{"title":"A regulation model of urban traffic congestion: Algorithm and implementation","authors":"Abdallah Lakhouili, E. Essoufi, H. Medromi","doi":"10.1109/WICT.2015.7489649","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489649","url":null,"abstract":"This study aims at calculating, the road urban traffic congestion using a suggested adapted CRONOS model. For the model simulation we propose adapted algorithm. We compare our adaptive system results to others given by urban traffic systems based on fixed pattern lights. The system is designed to make equilibrium between the length queue and the states of lights to search optimal strategy guarantying the fluidity of traffic and minimizing the total delay. The proposed real-time urban traffic control model was implemented on a simple intersection presenting two roads. We have chosen a simple intersection to validate our method which will be applied afterwards on a complicated intersection. We have used traffic evaluation criteria to test the accuracy of the model. The results show benefits of the suggested model on the total delay compared to that of the fixed pattern lights system. All traffic situations, whether they are peak or low are concerned by these results.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115115619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A quantification model of internal control impact on banking risks using FMECA","authors":"M. Ndaw, S. Ouya, G. Mendy","doi":"10.1109/WICT.2015.7489642","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489642","url":null,"abstract":"In this paper, we propose an optimal assessment of internal control impact on banking risks by making automatic the residual risk estimation step of FMECA which is based on an inductive reasoning to study causes, effects of failures and their criticality. For this we defined three equations based on maturity and type of controls then we have obtain a mathematical model which is applied on 333 risks and 491 controls. This model is a new approach which reduce time for obtaining residuals risks likelihood and severity and decrease estimation error rate of residual criticality by harmonizing the evaluation method. Test results are satisfactory for all banking processes and types of risk.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128101665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study of four metaheuristics applied for solving the flow-shop scheduling problem","authors":"A. Bouzidi, M. Riffi, M. Barkatou","doi":"10.1109/WICT.2015.7489661","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489661","url":null,"abstract":"The Flow shop-scheduling problem is NP-hard combinatorial optimization problem, thus, it requires using the computational intelligence to solve it. This paper describes an experimental comparison study of four metaheuristics which are the hybrid genetic algorithm, particle swarm optimization (by and without using local search), and the cat swarm optimization algorithm, in order to analyze their performance in term of solution. The four algorithms has been applied to some benchmark Flow shop problems. The results show that the Cat swarm optimization algorithm is more efficient than other methods to solve the flow shop-scheduling problem.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131550686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiagent based model for urban traffic congestion measuring","authors":"Abdallah Lakhouili, E. Essoufi, H. Medromi","doi":"10.1109/WICT.2015.7489647","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489647","url":null,"abstract":"In order to measure the urban traffic congestion, a multiagent system that consists of several locally operating agents each achieving a specific task is proposed. The traffic light patterns are calculated by considering different constraints so as to minimize an evaluation criterion. The proposed system aims at managing the gradual congestion of the traffic. As one section of the intersection becomes more congested, the duration of the green traffic lights of the other sections are reduced by the specific agent while the global state of the traffic in the intersection is observed by the other agent. Functionality of the proposed system is examined using initial random data that will be improved by the system.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133700636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward resilience management in critical information infrastructure","authors":"Yaou Hamida, Baina Amine, Bellafkih Mostafa","doi":"10.1109/WICT.2015.7489653","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489653","url":null,"abstract":"In the information age, critical infrastructure have become largely computerized and interconnected throughout the world, and their scope has grown more and more. Indeed, a failure in one critical infrastructure could lead to serious consequences on national security, economic well-being, public health, safety, or any combination thereof, producing then cascading effects because of their synergies. Consequently, the reliability, performance, continuous operation, safety, and protection of these so-called critical infrastructures is essential toward society and its economy. Nevertheless, the protection of critical infrastructure is a classical method that opens the question on the situation of these infrastructures in case of failure. In response to this, several studies necessitate a further strengthening in terms of resilience of these infrastructures. The items explored in this paper discuss different aspects related to resilience that gives the foundation of resilience strategy. We present in one hand the state of the art regarding resilience view in Critical Infrastructures and gives a systematic approach that can be applied on it, introducing then the applicability of resilience policy on these infrastructures.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115881850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interdependencies modeling for the purpose of critical infrastructures protection","authors":"Lamiae Chtioui, A. Baina, M. Bellafkih","doi":"10.1109/WICT.2015.7489651","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489651","url":null,"abstract":"Critical Infrastructures are the systems that ensure the ease of use of crucial goods and services which are vital for the well-being of a society and the prosperity of an economy. However, the protection of these infrastructures is a difficult challenge, and must include many factors such as risks, resilience, control access, and interdependency. This paper focuses on Critical Infrastructures interdependencies. Thus networks are becoming tightly interdependent, especially for communication and computing systems that are firmly coupled with other networks, because of their current growing use and necessity for all sectors. Our objective is to study interdependencies in order to reduce their impacts and establish an effective procedure to prepare for future risks. This paper presents an overview on some modeling approaches and models used to analyze critical infrastructures interdependencies. Then it explains the idea of our future work that consists of conceiving application software to notify all nodes of interdependent networks of a failure emerging in a critical node, basing on the Implicative Interdependency Model.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115280726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forming the multi-modal situation context in ambient intelligence systems on the basis of self-organizing cognitive architectures","authors":"P. Ivanov, Z. Nagoev, I. Pshenokova, D. Tokmakova","doi":"10.1109/WICT.2015.7489658","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489658","url":null,"abstract":"The article provides a theoretical basis of multi-agent recursive cognitive architectures as a distributed intelligent system of decision-making and control of an ambient intelligence system. It is dealt with the formalization of such cognitive architectures based on recursive deterministic abstract automata. The work introduces a method of automatic contexts formation in systems of ambient security based on the formal representation of semantics. Attempts are made to model and visualize semantic primitives and contexts. Successful experiments on the multi-agent representation of the subset of natural language limited by the domain of ambient assisted living systems for elderly people were conducted.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128632637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using EBIOS for risk management in critical information infrastructure","authors":"W. Abbass, A. Baina, M. Bellafkih","doi":"10.1109/WICT.2015.7489654","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489654","url":null,"abstract":"The business services of organizations depend widely on information systems. IT risks can harm these systems and thus affect the success of business goals. Therefore, the importance of security technologies in IT systems has received increased attention. These technologies require monetary investment. Risk management is used to justify this investment. Risk management is a strategic activity in the design of an organization: it is a systematic process of identifying, assessing and responding to events that may potentially affect business objectives. The objective of this paper is to address the challenges of protecting the business services of organizations. For this purpose, a concrete application will be detailed using EBIOS.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Salim Benqatla, Chikhaoui Dikra, B. Bounabat
{"title":"Actor network theory as a collaborative mode: The contribution of game theory in the interessement phase","authors":"Mohammed Salim Benqatla, Chikhaoui Dikra, B. Bounabat","doi":"10.1109/WICT.2015.7489646","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489646","url":null,"abstract":"Global Governance of projects requires cooperation between several actors. In general, such cooperation is ensured by building network collaboration between entities who want to collaborate. In spite of the existence of a number of works interested in collaboration network, only few of them were focused on how to construct a network. In this paper, we address this topic through Actor Network Theory. In particular way, we analyze interessement phase of ANT from a cooperative game point of view. Indeed, it's about negotiations between actors involved in business project. Our objective is to propose an approach of network establishment, by inciting actors through cost savings. For that, we use Shapley Value to answer the question: Which coalitions are likely to form in order to ensure best cost-saving objectives in ANT mode of collaboration? We propose also a graphical tool for visualizing networks and simulating their evolution.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fairness and differentiation of services in wireless mesh network","authors":"S. Jounaidi, B. Nassereddine, Y. Saadi, A. Haqiq","doi":"10.1109/WICT.2015.7489645","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489645","url":null,"abstract":"The complex data transfer applications, such as the telephony, video on demand and multimedia conferencing, have become a fundamental requirement. The aim of these applications is to accelerate the information transfer as audio and image packets flows format, comparing to other data formats. The architecture of services' differentiation was suggested as a simple solution to provide different quality services for the different types of packets. Hence, the quality service's (QoS) goal is to ensurea regular transfer rate of packets with a high priority, on one hand, and a preservation of packets that can produce an information distortion on the other hand. In this work, we put forward a protocol that guarantees, firstly, a differentiation of service for the different type of flows, and then, a fair sharing of the bandwidth. This protocol will work in collaboration with the token bucket mechanism.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}