of the model composition operation. Our objective is to capture traces in an automatic and reusable manner. Finally, a composition scenario is given to demonstrate the feasibility of our proposal. {\textcopyright} 2014 IEEE.}, doi = {10.1109/RCIS.2014.6861075}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84906762143\&doi=10.1109\%2fRCIS.2014.6861075\&partnerID=40\&md5=294fe5676734e151d6e8764405acb765}, author = {Laghouaouta, Y.a and Nassar, M.b and Anwar, A.c and Bruel, J.-M.d} } @conference { ISI:000380387700028, title = {Using ISO 9126 with QoS DiffServ Model for Evaluating Software Quality in Mobile Environments}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {134-139}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Evaluation of software quality in mobile environments is a subject of active research and is a difficult task. This is caused by dynamic characteristics of mobile networks and the limited resources of mobile devices. This paper presents a study to help quality managers and evaluators using the ISO 9126 software quality standard, with the DiffServ QoS model to evaluate product quality in mobile environments. The effects of mobile technologies limitations are analyzed for each QoS parameter and for each Diffserv class. As a result of this study, the reliability and the efficiency are the software product quality characteristics, the most correlated with Diffserv classes in terms of influence of the mobile environment limitations. It is caused by the fact that these characteristics are dependent on the software runtime environment and the Diffserv QoS model focuses on the quality at the network level, unlike the ISO 9126 standard that applies to the application level.}, isbn = {978-1-4799-4647-1}, author = {Moumane, Karima and Idri, Ali} } @conference {Moumane2014134, title = {Using ISO 9126 with QoS DiffServ model for evaluating software quality in mobile environments}, booktitle = {2014 2nd World Conference on Complex Systems, WCCS 2014}, year = {2014}, note = {cited By 1}, pages = {134-139}, abstract = {Evaluation of software quality in mobile environments is a subject of active research and is a difficult task. This is caused by dynamic characteristics of mobile networks and the limited resources of mobile devices. This paper presents a study to help quality managers and evaluators using the ISO 9126 software quality standard, with the DiffServ QoS model to evaluate product quality in mobile environments. The effects of mobile technologies limitations are analyzed for each QoS parameter and for each Diffserv class. As a result of this study, the reliability and the efficiency are the software product quality characteristics, the most correlated with Diffserv classes in terms of influence of the mobile environment limitations. It is caused by the fact that these characteristics are dependent on the software runtime environment and the Diffserv QoS model focuses on the quality at the network level, unlike the ISO 9126 standard that applies to the application level. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICoCS.2014.7060905}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84929192929\&doi=10.1109\%2fICoCS.2014.7060905\&partnerID=40\&md5=d21fd7dfbdbd844dde3c3a557fc5b822}, author = {Moumane, K. and Idri, A.} } @conference {Aoun201442, title = {Using Markov decision processes to solve stochastic gate assignment problem}, booktitle = {Proceedings of 2nd IEEE International Conference on Logistics Operations Management, GOL 2014}, year = {2014}, note = {cited By 0}, pages = {42-47}, abstract = {Airport traffic often undergoes some random disruptions, which have to be considered to ensure operational flight-gate assignments. Inadequate assignment of gates may result in flight delays that happen in airport operations and must be taken into account. Here, we are using the original algorithm, based on Markov decision process (MDP) to solve the gate assignment problem (GAP) under uncertainty; we include stochastic parameters that depend on probabilities to express fluctuations in flight operations. The use of MDP for modeling will provide for airport controllers a robust solution for the GAP that takes in consideration possible flight delays. This paper gives the corresponding model, which includes strict constraints of the GAP and other soft constraints like choice preferences of gates. We give experimental results on a sample of real data to demonstrate the feasibility and efficiency of our approach. {\textcopyright} 2014 IEEE.}, doi = {10.1109/GOL.2014.6887445}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84908638693\&doi=10.1109\%2fGOL.2014.6887445\&partnerID=40\&md5=5ca43e35806c14816feb2afcffb9c9c8}, author = {Aoun, O. and El Afia, A.} } @conference { ISI:000346582400007, title = {Using Markov Decision Processes to Solve Stochastic Gate Assignment Problem}, booktitle = {PROCEEDINGS OF 2014 2ND IEEE INTERNATIONAL CONFERENCE ON LOGISTICS AND OPERATIONS MANAGEMENT (GOL 2014)}, year = {2014}, note = {2nd IEEE International Conference on Logistics Operations Management (GOL), Rabat, MOROCCO, JUN 05-07, 2014}, pages = {42-47}, publisher = {IEEE; Mohammed VI Souissi Univ, ENSIAS Sch; Univ Le Havre; Sidi Mohamed Ben Abdellah Univ, FST}, organization = {IEEE; Mohammed VI Souissi Univ, ENSIAS Sch; Univ Le Havre; Sidi Mohamed Ben Abdellah Univ, FST}, abstract = {Airport traffic often undergoes some random disruptions, which have to be considered to ensure operational flight-gate assignments. Inadequate assignment of gates may result in flight delays that happen in airport operations and must be taken into account. Here, we are using the original algorithm, based on Markov decision process (MDP) to solve the gate assignment problem (GAP) under uncertainty; we include stochastic parameters that depend on probabilities to express fluctuations in flight operations. The use of MDP for modeling will provide for airport controllers a robust solution for the GAP that takes in consideration possible flight delays. This paper gives the corresponding model, which includes strict constraints of the GAP and other soft constraints like choice preferences of gates. We give experimental results on a sample of real data to demonstrate the feasibility and efficiency of our approach.}, isbn = {978-1-4799-4650-1}, author = {Aoun, Oussama and El Afia, Abdellatif}, editor = {Benadada, Y} } @conference {BenIssa20141625, title = {UWB square split ring resonator slot antenna for WLAN and C band application}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2014}, note = {cited By 0}, pages = {1625-1627}, abstract = {In this paper, a novel UWB square split ring resonator slot antenna is presented. The antenna is electromagnetically fed by a U- shaped microstrip line, and is operating from 4.61 GHz to 8.75 GHz. The gain and pattern plots of the antenna are included in the paper. The entire antenna only occupies a compact volume. The proposed antenna is analyzed both numerically with Ansoft HFSS and CST. {\textcopyright} 2014 IEEE.}, doi = {10.1109/ICMCS.2014.6911228}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928720867\&doi=10.1109\%2fICMCS.2014.6911228\&partnerID=40\&md5=427bb101f657bab69d5fc39186df9f4d}, author = {Ben Issa, I.a and Essaaidi, M.b} } @conference { ISI:000366999600295, title = {UWB Square Split Ring Resonator Slot Antenna for WLAN and C Band Application}, booktitle = {2014 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2014}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, MOROCCO, APR 14-16, 2014}, pages = {1625-1627}, abstract = {In this paper, a novel UWB square split ring resonator slot antenna is presented. The antenna is electromagnetically fed by a U-shaped microstrip line, and is operating from 4.61 GHz to 8.75 GHz. The gain and pattern plots of the antenna are included in the paper. The entire antenna only occupies a compact volume. The proposed antenna is analyzed both numerically with Ansoft HFSS and CST.}, isbn = {978-1-4799-3824-7}, author = {Ben Issa, Iman and Essaaidi, Mohamed} } @conference {Idri20131, title = {On the use of software quality standard ISO/IEC9126 in mobile environments}, booktitle = {Proceedings - Asia-Pacific Software Engineering Conference, APSEC}, volume = {1}, year = {2013}, note = {cited By 5}, pages = {1-8}, abstract = {The capabilities and resources offered by mobile technologies are still far from those provided by fixed environments, and this poses serious challenges, in terms of evaluating the quality of applications operating in mobile environments. This article presents a study to help quality managers apply the ISO 9126 standard on software quality, particularly the External Quality model, to mobile environments. The influence of the limitations of mobile technologies are evaluated for each software quality characteristic, based on the coverage rates of its external metrics, which are themselves influenced by these limitations. The degrees of this influence are discussed and aggregated to provide useful recommendations to quality managers for their evaluation of quality characteristics in mobile environments. These recommendations are intended for mobile software in general and aren{\textquoteright}t targeted a specific ones. The External Quality model is especially valuable for assessing the Reliability, Usability, and Efficiency characteristics, and illustrates very well the conclusive nature of the recommendations of this study. However, more study is needed on the other quality characteristics, in order to determine the relevance of evaluating them in mobile environments. {\textcopyright} 2013 IEEE.}, doi = {10.1109/APSEC.2013.12}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84936873378\&doi=10.1109\%2fAPSEC.2013.12\&partnerID=40\&md5=c03a500f9cc8333928ee18beee27b06c}, author = {Idri, A.a and Moumane, K.a and Abran, A.b} } @conference { ISI:000358736600001, title = {On the Use of Software Quality Standard ISO/IEC9126 in Mobile Environments}, booktitle = {2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1}, series = {Asia-Pacific Software Engineering Conference}, year = {2013}, note = {20th Asia-Pacific Software Engineering Conference (APSEC), Chulalongkorn Univ, Fac Engn, Dept Comp Engn, Bangkok, THAILAND, DEC 02-05, 2013}, pages = {1-8}, publisher = {Prov Elect Author; Metropolitan Elect Author; Thailand Convent \& Exhibit Bur; IEEE Comp Soc}, organization = {Prov Elect Author; Metropolitan Elect Author; Thailand Convent \& Exhibit Bur; IEEE Comp Soc}, abstract = {The capabilities and resources offered by mobile technologies are still far from those provided by fixed environments, and this poses serious challenges, in terms of evaluating the quality of applications operating in mobile environments. This article presents a study to help quality managers apply the ISO 9126 standard on software quality, particularly the External Quality model, to mobile environments. The influence of the limitations of mobile technologies are evaluated for each software quality characteristic, based on the coverage rates of its external metrics, which are themselves influenced by these limitations. The degrees of this influence are discussed and aggregated to provide useful recommendations to quality managers for their evaluation of quality characteristics in mobile environments. These recommendations are intended for mobile software in general and aren{\textquoteright}t targeted a specific ones. The External Quality model is especially valuable for assessing the Reliability, Usability, and Efficiency characteristics, and illustrates very well the conclusive nature of the recommendations of this study. However, more study is needed on the other quality characteristics, in order to determine the relevance of evaluating them in mobile environments.}, isbn = {978-1-4799-2143-0}, issn = {1530-1362}, doi = {10.1109/APSEC.2013.12}, author = {Idri, Ali and Moumane, Karima and Abran, Alain}, editor = {Muenchaisri, P and Rothermel, G} } @conference { ISI:000350287800016, title = {User experience-based evaluation of open source Workflow systems: The cases of Bonita, Activiti, jBPM, and Intalio}, booktitle = {2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB}, year = {2013}, note = {ISKO-Maghreb 3rd International Symposium, Marrakech, MOROCCO, NOV 08-09, 2013}, publisher = {ISKO}, organization = {ISKO}, abstract = {The task of selecting a workflow system becomes more and more complex and risky. For this reason, organisations require a broad, and a clear vision of which workflow engines are, and will continue to be, suitable for changing requirements. This paper presents a user experience based evaluation model for workflow systems to analyse, compare, and select business process management modelling and enactment systems according to user specific requirements. After the description of the underlying worflow system evaluation model itself, we experiment it to assess criteria satisfaction on four open source workflow systems Bonita, Activiti, JBPM, and Intalio.}, isbn = {978-1-4799-3392-1}, author = {Baina, Karim and Baina, Salah} } @conference {Baina2013, title = {User experience-based evaluation of open source workflow systems: The cases of Bonita, Activiti, jBPM, and Intalio}, booktitle = {2013 3rd International Symposium ISKO-Maghreb}, year = {2013}, note = {cited By 0}, abstract = {The task of selecting a workflow system becomes more and more complex and risky. For this reason, organisations require a broad, and a clear vision of which workflow engines are, and will continue to be, suitable for changing requirements. This paper presents a user experience based evaluation model for workflow systems to analyse, compare, and select business process management modelling and enactment systems according to user specific requirements. After the description of the underlying worflow system evaluation model itself, we experiment it to assess criteria satisfaction on four open source workflow systems Bonita, Activiti, jBPM, and Intalio. {\textcopyright} 2013 IEEE.}, doi = {10.1109/ISKO-Maghreb.2013.6728122}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84894193092\&doi=10.1109\%2fISKO-Maghreb.2013.6728122\&partnerID=40\&md5=0c61b33a2afdcf09570670c26426a6c3}, author = {Baina, K. and Baina, S.} } @article {Benhaddi2013523, title = {The user-centric soa and its impacts on other disciplines}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {54}, number = {3}, year = {2013}, note = {cited By 1}, pages = {523-531}, abstract = {The end user service development known as the user-centric SOA emerged as a new approach that allows giving the end user the ability to create on the fly his own applications that meet a situational need. In fact, the classical SOA was designed for developers and is characterized by a heavy technical stack which is out of reach of end users. The user-centric SOA approach brings great added value taking advantage from the creativity and the participation of end users; furthermore, it is becoming a key factor of competitiveness within enterprises and is influencing other disciplines. The Cloud Computing and the Enterprise Architecture are two fields that captured growing attention in recent years and that can gain maturity and efficiency from adopting and embracing the user-centric SOA approach. In this paper, we present the user-centric SOA approach and we give an overview of our solution for an efficient user-centric services creation. Then we study the impact of the user-centric SOA on the Cloud Computing and Enterprise Architecture fields. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883372686\&partnerID=40\&md5=f6c288a49e40715a31fbd5b2f489de7e}, author = {Benhaddi, M.a and Ba{\"\i}na, K.b and Abdelwahed, E.H.a} } @conference {ElBouanani20131494, title = {Using lexicometry and vocabulary analysis techniques to detect a signature for web profile}, booktitle = {Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013}, year = {2013}, note = {cited By 0}, pages = {1494-1498}, abstract = {Our research theme is evolving around the concept of computer profiling. The aim of our work is to propose an approach that will detect web profiles in a unique way and to model a print web for each profile. Our main concern is to find this signature from text messages in the forums, by analyzing the vocabulary used by each user. Also we will focus here on presenting our approach and our future work in a way that will allow us to detect the "Specific Vocabulary" for each web profile. Copyright 2013 ACM.}, doi = {10.1145/2492517.2558568}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84893246694\&doi=10.1145\%2f2492517.2558568\&partnerID=40\&md5=d3d6a325ab8fd941a07351e2044dc572}, author = {El Bouanani, S.E.M. and Kassou, I.} } @conference { ISI:000353639700241, title = {Using lexicometry and vocabulary analysis techniques to detect a signature for web profile}, booktitle = {2013 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM)}, year = {2013}, note = {IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Niagara Falls, CANADA, AUG 25-28, 2013}, pages = {1494-1498}, publisher = {IEEE; Assoc Comp Machinery; Assoc Comp Machinery SIGKDD; IEEE Comp Soc; IEEE TCDE; Global Univ; Hellen American Univ; Springer; Microsoft; EXtra; Springer Verlag; Assoc Comp Machinery SIGMOD}, organization = {IEEE; Assoc Comp Machinery; Assoc Comp Machinery SIGKDD; IEEE Comp Soc; IEEE TCDE; Global Univ; Hellen American Univ; Springer; Microsoft; EXtra; Springer Verlag; Assoc Comp Machinery SIGMOD}, abstract = {Our research theme is evolving around the concept of computer profiling. The aim of our work is to propose an approach that will detect web profiles in a unique way and to model a print web for each profile. Our main concern is to find this signature from text messages in the forums, by analyzing the vocabulary used by each user. Also we will focus here on presenting our approach and our future work in a way that will allow us to detect the {\textquoteleft}{\textquoteleft}Specific Vocabulary{{\textquoteright}{\textquoteright}} for each web profile.}, isbn = {978-1-4503-2240-9}, author = {El Bouanani, Sara El Manar and Kassou, Ismail}, editor = {Ozyer, T and Carrington, P} } @article { ISI:000309649500004, title = {Using Aspect-Oriented State Machines for Detecting and Resolving Feature Interactions}, journal = {COMPUTER SCIENCE AND INFORMATION SYSTEMS}, volume = {9}, number = {3, SI}, year = {2012}, month = {SEP}, pages = {1045-1074}, abstract = {Composing different features in a software system may lead to conflicting situations. The presence of one feature may interfere with the correct functionality of another feature, resulting in an incorrect behavior of the system. In this work we present an approach to manage feature interactions. A formal model, using Finite State Machines (FSM) and Aspect-Oriented (AO) technology, is used to specify, detect and resolve features interactions. In fact aspects can resolve interactions by intercepting the events which causes troubleshoot. Also a Domain-Specific Language (DSL) was developed to handle Finite State Machines using a pattern matching technique.}, issn = {1820-0214}, doi = {10.2298/CSIS111216033D}, author = {Dinkelaker, Tom and Erradi, Mohammed and Ayache, Meryeme} } @article {Dinkelaker20121045, title = {Using aspect-oriented state machines for detecting and resolving feature interactions}, journal = {Computer Science and Information Systems}, volume = {9}, number = {3}, year = {2012}, note = {cited By 2}, pages = {1045-1074}, doi = {10.2298/CSIS111216033D}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867471411\&doi=10.2298\%2fCSIS111216033D\&partnerID=40\&md5=a033e4838afaf44fbd961002569f0da2}, author = {Dinkelaker, T. and Erradi, M. and Ayache, M.} } @article {8885929720120901, title = {Using Aspect-Oriented State Machines for Detecting and Resolving Feature Interactions.}, journal = {Computer Science \& Information Systems}, volume = {9}, number = {3}, year = {2012}, pages = {1046 - 1074}, abstract = {The article focuses on the use of aspect-oriented state machines that helps in detecting feature interactions. It mentions that domain- specific language (DSL) is introduced to manage Finite State Machines with pattern matching technique. It mentions that in software product-line (SPL) engineers divides a software system into functional features through feature model.}, keywords = {aspect interactions, Aspect-oriented programming, Computer hardware description languages, Computer software, conflict detection, conflict resolution, domain-specific aspect languages, feature interactions, Finite state machines (Computer science), formal methods, Image registration, object-oriented programming, state machines}, issn = {18200214}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=88859297\&site=ehost-live}, author = {Dinkelaker, Tom and Erradi, Mohammed and Ayache, Meryeme} } @article {Chiheb201169, title = {Using objective online testing tools to assess students{\textquoteright} learning: Potentials and limitations}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {24}, number = {1}, year = {2011}, note = {cited By 1}, pages = {69-72}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79951845409\&partnerID=40\&md5=8dfb6d5a464b4a730925a6ff3009b592}, author = {Chiheb, R. and Faizi, R. and El Afia, A.} } @conference {Elbhiri2011, title = {UWB based maximizing network liftime with route selection strategies for wireless sensor networks}, booktitle = {International Conference on Multimedia Computing and Systems -Proceedings}, year = {2011}, note = {cited By 0}, doi = {10.1109/ICMCS.2011.5945636}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79961216854\&doi=10.1109\%2fICMCS.2011.5945636\&partnerID=40\&md5=3640a80cc17beb1f99c1d6741aece8e9}, author = {Elbhiri, B. and Saadane, R. and Fkihi, S.E. and Aboutajdine, D. and Wahbi, M.} } @article {5099547320100301, title = {The Uplink Capacity Evaluation of Wireless Networks: Spectral Analysis Approach.}, journal = {Journal of Computing \& Information Technology}, volume = {18}, number = {1}, year = {2010}, pages = {1 - 17}, abstract = {In this paper we study the capacity of wireless cellular network, in particular the uplink of WCDMA system by using the two dimensional continuous-time Markov chain (CTMC) technique. Considering two types of calls: real-time (RT) calls characterized by a quasi fixed transmission rate, and best-effort (BE) calls which do not require strict demand but need some reliability conditions, we develop an approach based on the spectral analysis for evaluating the cell capacity. We explicitly obtain the simultaneous distribution of the number of RT connections and the number of BE connections in the steady-state. This analysis allows us to simplify the computation of the performance measures including expected delay and throughput of BE traffic. These performances are obtained explicitly in both cases (finite and infinite) of BE calls as function of system parameters like arrival rate of BE and RT calls, service rate of BE and RT calls. These results allow the operator to evaluate the cell capa}, keywords = {call admission control, Data transmission systems, Markov processes, Matrix-Geometric method, Mobile communication systems, spectral analysis approach, Spectrum analysis, Telecommunication systems, Wireless communication systems, wireless networks}, issn = {13301136}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=50995473\&site=ehost-live}, author = {Kobbane, Abdellatif and El-Azouzi, Rachid and Ibrahimi, Khalil and Samanta, Sujit Kumar and Bouyakhf, El-Houssine} } @article {4562825020091002, title = {Using Mobility to Enhance Routing Process in MIS System.}, journal = {International Journal of Interactive Mobile Technologies}, volume = {3}, number = {S2}, year = {2009}, pages = {24 - 32}, abstract = {This paper introduces the original Mobile Intelligent System (MIS) in an embedded Field-Programmable Gate Array (FPGA) architecture. This would allow the construction of autonomous mobile network units which can move in environments that are unknown, inaccessible or hostile for human beings, in order to collect data by various sensors and route it to a distant processing unit. To have a better performing routing process, we propose a new mobility measure. Each node measures its own mobility in the network, based on its neighbors{\textquoteright} information. This measure has no unit and is calculated by quantification in regular time intervals. [ABSTRACT FROM AUTHOR]}, keywords = {ad hoc networks, Computer architecture, Information systems embedded application, Intelligent agents (Computer software), intelligent sensors, Mobile communication systems, multipoint relays, node mobility and mobility quantification, OLSR protocol, Routers (Computer networks), Routing (Computer network management) {\textendash} Equipment \& supplies, wireless sensor network}, issn = {18657923}, url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=45628250\&site=ehost-live}, author = {Oudidi, K. and Habbani, A. and Elkoutbi, M.} } @conference {Jakimi2008521, title = {Use cases and scenarios engineering}, booktitle = {Innovations{\textquoteright}07: 4th International Conference on Innovations in Information Technology, IIT}, year = {2008}, note = {cited By 0}, pages = {521-525}, doi = {10.1109/IIT.2007.4430418}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-50249112803\&doi=10.1109\%2fIIT.2007.4430418\&partnerID=40\&md5=82fe395e89ce2d783684d6544100e69f}, author = {Jakimi, A. and Sabraoui, A. and Badidi, E. and Idri, A. and El Koutbi, M.} } @conference { ISI:000259601400195, title = {Using UAM scenarios in B2B systems}, booktitle = {2008 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING, VOLS 1-3}, year = {2008}, note = {International Conference on Computer and Communication Engineering, Kuala Lumpur, MALAYSIA, MAY 13-15, 2008}, pages = {964+}, publisher = {Int Islam Univ Malaysia, Fac Engn}, organization = {Int Islam Univ Malaysia, Fac Engn}, abstract = {Over the past years, scenarios have received significant attention and have been used for different purposes such as understanding requirements, human computer interaction analysis, and object-oriented analysis and design. In this paper, we suggest to apply the scenario approach to B2B systems (Business to Business). We propose, to develop B2B systems as a three activities process deriving formal specifications and code skeletons from UML scenarios. Activities of this proposed process are generally automatic and are supported by a set of developed algorithms and tools.}, isbn = {978-1-4244-2357-6}, doi = {10.1109/ICCCE.2008.4580750}, author = {Jakimi, A. and Sabraoui, A. and Salah, A. and El Koutbi, M.} } @conference { ISI:000255983000056, title = {Use cases and scenarios engineering}, booktitle = {2007 INNOVATIONS IN INFORMATION TECHNOLOGIES, VOLS 1 AND 2}, year = {2007}, note = {4th International Conference on Innovations in Information Technology, Dubai, U ARAB EMIRATES, NOV 18-20, 2007}, pages = {274+}, publisher = {IEEE}, organization = {IEEE}, abstract = {\textbackslash{} In this paper, we suggest a requirement engineering process that composes (merge) use cases/scenarios and yields a formal specification of the system in form of a high-level Petri net. Use cases and scenarios are acquired in form of diagrams as defined by the Unified Modeling Language (UML). These diagrams are composed and transformed into Petri net specifications and merged to obtain a global Petri net specification capturing the behavior of the entire system. From the global specification, a system prototype can be generated and embedded in a user interface builder environment for further refinement. Based on end user feedback, the use cases and the input scenarios may be iteratively refined. The result of the overall process is a specification consisting of a global Petri net, together with the generated and refined prototype. This paper discusses some activities of this process.}, isbn = {978-1-4244-1840-4}, author = {Jakimi, A. and Sabraoui, A. and Badidi, E. and Idri, A. and El Koutbi, M.} } @conference { ISI:000245125200117, title = {The use of the annotations in a collaborative activity of reading an online hypermedia course document}, booktitle = {2006 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY BASED HIGHER EDUCATION AND TRAINING, VOLS 1 AND 2}, year = {2006}, note = {7th International Conference on Information Technology Based Higher Education and Training, Sydney, AUSTRALIA, JUL 10-13, 2006}, pages = {797-802}, publisher = {hp; UNESCO; UTS, IICTG; UTS, IML; CeNTIE; IEEE}, organization = {hp; UNESCO; UTS, IICTG; UTS, IML; CeNTIE; IEEE}, abstract = {In this paper, we deal with collective distance learning and in particular for the use of communication tools in the context of a collaborative activity of {\textquoteleft}{\textquoteleft}reading and comprehension of an online hypermedia course document{{\textquoteright}{\textquoteright}}. general, to create a collaborative situation between learners and/or with the tutor, the majority of the existincy systems for e-learning use primarily the traditional communication tools (email, chat and/or discussion forums). These tools constitute an important means to exchange ideas between learners, to validate and enrich their training {[}1]. However, when the exchanges between learners are numerous, learners find difficulties to read all that was exchanged, to distinguish between the most important messages from those which are less, and to associate a message to the corresponding part of the course. To solve these problems and in order to encourage and stimulate the interactions, we think that the association of messages, transcribed by learners or tutor (comment, question, answer, etc), with the corresponding parts of the course, will facilitate their reading and will motivate the learners to use them as a mean of validation of the course concepts and of collaboration. We propose in this paper, a solution based on a collaborative Web annotation tool called SMARTNotes, allowing all learners as well as the tutor to be able to collaborate together for either a part or the globality of the course.}, isbn = {978-1-4244-0405-6}, author = {Bouzidi, Driss and Ajhoun, Rachida and Benkiran, Amine} }