Abdelali Elmounadi, N. Berbiche, N. Sefiani, Nawfal El Moukhi
{"title":"ADM-Based Hybrid Model Transformation for Obtaining UML Models from PHP Code","authors":"Abdelali Elmounadi, N. Berbiche, N. Sefiani, Nawfal El Moukhi","doi":"10.3991/ijes.v7i1.10052","DOIUrl":"https://doi.org/10.3991/ijes.v7i1.10052","url":null,"abstract":"In this paper, we present a hybrid-based model transformation, according to the Architecture Driven Modernization (ADM) approach, intended for getting UML (Unified Modeling Language) models from the PHP (Hypertext Preprocessor) code. This latter has been done by offering a tool support for automated generation of UML platform independent models from PHP ASTM (Abstract Syntax Tree Metamodel) representations, which are specific platform models. The model transformation rules are expressed in ATL (Atlas Transformation Language), which is a widely used model transformation language based on the hybrid approach. This work aims to fill the gap between the web-based applications maintenance, especially PHP-based implementations, and the model transformation processes in the ADM context.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emergency Centers Set-up in the Existence of Ad Hoc Networks in Disaster Recovery Areas","authors":"S. Manaseer, Afnan Alawneh","doi":"10.3991/ijes.v7i1.10319","DOIUrl":"https://doi.org/10.3991/ijes.v7i1.10319","url":null,"abstract":"— In disaster recovery situations, rescue teams build portable emergency rooms, fire stations and communication centers in the affected areas. Moreover, Mobile Ad Hoc Networks are the main form of communication that these teams use in such cases. This paper introduces a new setup model for distributing such rescue stations and centers. In this model, the communication needs; play a key role in the decision making to reach the optimal communication performance levels that leads to achieving the goal of using Ad Hoc Networks in these situations","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"29 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133424358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nawfal El Moukhi, I. E. Azami, A. Mouloudi, Abdelali Elmounadi
{"title":"X-ETL: A Data-Driven Approach for Designing Star Schemas","authors":"Nawfal El Moukhi, I. E. Azami, A. Mouloudi, Abdelali Elmounadi","doi":"10.3991/ijes.v7i1.10009","DOIUrl":"https://doi.org/10.3991/ijes.v7i1.10009","url":null,"abstract":"The data warehouse design is currently recognized as the most important and complicated phase in any project of decision support system implementation. Its complexity is primarily due to the proliferation of data source types and the lack of a standardized and well-structured method, hence the increasing interest from researchers who have tried to develop new methods for the automation and standardization of this critical stage of the project. In this paper, the authors present the set of developed methods that follows the data-driven paradigm, and they propose a new data-driven method called X-ETL. This method aims to automating the data warehouse design by generating star models from relational data. This method is mainly based on a set of rules derived from the related works, the Model-Driven Architecture (MDA) and the XML language.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125666141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Rashid Hussain, Mohammed Qayyum, Mohammad Equebal Hussain
{"title":"Transportation Problem of LPP Involving Probability Density Function","authors":"Mohammad Rashid Hussain, Mohammed Qayyum, Mohammad Equebal Hussain","doi":"10.3991/ijes.v7i1.9909","DOIUrl":"https://doi.org/10.3991/ijes.v7i1.9909","url":null,"abstract":"In Linear Programming Problem (LPP), Transportation Problem (TP) is an application which is used to optimize through the probability density function of statistical approach. The main objective of this paper is to reduce complexity in Maximization problem of LPP, by fulfilling the relation between the objective function and constraints with the largest value. Here, we used non-negative integer and complex number of linear combination of form xmeλx. It has been decided with reasonably great probability, decision region, fundamental probabilities and Laplace Transform (LT). To obtain proposed results we applied probability density function over transportation problem. According to our proposed method we implemented mathematical model through the probability density function of statistical tools. Categorically, probability density function is an approach in our proposed method to obtain the feasible solution of transportation problem, which perform better than the existing methods.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129239436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Scientific Production of the Moroccan Researchers in Computer Science from 2007 to 2016: Analysis and Assessment","authors":"Imane Rhassate, Naila Amrous, S. Bennani","doi":"10.3991/ijes.v6i4.9810","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9810","url":null,"abstract":"<p class=\"0abstractCxSpFirst\"><span lang=\"EN-US\">The main purpose of this research is to examine the state of scientific research in the field of Computer Science in Morocco during the last decade and compare the scientific production in this field among the 3 North African countries.</span></p><p class=\"0abstractCxSpMiddle\"><span lang=\"EN-US\">Based on a bibliometric study - carried out by searching the Scopus database with a combined search strategy based on the keywords listed - and on an analysis of the data collected, this study evaluated the number of publications, co-authorship and scientific collaboration networks locally in Morocco and regionally with Algeria and Tunisia.</span></p><p class=\"0abstractCxSpMiddle\"><span lang=\"EN-US\">There is a lack of communication and collaboration between universities in neighboring countries or sometimes between the universities of the same country.</span></p><p class=\"0abstractCxSpLast\"><span lang=\"EN-US\">Finally, for conclude, our study presents recommendations for improving the visibility and ranking of the Moroccan university and the Moroccan researcher within its global scientific community.</span></p>","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127301828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Cloud Data using RSA Algorithm","authors":"Md Equebal Hussain, M. Hussain","doi":"10.3991/ijes.v6i4.9910","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9910","url":null,"abstract":"security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Masked Face Detection using the Viola Jones Algorithm: A Progressive Approach for less Time Consumption","authors":"A. Nair, A. Potgantwar","doi":"10.3991/ijes.v6i4.9317","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9317","url":null,"abstract":"The use of CCTV surveillance is today’s need inpublic and private sector for ensuring security against terrorismand robbery. Regular expressions are used to signify enormoussets of motion attributes captured in video. The video vigilanceis popular system without using human interference to captureimportant scenes. The motive of the work is to introduce automaticrevelation of masked objects in real time with a surveillancecamera. The main aim is to detect masked person automaticallyin less time period. In this paper,the researcher proposes a systemthat consists methods which uses four variant steps that are thesteps of calculating distance range of person from the camera,eye or vision line detection and face part detection such asmouth detection and face detection. Performance of proposedalgorithm is carried out on various real time inputs. Experimentalevaluation shows that proposed algorithm exceeds better in termsof time consumption. This unique approach for the problemhas created a method transparent and easier in complexity sothat the real time implementation can be made beneficial andworkable. Analysis of the algorithms fulfillment on the test videotrack gives appropriate judgments for additional improvementsin the masked face detection performance. Finally, based on theresearch, the axioms were useful for the work which can beusually accessible from available algorithms.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134192050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Machine Learning Models as a Key Mean to Train and Optimize Multi-view Web Services Proxy Security Layer","authors":"A. Misbah, Ahmed Ettalbi","doi":"10.3991/ijes.v6i4.9883","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9883","url":null,"abstract":"Muti-view Web services have brought many advantages regarding the early abstraction of end users needs and constraints. Thus, security has been positively impacted by this paradigm, particularly, within Web services applications area, and then Multi-view Web services.In our previous work, we introduce the concept of Multi-view Web services to Internet of Things architecture within a Cloud infrastructure by proposing a Proxy Security Layer which consists of Multi-view Web services allowing the identification and categorizing of all interacting IoT objects and applications so as to increase the level of security and improve the control of transactions.Besides, Artificial Intelligence and especially Machine Learning are growing fast and are making it possible to simulate human being intelligence in many domains; consequently, it is more and more possible to process automatically a large amount of data in order to make decision, bring new insights or even detect new threats / opportunities that we were not able to detect before by simple human means.In this work, we are bringing together the power of the Machine Learning models and The Multi-view Web services Proxy Security Layer so as to verify permanently the consistency of the access rules, detect the suspicious intrusions, update the policy and also optimize the Multi-view Web services for a better performance of the whole Internet of Things architecture.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131576852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Specification and Verification of Communication in Network-On-Chip: An Overview","authors":"Fateh Boutekkouk","doi":"10.3991/ijes.v6i4.9416","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9416","url":null,"abstract":"Network-On-Chip (NOC) is an emerging paradigm to surmount traditional bus based Systems-On-Chip (SOC) limits especially scalability and communication performances. A NOC includes many applications that can execute concurrently. This situation may show some undesirable behaviors such as deadlock, livelock, starvation, etc. On the other hand, the application of formal methods to on-chip communication infrastructures has recieved more attention. Formal analysis of NOC communication will be very advantageous since it allows proving some theorems or interesting qualitative/quantitative properties on the communication behavior where simulation/emulation techniques can fail easily. In this paper we try to giva an overview of the most famous formal methods applied to the verification of communication inside NOCs.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133556043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of User Profile in Search Process according to the Bayesian Approach","authors":"Farida Achemoukh, R. Ahmed-Ouamer","doi":"10.3991/ijes.v6i4.9716","DOIUrl":"https://doi.org/10.3991/ijes.v6i4.9716","url":null,"abstract":"Most information retrieval system (IRS) rely on the so called system-centred approach, behaves as a black box, which produces the same answer to the same query, independently on the user’s specific information needs. Without considering the user, it is hard to know which sense refers to in a query. To satisfy user needs, personalization is an appropriate solution to improve the IRS usability. Modeling the user profile can be the first step towards personalization of information search. The user profile refers to his/her interests built across his/her interactions with the retrieval system. In this paper, we present a personalized information retrieval approach for building and exploiting the user profile in search process, based on Bayesian network. The theoretical framework provided by these networks allows better capturing the relationships between different information. Experiments carried out on TREC-1 ad hoc and TREC 2011 Track collections show that our approach achieves significant improvements over a personalized search approach described in the state of the art and also to a baseline search information process that do not consider the user profile","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125258774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}