{"title":"Overall design approach for urbanized information systems: Application of the method PRAXEME","authors":"Serehane Lamyae, Abdennebi Talbi","doi":"10.1109/CIST.2014.7016588","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016588","url":null,"abstract":"The IS urbanization is based on the metaphor of the city to meet the agility and responsiveness requirements of IS and to ensure the gradual evolution of the information system. The modeling approach BPM (Business Process Modeling) and SOA(Service Oriented Architecture are two key drivers for the design of an urbanized information system. However, they must be part of a comprehensive approach such as PRAXEME. In this article, we present the foundations of PRAXEME, and project its implementation on the hospital information system to improve quality of care, master costs by mastery of inter-application exchanges and use of services.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122729898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and simulation of multi-agent systems: Principle influence / reaction","authors":"Najia Bouha","doi":"10.1109/CIST.2014.7016615","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016615","url":null,"abstract":"This paper presents a state of the art modeling techniques, namely the macroscopic model, mesoscopic and microscopic. And we will see that in order to solve problems related to space and time encountered in the above models, a new scale model called hybrid appeared Its purpose is to take advantage of conventional models, by adopting the model of the phenomenon. The simulation of multi-agent systems based on the direct representation of behaviors, actions and interactions of a set of autonomous entities operating in a common environment. In this context, the global dynamics of a system at the macroscopic level is seen as the result of the outcome of dynamic interactions that take place at the microscopic level. One of the problems associated with this approach is the link between these two levels of modeling, which is fundamental. However, deduct the macroscopic dynamics of a system based on the dynamics of microscopic level raises many technical and conceptual problems. The model Influence / Reaction of Ferber and Müller will be discussed in detail in this article we will emphasize its shortcomings, and present later the IRM4S (An Influence Reaction Model for Simulation) model that clearly explains the principleand which allows to articulate modeling micro level with the macro-level.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128813177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-platform mobile development approaches","authors":"Salma Charkaoui, Zakaria Adraoui, E. Benlahmar","doi":"10.1109/CIST.2014.7016616","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016616","url":null,"abstract":"The diversity of platforms on the smart phones market, make the mobile applications development quite difficult and very expensive. Platform development could be a good solution for this problem. We'll start by defining cross-platform development, and define the different types of mobile applications, and then define and explain the different approaches used in cross-platform development in order to achieve a comparison between these approaches allowing us to identify the strong points, and weaknesses of each approach. We present our results in a comparative table taking into consideration several criteria. These benchmarks have shown that the choice of a cross-platform development approach depends mainly on two things: to know what type of mobile application should be directed, and or targeted platforms. And adding the fact that multiplatform tools based on these approaches are limited in some point (access to different API platforms, performance compared to native applications ...), this work shows with certainty that more research is needed to go further than the current approaches.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128135233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security in cloud computing approaches and solutions","authors":"Ibtissam Ennajjar, Youness Tabii, Abdelhamid Benkaddour","doi":"10.1109/CIST.2014.7016594","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016594","url":null,"abstract":"Cloud computing has emerged as a popular computing model, with numerous advantages both to end users and providers. The obvious huge advantage is that customers can outsource their infrastructures and benefit of the best technologies and characteristics at low costs. The cost benefits offered by cloud technologies is one of the major reasons that stimulate the growth of cloud computing in many industries. In few years, cloud computing's acceptance from enterprises is increasing but businesses are now finding that there is a number of issues related to security that have to be addressed when venturing into the cloud. As more and more sensitive data and personal information placed in the cloud, security concerns grow up. Building trust in providers it is not an easy mission with an amount of outages and threats declared since adoption of cloud computing. In this paper, an overview on security issues in cloud computing and some solutions to deal with them will be presented.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133547272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linking IT and ERP adoption to socio-economic environment: A survey study on Moroccan SMEs","authors":"Hicham Rachidi, M. E. Mohajir","doi":"10.1109/CIST.2014.7016593","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016593","url":null,"abstract":"The information systems and ERP adopted by small and medium companies are often viewed as key differentiators for their survival in today's competitive and challenging market. However, the integration of information technologies by firms in countries at the development stage is confronted with many barriers that are inherent to their specific cultural, educational and socio-economic environment. Our aim is to explore and understand how SMEs in Morocco are built, structured and managed. From this point, we will identify the key elements that are helping or constraining IT integration within the SME's business infrastructure. In this study, the national survey conducted in Morocco and the results obtained will be presented.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130235369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3D face recognition using facial curves, sparse random projection and fuzzy similarity measure","authors":"Naouar Belghini, Soufiane Ezghari, Azeddine Zahi","doi":"10.1109/CIST.2014.7016639","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016639","url":null,"abstract":"In this paper, we propose a fuzzy similarity based classification approach for 3D face recognition. In the feature extraction method, we exploit curve concept to represent the 3D facial data, two types of curves was considered: depth-level and depth-radial curves. As the dimension of the obtained features is high, the problem “curse of dimensionality” appears. To solve this problem, the Random Projection (RP) method was used. The proposed classifier performs Fuzzification operation using triangular membership functions for input data and ordered weighted averaging operators to measure similarity. Experiment was conducted using vrml files from 3D Database considering only one training sample per person. The obtained results are very promising for depth-level and depth-radial curves, besides the recognition rates are higher than 98%.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123420754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Qualification of teachers in the physical sciences simulation: Case of electricity","authors":"Chekour Mohammed, Khalid Mahdi, Laafou Mohamed, Rachid Janati-Idrissi","doi":"10.1109/CIST.2014.7016624","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016624","url":null,"abstract":"In this paper, we focus on the qualification of teachers of physical sciences in terms of the integration of simulation in teaching the physical concepts. Our distance learning platform based on Moodle, is an effective alternative to continuous training in face-to-face mode. Indeed, conventional training is limited in time and space. The proposed solution allows overcoming the conventional training problems, while taking into consideration the real needs of physics teachers. The training is in agreement with collaborative learning features: Teachers are invited to build their knowledge in simulation software to solve student learning problems by cooperating with other teachers.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
El-Mabrouk Marouane, Ezziyyani Mostafa, Essaaidi Mohammad
{"title":"Toward an optimal model based on inequality measures for treatment of historical & real time flood's dataset","authors":"El-Mabrouk Marouane, Ezziyyani Mostafa, Essaaidi Mohammad","doi":"10.1109/CIST.2014.7016590","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016590","url":null,"abstract":"Flood is always a problem that Morocco tries to overcome it, because of the climate. The climate in Morocco can be divided into five sub-areas, determined by the different influences that the country suffers: oceanic, Mediterranean, montagnard, continental and saharan that's why Flood forecasting becomes a challenge for Morocco. Flood forecasting and control the water flow and water level on the surface is very critical to reduce the impacts while the flood disaster events. The flood forecasting model requires the management of huge spatial datasets, which implies data acquisition, storage and processing, as well as manipulation, reporting and display results. Thus, to reach an excellent prediction in terms of accuracy, it's important to implement a model which be interested by manipulation of the historical datasets from the database in order to minimize the response time of the decision. In this paper, we present a new model for treatment and for comparison by using the GINI Coefficient and the Variance Coefficient in this model which has two access modes to handle historical inundations informations according to the rainfall, the runoff and the water level. The main idea is to use the Inequality Measures to compare the observed distribution with the reference distribution, in other words compare the several data received from the sensors with data already stored in the database to have an appropriate decision about flooding without going through the decision support system for Real Time Flood Forecasting and Warning.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126846267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manel Gherari, A. Amirat, M. Oussalah, Mohamed Ridda Laouar
{"title":"Towards a smart cloud gate for smart devices","authors":"Manel Gherari, A. Amirat, M. Oussalah, Mohamed Ridda Laouar","doi":"10.1109/CIST.2014.7016609","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016609","url":null,"abstract":"Mobile Cloud Computing (MCC) is a new paradigm that has been introduced as an optimal solution for mobile technology's issues. Mobile technology aims to exploit the advantages offered by the Cloud in order to provide ubiquitous PC-like functionalities to mobile users. It is noteworthy that despite the benefits associated with the adoption of the Cloud by mobile technology the gate to the Cloud remains frozen. This means that mobile applications often use the same services without having an update of the novelty in Cloud. Thus, applications lack awareness of new services which are more advantageous in terms of features and qualities than the currently used ones. To enable mobile applications to exploit the Cloud intelligently, we propose Smart Mobile Cloud Architecture (SMCA). We consider this new architecture as referential allowing MCC users to have a full awareness of both contexts (Cloud and Mobile) at the same time. We introduce a new concept called Smart Cloud Gate (SCG), which aims to profile both mobile applications and the Cloud to extract knowledge that will be used as a criteria to select the appropriate services, which will be suggested to mobile applications and give each different application the appropriate view of the Cloud.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115489559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Syllabic Markov models of Arabic HMMs of spoken Arabic using CV units","authors":"M. Ingleby, Fatmah A. Baothman","doi":"10.1109/CIST.2014.7016628","DOIUrl":"https://doi.org/10.1109/CIST.2014.7016628","url":null,"abstract":"We survey evidence - orthographic distributional phonological and psycholinguistic - in favor of a model of Arabic speech sounds based on the CV unit and extensive use of the silent sukuun vowel. We then construct a small-vocabulary multi-speaker CV HMM similar to the phonemic HMMs based on tied triphones that are widely used in speech recognizers for English and other European languages. Using experimental measures of recognition accuracy and trainability, we demonstrate that the CV type of model outperforms a standard tied triphone recognizer for Arabic speech, using Cohen's kappa ration for statistical comparison. Finally we argue that models based on CV units may also lead to better stemmers, spell-checkers and other natural language processing tools for Arabic.","PeriodicalId":106483,"journal":{"name":"2014 Third IEEE International Colloquium in Information Science and Technology (CIST)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128469393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}