A. Abdulhameed, A. Hammad, H. Mountassir, Bruno Tatibouet
{"title":"An approach to verify SysML functional requirements using Promela/SPIN","authors":"A. Abdulhameed, A. Hammad, H. Mountassir, Bruno Tatibouet","doi":"10.1109/ISPS.2015.7245003","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7245003","url":null,"abstract":"Ensuring the correction of heterogeneous and complex systems is an essential stage in the process of engineering systems. In this paper, we propose an approach to verify and validate complex systems specified by SysML language. We translate SysML specifications into Promela models in order to validate the designed systems by model checking SPIN. The requirements properties are translated to Linear Temporal Logic (LTL) formulae and verified by Spin. A case study is presented to illustrate the effectiveness of our approach.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125926701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karima Bessine, A. Nehar, H. Cherroun, A. Moussaoui
{"title":"XCLSC: Structure and content-based clustering of XML documents","authors":"Karima Bessine, A. Nehar, H. Cherroun, A. Moussaoui","doi":"10.1109/ISPS.2015.7244989","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244989","url":null,"abstract":"This paper proposes a novel Clustering approach for XML documents that combines both their content and structure information using tree structural-content summaries in order to reduce the size of the document. This reduction has twofold purpose. First, it reduces the size of the XML tree by eliminating redundant nodes. Second, it gathers similaire content. The clustering is performed according to a similarity measure that takes into account the structure and the content between levels. Several experiments are performed to explore the effectiveness of using tree structural summaries and constrained content in the clustering process. Empirical analysis reveals that the designed clustering approach using content within structure and tree structural summaries gives a better solution for XML clustering while improving runtime. It is very suitable when we deal with big data sets.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an open framework for inter-organizational workflow semantic annotation","authors":"Ali Abbassene, Z. Alimazighi, Moufida Aouachria","doi":"10.1109/ISPS.2015.7244968","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244968","url":null,"abstract":"In this paper, we propose a semantic and contextual workflow annotation framework for B2B integration. This annotation framework allows the detection of heterogeneities occurring between inter-organizational workflows and enables their correction through mediation services provided through a Cloud-based B2Bi (Business-to-Business integration) platform. This work describes also, the general architecture of the B2Bi platform, that offers mediation functionalities “as service” and takes charge of the B2B integration, from end to end, allowing collaborating partners to focus exclusively on business opportunities.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault detection in component-based models: Using BIP models","authors":"Smara Mounya, Aliouat Makhlouf, Aliouat Zibouda","doi":"10.1109/ISPS.2015.7245007","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7245007","url":null,"abstract":"In this paper, we will introduce our approach for fault detection in component-based models. We will defend that we can ensure safety property by Fail-Silent components. Fail-silent components are apt for fault detection using an Acceptance test. This later is a logical expression which can validate the component behavior correct or not. We will use BIP Framework for component based design, where the behavior design is based on transition system. In consequence, we can see that we can construct Fail-Silent models from basic BIP models. We will use Producer-FIFO-Consumer model to explain our approach.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"490 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123046022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parking access system based on face recognition","authors":"Imène Taleb, Madani Ould Mammar","doi":"10.1109/ISPS.2015.7244982","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244982","url":null,"abstract":"The human face plays an important role in our social interaction, conveying people's identity. Using the human face as a key to security, biometric face recognition technology has received significant attention. Face recognition technology, is very popular and it is used more widely because it does not require any kind of physical contact between the users and the device. Camera scans the user face and match it to a database for verification. Furthermore, it is easy to install and does not require any expensive hardware. Facial recognition technology is used widely in a variety of security systems such as physical access control or computer user accounts. In this paper, we present an access control vehicle system to the park based on camera installed at theparking entry. First, we use the nonadaptive method to detect the moving object, and we propose an algorithm to detect and recognize the face of the driver who wants to enter to the parking and verify if he is allowed. We use Viola-Jones method for face detection and we propose a new technique based on PCA, and LDA algorithm for face recognition.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122845897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bat algorithm for fingerprint image enhancement","authors":"Amira Bouaziz, A. Draa, S. Chikhi","doi":"10.1109/ISPS.2015.7244999","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244999","url":null,"abstract":"Fingerprint biometric systems performance is affected by the quality of fingerprint images. To overtake the low quality fingerprint images as well as overmaster the traditional image enhancers, the paper proposes a Bat algorithm for gray scale fingerprint image contrast enhancement. The purpose is for the Bat algorithm to map the gray level distributions for contrast enhancement ends. To assess the approach, the enhancement process is evaluated on low quality images from the FVC 2000 and compared to one of the traditional related-work contrast-based enhancers. The results show that the proposed Bat algorithm has proven to qualitatively and numerically improve the fingerprint image quality through contrast manipulation on the general level of noise eradication and quality metrics in addition to ridge structure clarification and minutiae detection specificities.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130361970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New algorithm of scheduling based on prioriry rules on machines to solve bi-criteria blocking job shop scheduling problem","authors":"Moahmed Lakehal, Amar Aissani, Karima Bouibede","doi":"10.1109/ISPS.2015.7244978","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244978","url":null,"abstract":"In this paper we study the bi-criteria blocking job shop scheduling problem. The objective is to simultaneously minimize two criteria: the Makespan and the maximum lateness. The blocking occurs when the intermediate buffer for storing completed operations between machines does not exist. We have proposed two Metaheuristics so as to find a set of non-dominated solutions. The first one is the tabu search which consists in the minimization of one criterion while the second criterion is bounded, and the second one is the tabu search based on the minimization of a linear combination of criteria. To assure the assignment of operations to their machines, we propose a new method which is based on application of priority rules on machines. This work is tested on benchmark instances from job shop literature and the results are presented and discussed.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133450568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faiza Medjek, Djamel Tandjaoui, Mohammed Riyadh Abdmeziem, Nabil Djedjig
{"title":"Analytical evaluation of the impacts of Sybil attacks against RPL under mobility","authors":"Faiza Medjek, Djamel Tandjaoui, Mohammed Riyadh Abdmeziem, Nabil Djedjig","doi":"10.1109/ISPS.2015.7244960","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244960","url":null,"abstract":"The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standardized routing protocol for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT), However, this protocol is subject to several attacks that have been analyzed on static case. Nevertheless, IoT will likely present dynamic and mobile applications. In this paper, we introduce potential security threats on RPL, in particular Sybil attack when the Sybil nodes are mobile. In addition, we present an analytical analysis and a discussion on how network performances can be affected. Our analysis shows, under Sybil attack while nodes are mobile, that the performances of RPL are highly affected compared to the static case. In fact, we notice a decrease in the rate of packet delivery, and an increase in control messages overhead. As a result, energy consumption at constrained nodes increases. Our proposed attack demonstrate that a Sybil mobile node can easily disrupt RPL and overload the network with fake messages making it unavailable.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"104 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131433694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology-based facilitation support tool for group decision making","authors":"Bakhta Nachet, Adla Abdelkader","doi":"10.1109/ISPS.2015.7244979","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244979","url":null,"abstract":"The need for Group Decision Making (GDM) techniques and support is greater than ever before. In the group decision making process, the alternatives amongst which a decision must be made can range from a few to a few thousand; the facilitator (or the decision makers) need(s) to narrow the possibilities down to a reasonable number, and categorize and classify alternatives. Even when this is not the case, facilitation support, such as ontology-based frameworks potentially offer these capabilities and can assist the decision-maker in presenting the alternatives in a form that facilitates the decision. In this research an ontology base approach is developed to facilitate organizing alternatives. The resulting alternatives organizing tool is based on two ontologies. These two ontologies are supplementary and each one ensures an aspect of the decision organizing. They have been built using the Web Ontology Language (OWL) which facilitates the sharing and integration of decision-making information between multiple decision makers.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient feature selection scheme based on genetic algorithm for ear biometrics authentication","authors":"Lamis Ghoualmi, A. Draa, S. Chikhi","doi":"10.1109/ISPS.2015.7244991","DOIUrl":"https://doi.org/10.1109/ISPS.2015.7244991","url":null,"abstract":"Human ear recognition is a new biometric technology which competes with other powerful biometrics modalities such as fingerprint, face and iris. Ear has small size, a uniform distribution color and does not need much collaboration from the user. Feature extraction is a crucial stage for biometric identification. However, the extracted features might contain redundant and irrelevant features which can lead to the problem of dimension and even to degradation of performances of biometric systems. In this paper, we present a new efficient feature selection scheme based on Genetic Algorithm for ear biometrics. The proposed approach has been tested on an ear biometrics database and compared with the full feature system, Principal Components Analysis (PCA) based approach and a combination of the proposed GA and PCA. Experimental results show that the proposed approach outperforms the full-feature based system in terms of accuracy, FRR and FAR.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"61 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133510808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}