Home | Committees | Topics | Soumission | Program | Associated | Registration | Proceeding and Publications | Contact and location | ||||
Proceedings | ||||
ICSENT 2012 Proceedings * Preface Show/Hide Preface On behalf of the 1st International Conference on Engineering Software and Technologies
(ICSENT’12), we would like to welcome the delegates and their guests to the ICSENT’12.
The ICSENT’12 was held in Hammamet, Tunisia during 15-17 December 2012.
ICSENT’12 were initially created by a network of researchers and engineers both from
academia and industry in the areas of Design, Analysis and Tools for Engineering Software,
ICSENT’12 has been extended to the fields of Software Engineering, Computer Science and
Information Technology. The main target of ICSENT’12 is to bring together software/hardware engineering researchers, computer scientists, practitioners and people from industry to exchange theories, ideas, techniques and experiences related to all aspects of Engineering Software and technologies. The ICSENT’12 Technical Program Committee (TPC) consists of about 100 experts in the related fields of ICSENT’12 both from academia and industry. ICSENT’12 is partnered with IAES (Institute of Advanced Engineering and Science). ICSENT’12 received 75 full-paper submissions from 13 different countries around the world. These submissions were sent to the members of the TPC and additional reviewers for review. Every submission received at least two in- dependent reviews. We would like to thank the ICSENT’12 TPC members and the reviewers for their hard work and dedication. The ICSENT’12 Technical Program includes 2 keynotes lectures which are organized into lecture sessions. So, we would like to extend our heartfelt thanks to our co-sponsors, conference committee, program committee, reviewers, and the many other colleagues who have contributed in difference ways to the success of this event. Finally, we must thank the many authors who contributed the high-quality papers contained within these proceedings. We hope you will enjoy your stay here in Hammamet (Tunisia) and we hope you will find this conference rewarding and will continue your great support for the ICSENT’12 in the future. Mohamed Ridda LAOUAR ICSENT’12 Chair * Keynote Speaker - Hamid MCHEICK, Advanced Middleware and Architectures. Page: 4 Show/Hide Abstract The research area of software architecture and middleware has been developing rapidly. Software
architecture is typically defined as the structures of the system that consist mainly of software
components and interactions among them. Component is described as a unit of software that is selfcontained,
self-deployable, and well-defined functionality and can be assembled with other
components through its interface. The relationship of components is determined through interaction
that can be described as glue to link components together. Thus, interaction is an essential part of
architecture and components need to be loosely coupled. Particularly, interaction plays an important
role in distributed system. Middleware is dedicated software which is used to implement the interaction between components without involving knowledge of network protocol and hardware platform. Normally, middleware provides software architecture with mechanisms for delivering data and for supporting transparency. According to the different mechanisms, middleware can be classified as Remote Procedure Call (RPC), Object Request Brokers (including CORBA, RMI) and Message Oriented Middleware (MOM). In practice, they can be applied to different situations according to separate requirements and development environment. We will survey advanced middlewares and enterprise software architectures and discuss the challenges of these area. - Mostafa EZZIYYANI, Optimization Query Process of Mediators Interrogation by Combinatorial Storage of Sources. Page: 5 Show/Hide Abstract The challenge posed by the increase and the diversity of information sources on the web, and
secondly by the need of organizations to interoperate database systems have created not only the
need to use tools for integrating data among multiple users and heterogeneous information sources,
but again, these tools must overcome the limitations of current search engines by allowing not only
users to ask queries more sophisticated than simple keywords, but also being able to aggregate other
elements of answers from different sources to build, in the most optimized possible way by time and
space research, the analytical global response to the user query. This need is becoming more and
more imposed for medical information, especially with the existence of a multitude of web sources
specific to medicine areas and the trend towards computerization of patient medical records.
In this distributed environment where a query involves across several heterogeneous sources, communication cost must be taken into consideration. In his conference we describe a query optimization approach using dynamic programming technique for a given set of integrated heterogeneous sources. The objective of the optimization is to minimize the total processing time including load processing, request rewriting and communication costs, to facilitate communication inter-sites and to optimize the time of data transfer from different sites. Moreover, the ability to store the data more than center site gives more flexibility in terms of Security/Safety and overload the network. In contrast to optimizers which consider a restricted search space, the proposed optimizer searches the subsets of sources and independency relationship which may be deep laniary or hierarchical trees. Especially the execution of the queries can be starting traversal anywhere over any subset and not only from a specific source. * Papers from the General Session - Carbon Nanotube Transistors C-Cntfets and Logic Functions with Inverter. Lobna. L’MSADDAK & All. Pages: 7-18 Show/Hide Abstract Carbon nanotube field-effect transistors (CNTFET) modeling approach is being
extensively studied as possible successors to CMOS-like. This paper introduced the analysis of the
impact of diameter variations, especially logic switching threshold voltage and propagation time.
The changing in diameter of CNT which is a critical parameter that can cause large swings in static
and dynamic logic gates. SPICE simulations were performed on resistive-load and complementary
logic inverter. The transfer characteristics as well as transient behavior were extensively studied.
Finally, we have established relationships between the thresholds or propagation times and
nanotube diameters.
- E-Inclusion is a Key Factor in Youth Employment and Equalization. A. Noureldien. Pages: 19-25 Show/Hide Abstract While the well known term digital divide refers to the gap between those who can effectively use ICT tools,
such as the Internet, and those who cannot, the term e-Inclusion refers to the effective participation of
individuals and communities in all dimensions of the knowledge-based society and Knowledge-Base economy
through their access to ICT.
The effect of ICT in industry and in the creation of new markets for e-services is evolving up, thus the eskills is becoming a requisite for workplace and for today’s lifestyle. In this paper we show that e-Inclusion polices and strategies have to be in place to widen the youth opportunities in employment and participation in the new knowledge-based economies and societies. In addition, we propose a new e-Inclusion digital gaps model which can provide policy makers with a better understanding to the digital gaps phenomena, and assist them in designing e-Inclusion polices and strategies for bridging these digital gaps. - A Highly Parallel Hardware Implementation of the Deblocking Filter used in H.264/AVC codecs. Kamel MESSAOUDI & All. Pages: 26-38 Show/Hide Abstract In this paper, a new design for the deblocking filter used in H.264 CODECs is proposed. This
hardware component is designed to be used as part of a complete implementation of H.264 video
coding system. In the proposed implementation we adopt a new strategy for memory management.
Several on-chip memories are employed to support efficient parallel access in order to speed up the
entire filtering process. Previous implementations of the filter make use of one or two elementary
filters, which increases the complexity of control unit and the number of multiplexers required.
Therefore, a second contribution of this work is the proposition of a new architecture based on five
directional filters. These filters are obtained by subdividing each initial filter into two filters, each for
one direction. An additional directional filter is used specifically to filter the left neighborhood
blocks. This approach ensures parallel data processing and simplifies the control unit circuitry,
reducing as well the number of multiplexers. The proposed architecture is implemented in VHDL
and verified to work at 137.85MHz using Xilinx ML501 platform and at 170.95MHz using Xilinx
XUPV5 platform, both incorporating Virtex5 FPGA devices. The proposed architecture takes a
maximum of 71 clock cycles to process one macroblock, which is about 40% less than the best of
the competing proposals.
- Conception d'un Crypto Système pour les Transmissions de Données Chiffrées. Mohammed Zakarya BABA-AHMED & All. Pages: 39-54 Show/Hide Abstract Notre objectif principal était le cryptage d’information qui est devenu obligatoire pour empêcher
d’éventuelles attaques ; il peut être réalisé selon deux modèles : La cryptographie à clé secrète et
celle a clé publique. Dans cet article, on a opté pour un crypto système hybride combinant la
rapidité d’un algorithme symétrique et la sécurité de l’algorithme asymétrique. Celui-ci sera
programmé avec un logiciel VHDL est implémenté en hardware sur un circuit FPGA de la famille
Virtex-4 permettent ainsi de combiner les techniques cryptographiques symétriques et
asymétriques tout en exploitant au mieux les ressources offertes par les circuits FPGA et
d’atteindre de bonnes performances en termes de sécurité et répondre aux contraintes des
applications en temps réel. Enfin une description matérielle du VHDL de cette architecture ainsi
que la simulation par ModelSim pour vérifier les résultats obtenus.
- Efficient Feature based Images Registration for High Resolution Satellite Images. Akram BENNOUR, Bornia TIGHIOUART. Pages: 55-65 Show/Hide Abstract Two decades ago, the satellites gave us global continued images that often separated by several month or
years which influence the clarity of the image . The random variation of satellite attitude and the sensor defect,
creates numerous special deformations . So it necessary appeared to put automatic or semi-automatic analysis
methods for these images to make their comparable, interpretable, and useful. This work is devoted to the
process that geometrically aligns at best the common part of multitemporal satellite images, and that by
determine the transformation that provides the most accurate match between the images. This process is
known by satellite image registration and it is a crucial process in many remote sensing applications. The main
algorithm consists of three phases. The first one is the automated generation of control points, and the second
one is the robust estimation of mapping functions from control points. Finally, a global linear spatial
transformation is applied and the remotely sensed image is efficiently registered. This paper is focused
essentially on a comparative study between three novel automatic and efficient feature-based approaches for
high resolution satellite images registration, which are those based on Harris corner detector ; scale invariant
features named SIFT and speed up robust features called Surf . The features matching phase is carried out
using a bidirectional correlation approach leading to a robust set of control points in the multi temporal remote
sensing images. We used the random sample consensus (RANSAC) algorithm to handle outliers resulting from
the matching process. The methods has been implemented and tested using various high resolution remote
sensing imagery including landsat data and spot 5 images over test sites in Kuwait, Copenhagen and “lile de
Ré”. In experimental results we demonstrate the effectiveness of the proposed approaches and show that they
produces accurate results when applied to the registration of high resolution satellite images as well as
multitemporal ones, and we notice that SIFT based approach perform the best.
- Effect of the Polarization Mode Dispersion in a Transmission Link by Optical Fiber. Mohamed CHIKH-BLED, Amel MOKHDAR Pages: 66-82 Show/Hide Abstract The optical fiber presents certain manufacturing defects (heart of elliptic form) or
residual stresses which make anisotropic propagation. The phenomenon of PMD is due to
this optical anisotropy making a fast axe and a slow one. Contrary to the other types of
dispersion in fiber, the PMD varies very quickly in a dynamic way and results with a
limitat ion of bandwidth. This article is organized as follows: section 2 relates to the
Theory and the modeling of PMD in an optical fiber and then aims to explain briefly the
PMD phenomenon. In section 3, we represent the simulated connection. Finally in
section 4, we discuss these results.
- SVM Classifier for Face Recognition. Abdelhakim GHARBI, Mohamed Ridda LAOUAR Pages: 83-88 Show/Hide Abstract The feature extraction plays a very important for face recognition. In this paper, a model is proposed
for the automatic recognition of faces, by combining two approaches to intelligence Artificial. The
images used are represented as pixel intensity, with a front view of the face. Each face will be described
by a feature vector representing the three main components of the face are: eyes, mouth and
the nose. [Brunelly and Poggio(1993)]. [Chellappa et al (1995)]
Be used for the extraction of characteristic points of the treatments on the histogram of the projections
of the image, the distances between these points will construct the set of feature vectors used as
input for training and testing SVM multi_classe in end SVM establish its identification and final decision.
- Designing Embedded Web Systems for Healthcare. Sidi M. O. MOULAYE Abdellahi, Mohamed Tahar KIMOUR, Mbaye SENE. Pages: 89-98 Show/Hide Abstract During recent decades embedded systems have become more widely used in modern society of
today. These systems incorporate processors, which have become more powerful and more cost
efficient. Now, embedded systems are of interest in areas where not used before, allowing for the
development of ever more distributed and complex control systems. To handle the increasing
complexity of such systems, industry is constantly looking for new software development tools and
strategies. In this paper, we present an approach to design such systems while using an instance of a
healthcare control application. Such application would support both patients and their healthcare
providers in the process of treatment. It deals with the management of the conditions of patients at
home while making available information on such conditions at the remote clinical center. The
designed system is built around networked embedded devices and integrates the web technology.
- WUMA: Analyseur d’Usage du Web. Ayoub BOUBETRA & All. Pages: 99-104 Show/Hide Abstract L’objectif de ce travail est de concevoir et réaliser un outil logiciel nommé WUMA (Web Usage
Mining Analyser) qui permettra au « Webmaster », qui peut être considéré comme un QoS Manager,
d’avoir l’ensemble des connaissances sur le site web qu’il gère en vue de son amélioration. Cette
dernière peut concerner l’adaptation du site web aux comportements de ses utilisateurs et cibler la
bonne organisation de la structure du site en prenant les bonnes décisions concernant ce qu’il faut
mettre comme contenu dans le site et sur le choix de la bonne forme et le meilleur agencement des
pages web. Il s’agit en fait d’extraire de l’information à partir du serveur hébergeant le site Web et
prendre les décisions d’amélioration de la qualité de service (QoS). Cet intérêt nous a poussés à créer
et mettre en exploitation un site éducatif appartenant à l’université de la formation continue de Bordj
Bou Arreridj en Algérie (www.ufcbba.net) pour mener notre étude d’amélioration de la qualité de
service.
- Cloud as a Major Catalyst of Change in Contemporary Business Environment. Atif Farid Mohammad, Hamid Mcheick Pages: 105-115 Show/Hide Abstract The business environment around us is a on a continuous change on a very fast pace as Cloud
computing is taking over as new business environment. To cope up with the issues of process
changes, such as adaptation of new or different rules and regulations at the time of an expansion of a
business extends a need of its business processes to be reengineered. This article discusses in detail
about three fundamental concepts of Business Process Reengineering or BPR, Systems
Reengineering and Service-Oriented Architecture or also widely known as SOA. This study provides
background of these concepts as well as provides the artifacts researched and work by several
researchers and business analysts.
- A Negotiation Approach for Requirements Engineering Process in Cooperative Information Systems. Chaouki BOULEKDAM, Nacer eddine ZAROUR Pages: 116-131 Show/Hide Abstract The requirement engineering process aims to provide a requirements specification document that
defines the system to be developed. In this paper we focus our work on the negotiation phase for the
requirements engineering process in cooperative information systems (CIS). The negotiation
includes the discussion of requirements conflicts and the search of a compromise approved by all
stakeholders. In order to improve this phase we propose a new negotiation approach which
overcomes the following problems: requirements could be in conflicts, and the existing conflicts
cannot be explicitly well expressed i.e. conflicts are often unknown. In this paper we detail the
different phases of our approach with their models and finally we validate this approach by a case
study.
- Hybrid Framework for Automatic Integration of Ontology. ARKAM Meriem & All. Pages: 132-142 Show/Hide Abstract The heterogeneity of data sources and their diversity on the web are the main difficulties
encountered by users. The data integration solutions take some research on approaches to mediation,
data warehouses or semi-materialized approaches, but their main difficulty lies in the automatic
interpretation of the meaning and semantics of heterogeneous data autonomous. The work presented
in this paper focuses on the integration of data sources based on ontology with a hybrid or semimaterialized,
this approach offers a compromise between response time and the time to update the
data.
In this paper, we defined in first part, an algorithm for automatic integration of data sources based ontological (HybExtendOnto). This algorithm is used to create the data warehouse schema and the virtual (mediating) based on the following principle : All existing concept in a number greater than or equal to N number of data sources or being referenced by at least N sources will be included in the materialized, otherwise it will be integrated in the virtual. In second part, we have modeled our integration architecture based hybrid ontological, the results obtained so far are deemed satisfied. - Graph Based Approach for Ontology Matching. Chahira TOUATI & All. Pages: 143-157 Show/Hide Abstract Ontology matching is a key interoperability enabler for the Semantic Web since it takes the
ontologies as input and determines as output correspondences between the semantically related
entities of those ontologies. We present in this paper a graph based approach to tackle the ontology
matching problem. The objective is to address the combinatorial aspects related to this issue. More
precisely, our approacha consists in modeling the problem of extracting an alignment (matching)
which satisfies cardinality constraints, as minimizing some cost on feasible flow problem defined on
a bipartite graph. The found solution represents the best alignment which maximizes the global
similarity between the entities of the two ontologies.
- Ontology – Driven MVC: A Variant of MVC Architectural Style. AMRITA CHaturvedi, PRABHAKAR T. V. Pages: 158-174 Show/Hide Abstract Despite separation of concern provided by the MVC architectural style, there still remain some inter
– component dependencies which constitute the liabilities of the style. In this paper we highlight the
drawbacks of the MVC architectural style and propose an ontology driven solution to address these
problems. In the proposed solution the ontology is used as an active run time component. The
ontology is generic and can be used for any application based on MVC style. We demonstrate the
usage of this style through an example implementation based on both the traditional MVC style and
the ontology – driven MVC style. We evaluated the impact of ontology on the quality attributes of
the MVC style. We observe that the proposed solution apart from addressing the drawbacks of MVC
style also enhances maintainability and reusability of an information system based on the proposed
variant style.
- An Ontology-Based Approach to Modeling Multilingual Elearning Ressources. Achour HADHEMI, Maroua ZOUARI. Pages: 175-185 Show/Hide Abstract In this paper, we propose a semantic representation model of online multilingual educational
resources, that aims to improve their search, access and reuse. This model is based on a set of
ontologies, whose concepts are used for indexing learning resources that are available in a system of
e-Learning. The ontological concepts and relations that we propose, provide a means of guided
navigation in these resources. We also show how these ontologies can be helpful in performing
multilingual search of specific learning resources and in facilitating their share and reuse for building
new educational resources.
- Modeling Knowledge Management Systems for Componentbased Software Engineering. Mohammed Amine MOSTEFAI, Mohamed Ahmed-Nacer. Pages: 186-203 Show/Hide Abstract Component-Based Software Engineering (CBSE) is a knowledge-intensive discipline where all
activities imply the utilization and the transfer of knowledge between collaborators.
A better utilization, transfer and application of this knowledge are indispensable factors to face the
challenges of CBSE. In this perspective, Knowledge Management (KM) aims at fulfilling these
factors.
Knowledge Management Systems (KMS) are the technological infrastructure making KM concrete.
Similar to software engineering techniques, knowledge engineering techniques are used to model the
KMS.
In this paper, we present our approach to model KMS for CBSE organizations in an organizationindependent context. Our approach is based on CommonKADS, one of the most adopted knowledge modeling techniques or the design of KMS. - Description of Connectionist Systems by the MDA Approach. Sohaib HAMIOUD, Djamel MESLATI, Fadila ATIL. Pages: 204-218 Show/Hide Abstract MDA (Model Driven Architecture) aims to provide a conceptual, technological and methodological
framework, in which models are central to the activities of software engineering. The classic use of
MDA is to describe systems as models and their development as model transformations. Using
MDA to describe the functioning itself of a system is not common or easy to perform. In this paper,
we suggest the modeling of connectionist systems by models and their functioning by model
transformations. A model is used to model a system in a given state among the different states that
exist during its functioning. The interest is to generate from a particular model, a new model just by
applying a model transformation. The generated model describes the system in the next state.
- A MDE Parameterized Transformation to Improve Usability of Adaptive User Interfaces. Wided BOUCHELLIGUA, Takwa HAMOUDA, A. MAHFOUDHI, Mourad ABEDl. Pages: 229-252 Show/Hide Abstract The design of component-based software architectures is performed regardless of the existing
components in the warehouses, which does not promote the reuse. In this paper we present a support
tool to assist the architect in the design phase of component-based software architecture, the tool
implements an approach exploiting external descriptions of components, architectural elements and
quality attributes. A new characterization model based on facets is proposed for components, it
supports quality attributes of the ISO 9126 standard enhanced with metrics of measurement
proposed to assist the architect in the evaluation of the quality of the architecture being designed.
- Using Adaptive Agents for DOS Attacks Detection M.Cheikh, S.Hacini, Z.Boufaida Pages: 253-261 Show/Hide Abstract A denial-of-service attack (DoS attack) is an attempt to prevent a service from functioning
efficiently or at all, temporarily or indefinitely. This attack is typically launched against application
servers or web servers and can be done by overloading the network with useless information. The
intrusion detection systems are powerful tools for the detection of attempted DOS (Denial Of
Service) attacks. However, they suffer from a number of problems such as high rate of false
positives and negatives. In this paper, we present a new adaptive mechanism for DOS intrusion
detection based on the use of agents. This self-learning mechanism ensures detection of DOS attacks
with a reduction of false alarms.
- Disaster Emergency System Application case Study: Flood Disaster. Mostafa EZZIYYANI, Soumaya EL MAMOUNE & All. Pages: 262-280 Show/Hide Abstract Human security means protecting fundamental freedoms that are the essence of life. It also means
protecting the individual against serious threats or generalized. It’s necessary to build on the
strengths and aspirations of each individual, but it also means creating systems that give people
environmental elements essential to their survival, their lives and their dignity. In this context, we
present in this paper a new concept to create an adaptive system to save lives and help the individual
in all kinds of danger, the system called Disaster Emergency system “DES”.
- Fuzzy Tracking Control Based on H-infinity Performance and Virtual Desired Model for Nonlinear Systems. Djamel OUNNAS, Saleh CHENIKHER. Pages: 281-300 Show/Hide Abstract This paper deals with the synthesis of fuzzy tracking con-
troller via virtual reference model for a nonlinear systems with distur-
bance. First, a Takagi-Sugeno fuzzy model represents the nonlinear sys-
tem with distrubance. Second, we combine an integral control schemes,
and feedback fuzzy control whith H1 performance, to develop a robust
feedback tracking controller. Third, the concept of virtual reference is
used to to simplify the design of model reference. In light of this con-
cept, the design procedure is split into two steps: i) Determine the virtual
desired variables from the generalized kinematics; and ii) Determine the
control law. The fuzzy controller is designed to track a reference signal
and guaranteed a minimum disturbance attenuation level for the closed-
loop system. The gains of fuzzy controller are obtained by solving a
set Linear matrix inequalities (LMIs) techniques. Finally, we present an
applocation on Permanent Magnet synchronous Machine. Satisfactory
results validate the claims.
|
|