M. Fahssi, S. Semghouli, M. Massaq, O. Hakam, A. Choukri
{"title":"Physicians Knowledge on Radiation Exposure during Pediatric Computed Tomography (CT): Case of the Regional Hospital Center of Agadir","authors":"M. Fahssi, S. Semghouli, M. Massaq, O. Hakam, A. Choukri","doi":"10.1145/3286606.3286781","DOIUrl":"https://doi.org/10.1145/3286606.3286781","url":null,"abstract":"Purpose: The main objective of this study is to explore the physician's knowledge on patient radiation exposure during pediatric Computed Tomography (CT). Materials and methods: A questionnaire from various questions was developed during this work. The questions have focusing on prescribers' practices and their knowledge of patient radiation protection. It was distributed and completed by 44 doctors of various medical specialties in the regional hospital center of Agadir. Results: Forty-four questionnaires survey were analyzed. All physicians disregard the three principles of radiation protection. Only 11% of physicians estimate correctly the dose delivered for an adult during a standard thoracic radiological examination. The delivered dose for a 1 year old child during a standard thoracic radiological examination was disregard by 98% of prescribers.16% of physicians estimate correctly the dose delivered for an adult during a thoracic CT scan. The dose delivered for a 5-year-old child during a thoracic CT scan was underrated by 84% of physicians. One for five prescribers assigns a dose of irradiation higher than 0.01 mSv during a thoracic Magnetic Resonance Imaging (MRI) exam for child. Finally, 34% of physicians choose CT scan (not indicated) as the first choice for abdomino-pelvic mass and epileptic syndromes. Conclusion: The radiation doses in CT scan are poorly mastered, and indications of CT exams are not correctly applied by our clinicians. The risk of developing a malignant neoplasm after a radiological exposure in pediatric CT scan has been confirmed by all our prescribers. There is a need for arising awareness about this topic and both initial and continuing training in radiation protection for patients could significantly improve our practitioners' knowledge of radiation protection for patients..","PeriodicalId":416459,"journal":{"name":"Proceedings of the 3rd International Conference on Smart City Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Security Requirements in Wireless Sensor Networks for Smart Home Healthcare Systems","authors":"A. Alami, Laila Benhlima, Slimane Bah","doi":"10.1145/3286606.3286832","DOIUrl":"https://doi.org/10.1145/3286606.3286832","url":null,"abstract":"Smart home healthcare are systems used to monitor patient in home by expecting and responding to their needs and granting their independence. This remote patient's monitoring is becoming more feasible as specialized sensors can be placed inside homes. In fact, wireless sensor network are used to collect medical data such as vital signs and personal data to transmit it to the caregiver. Therefore, the preserving security and privacy of this sensitive information is very crucial. This is particularly challenging because of the specific characteristics of WSN (e.g. limited resources: energy, storage, computation, communication) and the specific smart home environment. This paper tends to analyze the security related issues in smart home healthcare systems and proposes security requirements for these systems. We highlight the security threats for networks in healthcare, discuss issues related to the existing security systems and also present the proposed and derived requirements of security in this context.","PeriodicalId":416459,"journal":{"name":"Proceedings of the 3rd International Conference on Smart City Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risks and Security Requirements for Cloud Environments","authors":"A. Ziani, A. Medouri","doi":"10.1145/3286606.3286865","DOIUrl":"https://doi.org/10.1145/3286606.3286865","url":null,"abstract":"The cloud computing is a powerful technology in IT environment to provide cost effective, easy to manage, elastic, provide on-demand scalable services over the Internet and is wish list of many organizations that they are still concerned about the security risks implied by moving their infrastructure into cloud computing, and by integrating their resources within the cloud computing environment.. To take advantage of all the benefits of cloud computing, it is necessary to have security and privacy requirements for the implementation and use of the cloud. A company planning to implement a public cloud solution should be aware of the risks associated with cloud computing. This is due to the rapidly evolving threats to cloud security that are emerging at an increasing rate in recent years, also to multi-tenant and open nature of the public cloud. A risk analysis must be done initially with a cloud provider in order to identify the existing vulnerabilities and to implement the measures to counter those threats. This paper explores the key issues surrounding cloud security, and passes on valuable guidance about not only information security and broadly risk. Also, it will help providers to make informed security decisions about their diverse cloud set-ups and better understand how to reap all the benefits of cloud without compromising their organizations' security. As well, it discusses the security requirements, and various risks related to the public cloud.","PeriodicalId":416459,"journal":{"name":"Proceedings of the 3rd International Conference on Smart City Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127276399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biological data annotation using complementary and alternative Medicine with a collection tracking system (Hirbalink)","authors":"Ouissam El Andaloussi, M. Kbir, B. Hassani","doi":"10.1145/3286606.3286838","DOIUrl":"https://doi.org/10.1145/3286606.3286838","url":null,"abstract":"The web contains huge volume of information related to complementary and alternative medicine. However, healthcare recommendation with medicinal plants has become complicated because tremendous and precious information about medicinal resources are available now. Moreover, the existing scientific search engines are not quite efficient and require excessive manual processing. As a result, the search for accurate and reliable data about herbal plants has become a highly difficult and time-consuming task for scientists. Till date, a wide mapping of already available data concerning herbal plants hasn't been carried out. In this regard, the complementary and alternative medicine collection tracking system (Hirbalink) introduced in this work was created for the purpose of organizing and storing related data.","PeriodicalId":416459,"journal":{"name":"Proceedings of the 3rd International Conference on Smart City Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy preserving on social networks: new Policies and approaches","authors":"Fatna Elmendili, Anas Moustir, Y. Idrissi","doi":"10.1145/3286606.3286822","DOIUrl":"https://doi.org/10.1145/3286606.3286822","url":null,"abstract":"Thanks to online social networks services such as Facebook, Twitter, YouTube, etc...., users have the opportunity to communicate easily without constraints by providing them with free and open platforms. Because of their crucial role in spreading information between users, these platforms have become an integral part of everyday life. Privacy and security are major concerns for many social media users. When users share information (such as data, photos etc....) with their friends, they are not always safe; they can make their friends easy targets attacked by malicious users who try with multiple methods to access their personal data. Unfortunately, with the continued expansion of a user's social network, privacy settings alone are often insufficient to protect the user's profile. In this paper, we have proposed a new approach to limit the spread and dissemination of spam content and malicious profiles in social networks. In another way, prohibit the creation of malicious profiles by automated robots as well as the falsification of identity when publishing spam content in social networks. Given that when using online social networking services, users trust them to process their information; have seen that it is necessary not to neglect this part; but rather to make a set of changes that will be consistent with our proposal to strengthen the protection of personal data of users of these platforms.","PeriodicalId":416459,"journal":{"name":"Proceedings of the 3rd International Conference on Smart City Applications","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. E. Moutaouakil, M. Boukendil, Z. Zrikem, A. Abdelbaki
{"title":"Effect of Heating Elements Orientation on Heat Transfer in a Cubical Cavity","authors":"L. E. Moutaouakil, M. Boukendil, Z. Zrikem, A. Abdelbaki","doi":"10.1145/3286606.3286850","DOIUrl":"https://doi.org/10.1145/3286606.3286850","url":null,"abstract":"In this work, the effect of the orientation of three heating elements on natural convection in a three-dimensional cubical cavity has been investigated numerically using the finite volume method. Three different arrangements of the three identical and parallel elements fixed on one of the vertical sidewalls of the cubical cavity are considered. They are either in the vertical direction (case I), inclined at an angle 45° (case II) or horizontal (case III). The opposite vertical sidewall is kept at a cold temperature and the others walls are adiabatic. The number of Pr is fixed at 0.71 while the number of Ra varies from 103 to 106. The results found show that case II leads to a more important heat transfer.","PeriodicalId":416459,"journal":{"name":"Proceedings of the 3rd International Conference on Smart City Applications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heart Beat Monitoring and GPS Tracking based on Internet of Things","authors":"Amir Hammami","doi":"10.1145/3286606.3286827","DOIUrl":"https://doi.org/10.1145/3286606.3286827","url":null,"abstract":"This research proposed a web-based monitoring system that can help to view heart beat rate of a person while tracking his locations in real time. By using Heart Pulse Sensor and GPS Module connected to Arduino Microcontroller, the system collects data and transmits them to a remote server. We use GSM/GPRS Module as the network unity to send collected data over Internet. A supervisor through a web page, monitors heart beat rate and view locations on Google Map. The system can help to resolve health emergencies. In this way, it simultaneously improves the quality of care through constant attention.","PeriodicalId":416459,"journal":{"name":"Proceedings of the 3rd International Conference on Smart City Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129776834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel metric for performance evaluation of routing in MANETs","authors":"Younes Ben Chigra, A. Ghadi, M. Bouhorma","doi":"10.1145/3286606.3286855","DOIUrl":"https://doi.org/10.1145/3286606.3286855","url":null,"abstract":"Mobility of nodes in mobile ad hoc network constitutes a big challenge in the design of efficient routing protocol. Such issues reside in frequent and unpredictable links failure, which impact the overall network performance. Research community has proposed several scenarios to minimize the impact of mobility and deliver the quality of service required by MANET applications. However, efficiency of routing protocols must be assessed before their deployment. Actually, routing performances are evaluated using four main metrics: latency or end-to-end delay, Throughput, Packet delivery ratio and routing overhead. The purpose of this paper is the introduction of two new metrics that are devoted to evaluate how well routing protocol act in case of link failure triggered generally by high mobility. The first metric is path change factor (PCF), which characterize mobility adaptiveness and the second metric is route repair influence (RRI) that represent the effectiveness of route repair scheme. In addition we implemented the new metrics using an AWK script that uses as input NS2 trace file format.","PeriodicalId":416459,"journal":{"name":"Proceedings of the 3rd International Conference on Smart City Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128836237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alae Labrini, N. Rabbah, Hicham Belhaddaoui, M. Rifi
{"title":"Comparison Study the Management of Fuel Cell Power and Battery State-of-Charge for Smart Home","authors":"Alae Labrini, N. Rabbah, Hicham Belhaddaoui, M. Rifi","doi":"10.1145/3286606.3286821","DOIUrl":"https://doi.org/10.1145/3286606.3286821","url":null,"abstract":"Managing the distribution of electrical energy in a multi-source system (Smart Home) is essential for future smart cities, which reduces the dependency on the traditional electricity grid. In this paper, a hybrid power system is proposed consisting of a hydrogen fuel cell and a storage system. The latter will be used as support during the period of high energy demand to power a smart home. The presence of these two energy sources requires the global system to be governed by a control strategy. This strategy determines the energy distribution between the source and the load by optimally modeling system with satisfaction of constraints such as the state of charge (Soc), the storage system and the hydrogen consumption. Two energy management strategies have been developed: The Equivalent Consumption Minimization Strategy (ECMS) and the state machine method. The simulation was performed on MATLAB/Simulink to show performance in terms of hydrogen consumption and the state of charge (SOC) of the systems battery.","PeriodicalId":416459,"journal":{"name":"Proceedings of the 3rd International Conference on Smart City Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128848889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. E. Yamami, K. Mansouri, Mohammed Qbadou, E. Illoussamen, M. Laaziri, Khaoula Benmoussa
{"title":"An Ontological Representation of PMBOK Framework Knowledge Areas","authors":"A. E. Yamami, K. Mansouri, Mohammed Qbadou, E. Illoussamen, M. Laaziri, Khaoula Benmoussa","doi":"10.1145/3286606.3286825","DOIUrl":"https://doi.org/10.1145/3286606.3286825","url":null,"abstract":"Considering the problematic of IT Governance frameworks implementation, since it is difficult to apply a common framework to all organizations, this paper intended to address issues related to the adoption of IT project governance practices in organizations. It provides a common representation of its knowledge areas (Scope management, Schedule management, Cost management, Quality management and Risk Management) through ontological approach, relying on PMBOK framework best practice. The goal is to provide a machine-readable document for modeling IT projects governance domain. The results of this paper constitute a considerable contribution for practitioners, by participating in the development of IT governance approaches, to be used by non-specialists PMBOK in organizations, and by limiting as much as possible the bureaucracy of the information systems frameworks.","PeriodicalId":416459,"journal":{"name":"Proceedings of the 3rd International Conference on Smart City Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116594225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}