{"title":"Web service-based emergence control in cooperative information systems","authors":"Bouanaka Mohamed Ali, Zarour Nacereddine","doi":"10.1109/ICITES.2012.6216666","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216666","url":null,"abstract":"Service Oriented Architectures (SOA) with all technologies especially web services provide a successful model for structuring complex distributed software systems, as they reduce the cost of ownership and easiness of the creation of new applications by composing existing services. However, the developments of service-oriented applications require many external manual tasks and prevailing infrastructure is often based on centralized components that are central points of failure and bottlenecks. Moreover; the existing systems does not take automatically into account the change of the context, goal and the miss expression of the requirement. Future systems that come from the existing services are in need for some properties like autonomous, self-organizing, self-healing, controlled emergence, etc. In this paper, we adapt new architecture that is resulted from the new Organic Computing paradigm shift for the complex systems; which is Observer/Controller architecture. It is a new approach to overcome these limitations. The main important proprieties of the systems are self-organizing; the latter is linked to emergence. We intend to control emergence in composing web services using swarm controlled emergence.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125768495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using graph grammars and meta-modeling to process code mobility in LRN models","authors":"N. Dehimi, A. Chaoui","doi":"10.1109/ICITES.2012.6216654","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216654","url":null,"abstract":"Petri nets have been proposed initially to model concurrency and distributed systems. The ordinary formalism is so simple with a smart formal background, but it fails in modeling mobility aspects. In spite of this, searchers in mobility modeling domain are attracted by Petri nets, and many extensions have been proposed to treat mobility aspects. Among these, we find Labeled Reconfigurable Nets (LRN), This new formalism allows explicit modeling of computational environments and processes mobility between them. It allows, in a simple and an intuitive approach, modeling mobile code paradigms (mobile agent, code on demand, remote evaluation). In this paper, we propose an approach based on the combined use of Meta-modeling and Graph Grammars to automatically generate a visual modeling tool for LRN, for analysis and simulation purposes. This tool produces graphical models, highly-structured to reach this goal. In our approach, the UML Class diagram formalism is used to define a meta-model of LRN. The meta-modeling tool ATOM3 is used to generate a visual modeling tool according to the proposed LRN meta-model. To generate R-Maude specification of the graphically specified LRN models, we have proposed a graph grammar. Then the reconfigurable rewriting logic language R-Maude can be used to perform the simulation of the resulted R-Maude specification. Our approach is illustrated through examples.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. El-Bazzal, K. El-Ahmadieh, Z. Merhi, M. Nahas, A. Haj-Ali
{"title":"A cross layered routing protocol for ad hoc networks","authors":"Z. El-Bazzal, K. El-Ahmadieh, Z. Merhi, M. Nahas, A. Haj-Ali","doi":"10.1109/ICITES.2012.6216684","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216684","url":null,"abstract":"In this paper, we investigate a cross layer design for routing in mobile ad hoc networks. The goal is to improve the performance of the existing Ad-hoc On Demand Distance Vector (AODV) routing protocol. The design allows the physical layer sharing the received signal strength (RSS), and the medium access control (MAC) layer sharing the remaining energy, as well as the remaining queue length information with the network layer. Based on this information, the network layer computes a weight value that forms the routing metric used for route selection in the enhanced protocol. Finally, we implemented Turbo-AODV (TAODV) which is a modified version of the well-known AODV. Simulation results demonstrated superior Quality of Service (QoS) and better performance comparing to AODV in terms of packet delivery, normalized routing load, discarded packets on queues, and routing overhead.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117058051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A contextual personalized recommander system for mobile OLAP","authors":"Rezoug Nachida, N. Fahima","doi":"10.1109/ICITES.2012.6216674","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216674","url":null,"abstract":"The main drawbacks and handled devices (small storage space, small size of the display screen, discontinuance of the connection to the WLAN etc) are often incompatible with the need of querying and browsing information extracted from enormous amounts of data which are accessible through the network. A key characteristic of emerging OLAP database systems will be to use them with mobile device. To overcome this we investigate in this paper to propose a contextual recommender system (CARS) for mobile OLAP based on multi-agent architecture called (MASCARS). This system extracts first the user profile from the log data file of OLAP server. For this we use a variant of prediction and explanation algorithms. These profiles then form a knowledge base. This knowledge base will be used to generate automatically a rule base (ACE), for assigning weights to the attributes of data cubes by type of query and user preferences. The best sequence of requests will be deduced for using in CARS.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117123926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of real-time object-oriented data models for real-time databases","authors":"Zied Ellouze, Nada Louati, R. Bouaziz","doi":"10.1109/ICITES.2012.6216608","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216608","url":null,"abstract":"The design of real-time databases needs to incorporate methods specifically developed to represent the timing constraints of the system under consideration. Real-time databases have timing constraints on data and on transactions upon the data. During the last few years, several research approaches have been directed towards using the relational model as a data model for real-time databases. However, neither approach adds a temporal dimension to the data model. As realtime applications complexity grows, the real-time database community migrated towards object-oriented technology, both because one can use its rich data semantics in timing transactions processing and because complex real-time applications may benefit from its capabilities for modeling, storing and manipulating complex objects. In this paper we explore the realtime object-oriented data models for real-time databases, performing an overview of the existing models and presenting a set of features suitable to evaluate the quality of each model.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116575881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A mobile dictionary for pilgrims","authors":"A. Zeki, H. Alsafi, R. Nassr, T. Mantoro","doi":"10.1109/ICITES.2012.6216620","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216620","url":null,"abstract":"The wide use of computers in all lives pushes software designers to implement a huge number of different applications in every field and the applied programs become immeasurable. Mobile dictionary application have moved to the world of multimedia and merged other services rather than classic translation. Even though millions guidelines booklets printed in different languages and distributed among pilgrims even before they depart their countries, however many pilgrims have lack of knowledge about valid procedures of pilgrimage practices. In this paper, mobile dictionary application for Hajj using three different languages is proposed to assist the pilgrim perform their Hajj easily.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116593436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security solution for semantic SCADA optimized by ECC mixed coordinates","authors":"S. Nabil, B. Mohamed","doi":"10.1109/ICITES.2012.6216629","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216629","url":null,"abstract":"Web services have become a significant part of embedded systems as SCADA and internet applications embedded in RTU, because (WS) was XML/SOAP support, independent to platform and very simple to use, these advantages make (WS) vulnerable to many new and old security attacks. Now, it becomes easier to attack (WS) because their semantic data is publicly accessible in UDDI registry and (WS) use http protocol and the 80 TCP port as an open tunneling as a very big vulnerability. In this article we proposes new security solution for SCADA system, a new implementation of security protocols (SSL/TLS, IPSEC, HTTPS) and the WS-Security framework. In our solution implemented WS-Security framework optimized for SCADA in ten (10) steps, we use mixed coordinates ECC cryptography, we propose in this article our (Mixed-Coordinates-ECC) algorithm for optimizing the semantic security solution based on WS-Security framework and to adapt it to embedded complex systems as SCADA RTU using semantic distributed bloc (I/F/AV) and security ontology's.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126686623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hands tracking for augmented reality applications","authors":"M. Sakkari, M. Zaied, C. Ben Amar","doi":"10.1109/ICITES.2012.6216641","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216641","url":null,"abstract":"Augmented Reality (AR) combines real world and virtual objects which can be 3D images previously saved or real time computer generated. It enhances a user's view of the real environment by adding virtual objects in a realistic manner. Virtual objects display information that the user cannot directly detect with his senses. So, to look realistic, the virtual objects must be properly aligned with real-world objects. The work completed in this paper consists on the realization of an augmented reality system without markers that is based on the user's hand.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115907464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Targeted adequacy criteria for search-based test data generation","authors":"W. Zidoune, T. Benouhiba","doi":"10.1109/ICITES.2012.6216624","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216624","url":null,"abstract":"In test data generation approaches, structural coverage criteria are popular and considered cost effective mainly because they are relatively easy to implement. However, we cannot establish a direct link between achieving good structural coverage and test goals such as finding errors. On the other hand, specific criteria can explicitly target such goals but they may require a full formal specification of the program, which makes them expensive and hard to use. In this paper, we propose a new approach to describe targeted test criteria using few structural information of the system under test. The new criteria can easily describe specific situations such as errors and can be transformed into a fitness function. A search technique, in this case ACO (Ant Colony Optimization), can then be used to automatically generate adequate test data. A case study is presented to illustrate the applicably and the usefulness of the approach.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133645290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voting multiple classifiers decisions for spam detection","authors":"N. Barigou, F. Barigou, B. Atmani","doi":"10.1109/ICITES.2012.6216599","DOIUrl":"https://doi.org/10.1109/ICITES.2012.6216599","url":null,"abstract":"A considerable amount of research and technology development has been emerged to address the problem of spam detection. Based on a Boolean cellular approach and naïve Bayes technique built as individual classifiers, we evaluate a novel method that combines these two classifiers to determine whether we can more accurately detect Spam. Experimental results show that the proposed combination increases the classification performance as measured on LingSpam dataset.","PeriodicalId":137864,"journal":{"name":"2012 International Conference on Information Technology and e-Services","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}