Int. J. Recent Contributions Eng. Sci. IT最新文献

筛选
英文 中文
ADM-Based Hybrid Model Transformation for Obtaining UML Models from PHP Code 基于adm的混合模型转换,从PHP代码中获取UML模型
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2019-03-22 DOI: 10.3991/ijes.v7i1.10052
Abdelali Elmounadi, N. Berbiche, N. Sefiani, Nawfal El Moukhi
{"title":"ADM-Based Hybrid Model Transformation for Obtaining UML Models from PHP Code","authors":"Abdelali Elmounadi, N. Berbiche, N. Sefiani, Nawfal El Moukhi","doi":"10.3991/ijes.v7i1.10052","DOIUrl":"https://doi.org/10.3991/ijes.v7i1.10052","url":null,"abstract":"In this paper, we present a hybrid-based model transformation, according to the Architecture Driven Modernization (ADM) approach, intended for getting UML (Unified Modeling Language) models from the PHP (Hypertext Preprocessor) code. This latter has been done by offering a tool support for automated generation of UML platform independent models from PHP ASTM (Abstract Syntax Tree Metamodel) representations, which are specific platform models. The model transformation rules are expressed in ATL (Atlas Transformation Language), which is a widely used model transformation language based on the hybrid approach. This work aims to fill the gap between the web-based applications maintenance, especially PHP-based implementations, and the model transformation processes in the ADM context.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emergency Centers Set-up in the Existence of Ad Hoc Networks in Disaster Recovery Areas 灾备区存在自组织网络时应急中心的建立
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2019-03-22 DOI: 10.3991/ijes.v7i1.10319
S. Manaseer, Afnan Alawneh
{"title":"Emergency Centers Set-up in the Existence of Ad Hoc Networks in Disaster Recovery Areas","authors":"S. Manaseer, Afnan Alawneh","doi":"10.3991/ijes.v7i1.10319","DOIUrl":"https://doi.org/10.3991/ijes.v7i1.10319","url":null,"abstract":"— In disaster recovery situations, rescue teams build portable emergency rooms, fire stations and communication centers in the affected areas. Moreover, Mobile Ad Hoc Networks are the main form of communication that these teams use in such cases. This paper introduces a new setup model for distributing such rescue stations and centers. In this model, the communication needs; play a key role in the decision making to reach the optimal communication performance levels that leads to achieving the goal of using Ad Hoc Networks in these situations","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"29 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133424358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
X-ETL: A Data-Driven Approach for Designing Star Schemas X-ETL:设计星型模式的数据驱动方法
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2019-03-22 DOI: 10.3991/ijes.v7i1.10009
Nawfal El Moukhi, I. E. Azami, A. Mouloudi, Abdelali Elmounadi
{"title":"X-ETL: A Data-Driven Approach for Designing Star Schemas","authors":"Nawfal El Moukhi, I. E. Azami, A. Mouloudi, Abdelali Elmounadi","doi":"10.3991/ijes.v7i1.10009","DOIUrl":"https://doi.org/10.3991/ijes.v7i1.10009","url":null,"abstract":"The data warehouse design is currently recognized as the most important and complicated phase in any project of decision support system implementation. Its complexity is primarily due to the proliferation of data source types and the lack of a standardized and well-structured method, hence the increasing interest from researchers who have tried to develop new methods for the automation and standardization of this critical stage of the project. In this paper, the authors present the set of developed methods that follows the data-driven paradigm, and they propose a new data-driven method called X-ETL. This method aims to automating the data warehouse design by generating star models from relational data. This method is mainly based on a set of rules derived from the related works, the Model-Driven Architecture (MDA) and the XML language.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125666141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transportation Problem of LPP Involving Probability Density Function 涉及概率密度函数的LPP运输问题
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2019-03-22 DOI: 10.3991/ijes.v7i1.9909
Mohammad Rashid Hussain, Mohammed Qayyum, Mohammad Equebal Hussain
{"title":"Transportation Problem of LPP Involving Probability Density Function","authors":"Mohammad Rashid Hussain, Mohammed Qayyum, Mohammad Equebal Hussain","doi":"10.3991/ijes.v7i1.9909","DOIUrl":"https://doi.org/10.3991/ijes.v7i1.9909","url":null,"abstract":"In Linear Programming Problem (LPP), Transportation Problem (TP) is an application which is used to optimize through the probability density function of statistical approach. The main objective of this paper is to reduce complexity in Maximization problem of LPP, by fulfilling the relation between the objective function and constraints with the largest value.  Here, we used non-negative integer and complex number of linear combination of form xmeλx. It has been decided with reasonably great probability, decision region, fundamental probabilities and Laplace Transform (LT).  To obtain proposed results we applied probability density function over transportation problem. According to our proposed method we implemented mathematical model through the probability density function of statistical tools. Categorically, probability density function is an approach in our proposed method to obtain the feasible solution of transportation problem, which perform better than the existing methods.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129239436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Scientific Production of the Moroccan Researchers in Computer Science from 2007 to 2016: Analysis and Assessment 2007 - 2016年摩洛哥计算机科学研究人员科研成果分析与评价
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2018-12-19 DOI: 10.3991/ijes.v6i4.9810
Imane Rhassate, Naila Amrous, S. Bennani
{"title":"The Scientific Production of the Moroccan Researchers in Computer Science from 2007 to 2016: Analysis and Assessment","authors":"Imane Rhassate, Naila Amrous, S. Bennani","doi":"10.3991/ijes.v6i4.9810","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9810","url":null,"abstract":"<p class=\"0abstractCxSpFirst\"><span lang=\"EN-US\">The main purpose of this research is to examine the state of scientific research in the field of Computer Science in Morocco during the last decade and compare the scientific production in this field among the 3 North African countries.</span></p><p class=\"0abstractCxSpMiddle\"><span lang=\"EN-US\">Based on a bibliometric study - carried out by searching the Scopus database with a combined search strategy based on the keywords listed - and on an analysis of the data collected, this study evaluated the number of publications, co-authorship and scientific collaboration networks locally in Morocco and regionally with Algeria and Tunisia.</span></p><p class=\"0abstractCxSpMiddle\"><span lang=\"EN-US\">There is a lack of communication and collaboration between universities in neighboring countries or sometimes between the universities of the same country.</span></p><p class=\"0abstractCxSpLast\"><span lang=\"EN-US\">Finally, for conclude, our study presents recommendations for improving the visibility and ranking of the Moroccan university and the Moroccan researcher within its global scientific community.</span></p>","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127301828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Cloud Data using RSA Algorithm 使用RSA算法保护云数据
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2018-12-19 DOI: 10.3991/ijes.v6i4.9910
Md Equebal Hussain, M. Hussain
{"title":"Securing Cloud Data using RSA Algorithm","authors":"Md Equebal Hussain, M. Hussain","doi":"10.3991/ijes.v6i4.9910","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9910","url":null,"abstract":"security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Masked Face Detection using the Viola Jones Algorithm: A Progressive Approach for less Time Consumption 使用Viola Jones算法的蒙面检测:一种减少时间消耗的渐进方法
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2018-12-19 DOI: 10.3991/ijes.v6i4.9317
A. Nair, A. Potgantwar
{"title":"Masked Face Detection using the Viola Jones Algorithm: A Progressive Approach for less Time Consumption","authors":"A. Nair, A. Potgantwar","doi":"10.3991/ijes.v6i4.9317","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9317","url":null,"abstract":"The use of CCTV surveillance is today’s need inpublic and private sector for ensuring security against terrorismand robbery. Regular expressions are used to signify enormoussets of motion attributes captured in video. The video vigilanceis popular system without using human interference to captureimportant scenes. The motive of the work is to introduce automaticrevelation of masked objects in real time with a surveillancecamera. The main aim is to detect masked person automaticallyin less time period. In this paper,the researcher proposes a systemthat consists methods which uses four variant steps that are thesteps of calculating distance range of person from the camera,eye or vision line detection and face part detection such asmouth detection and face detection. Performance of proposedalgorithm is carried out on various real time inputs. Experimentalevaluation shows that proposed algorithm exceeds better in termsof time consumption. This unique approach for the problemhas created a method transparent and easier in complexity sothat the real time implementation can be made beneficial andworkable. Analysis of the algorithms fulfillment on the test videotrack gives appropriate judgments for additional improvementsin the masked face detection performance. Finally, based on theresearch, the axioms were useful for the work which can beusually accessible from available algorithms.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134192050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards Machine Learning Models as a Key Mean to Train and Optimize Multi-view Web Services Proxy Security Layer 将机器学习模型作为训练和优化多视图Web服务代理安全层的关键手段
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2018-12-19 DOI: 10.3991/ijes.v6i4.9883
A. Misbah, Ahmed Ettalbi
{"title":"Towards Machine Learning Models as a Key Mean to Train and Optimize Multi-view Web Services Proxy Security Layer","authors":"A. Misbah, Ahmed Ettalbi","doi":"10.3991/ijes.v6i4.9883","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9883","url":null,"abstract":"Muti-view Web services have brought many advantages regarding the early abstraction of end users needs and constraints. Thus, security has been positively impacted by this paradigm, particularly, within Web services applications area, and then Multi-view Web services.In our previous work, we introduce the concept of Multi-view Web services to Internet of Things architecture within a Cloud infrastructure by proposing a Proxy Security Layer which consists of Multi-view Web services allowing the identification and categorizing of all interacting IoT objects and applications so as to increase the level of security and improve the control of transactions.Besides, Artificial Intelligence and especially Machine Learning are growing fast and are making it possible to simulate human being intelligence in many domains; consequently, it is more and more possible to process automatically a large amount of data in order to make decision, bring new insights or even detect new threats / opportunities that we were not able to detect before by simple human means.In this work, we are bringing together the power of the Machine Learning models and The Multi-view Web services Proxy Security Layer so as to verify permanently the consistency of the access rules, detect the suspicious intrusions, update the policy and also optimize the Multi-view Web services for a better performance of the whole Internet of Things architecture.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131576852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formal Specification and Verification of Communication in Network-On-Chip: An Overview 片上网络通信的形式化规范与验证:综述
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2018-12-19 DOI: 10.3991/ijes.v6i4.9416
Fateh Boutekkouk
{"title":"Formal Specification and Verification of Communication in Network-On-Chip: An Overview","authors":"Fateh Boutekkouk","doi":"10.3991/ijes.v6i4.9416","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9416","url":null,"abstract":"Network-On-Chip (NOC) is an emerging paradigm to surmount traditional bus based Systems-On-Chip (SOC) limits  especially scalability and communication performances. A NOC includes many applications that can execute concurrently. This situation may show some undesirable behaviors such as deadlock, livelock, starvation, etc. On the other hand, the application of formal methods to on-chip communication infrastructures has recieved more attention. Formal analysis of NOC communication will be very advantageous since it allows proving some theorems or interesting qualitative/quantitative properties on the communication behavior where simulation/emulation techniques can fail easily. In this paper we try to giva an overview of the most famous formal methods applied to the verification of communication inside NOCs.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133556043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integration of User Profile in Search Process according to the Bayesian Approach 基于贝叶斯方法的搜索过程中用户轮廓的集成
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2018-12-19 DOI: 10.3991/ijes.v6i4.9716
Farida Achemoukh, R. Ahmed-Ouamer
{"title":"Integration of User Profile in Search Process according to the Bayesian Approach","authors":"Farida Achemoukh, R. Ahmed-Ouamer","doi":"10.3991/ijes.v6i4.9716","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9716","url":null,"abstract":"Most information retrieval system (IRS) rely on the so called system-centred approach, behaves as a black box, which produces the same answer to the same query, independently on the user’s specific information needs. Without considering the user, it is hard to know which sense refers to in a query. To satisfy user needs, personalization is an appropriate solution to improve the IRS usability. Modeling the user profile can be the first step towards personalization of information search. The user profile refers to his/her interests built across his/her interactions with the retrieval system. In this paper, we present a personalized information retrieval approach for building and exploiting the user profile in search process, based on Bayesian network. The theoretical framework provided by these networks allows better capturing the relationships between different information. Experiments carried out on TREC-1 ad hoc and TREC 2011 Track collections show that our approach achieves significant improvements over a personalized search approach described in the state of the art and also to a baseline search information process that do not consider the user profile","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125258774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信