Social Responsibility by Open Innovation

7 downloads 185993 Views 2MB Size Report
computer modelling, on basic issues in social science that can be addressed effectively using such .... with all OnLine ―Creative Commons‖ works. He has .... Abstract: Bat algorithm (BA) is a new nature-inspired metaheuristic optimization.
21

2014 Second World Conference on Complex Systems (WCCS)

WCCS 2014 Keynote Speech (1)

Social Responsibility by Open Innovation Professor Matjaž Mulej University of Maribor IRDO Institute for Development of Social Responsibility, Slovenia

Abstract: Social responsibility (SR) provides a chance for innovative change by its basis: - Interdependence and holism as SR‘s essence in the ISO 26000 (ISO, 2010) on SR (supported by its 7 principles and 7 steps of making SR normal) and - European Union‘s (2011) support SR it by EU‘s definition that SR means one‘s responsibility for one‘s impact on society. Innovation makes a crucial impact on society. It results from idea-suggestioninvention-potential innovation-innovation-diffusion process (IIDP). In IIDP, specialists of several professions are necessary. Narrow specialization is necessary, but equally so is one more specialists‘ capacity: cooperation helps humans prevent oversights and resulting failures, because it enables more holistic thinking/behavior. The narrow specialization is so strong that many hardly see that (requisitely) holistic thinking/behavior – enabled by interdisciplinary creative cooperation, backed by (ethics of) interdependence – makes specialization of any profession and organization much more beneficial than any operation inside itself alone. Owners, managers and staff can benefit from SR, but need knowledge and values to implement SR. Government and other influential entities should support them with the model suggested here.

Biography: Matjaz Mulej was born in 1941 in Slovenia, he is a Ph.D. in economic sciences (specialised in systems theory) and in management science (in the field of innovation management), professor emeritus of systems and innovation theories. He works at the Faculty of Economics and Business in Maribor and the author of the dialectical system theory and the model of innovative business theory (for economy in transition). He has published more than 60 books and publications in more than 40 countries and worked as a visiting professor and researcher in 6 different countries for 15 semesters, including Cornell University, USA. He is a member of three international academies of sciences and arts (Salzburg, Paris, and Vienna) and the president of the International Academy of Systems and Cybernetic Sciences. Until April 2010, he was the president of IFSR (with 37 member associations and members from all over the world). He appears under number 8082 in the Researcher Register with more than 1600 publications being cited around 120 times and publishing more than 50 articles with co-authors in foreign first-class magazines. He was a chancellor 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

22

2014 Second World Conference on Complex Systems (WCCS)

and a vice-chancellor of the University of Maribor from 1997 to 2001. He worked as an innovation consultant almost 500 times in Slovenia as well as the USA, Russia, Angola, Indonesia, and Poland. In the International Encyclopaedia of Systems and Cybernetics, 2nd edition (Charles François, 2004. München: Saur), he and his dialectical system theory is named nine times and his name is frequently searched online as well. Lately, he has been encouraging the development of social responsibility as a possible solution to human crisis, as he regards it as an informal way to the sufficient and necessary integrity, in other words to innovate ethics with system behaviour. This is one of the reasons why he works as the head of the Expert Committee of the Institute for Social Responsibility Development in Maribor.

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

23

2014 Second World Conference on Complex Systems (WCCS)

WCCS 2014 Keynote Speech (2)

Software Estimation & Measurement: From Malpractices to Engineering Professor Alain ABRAN Department of software engineering and information technology Professor - Ecole de technologie superieure - University of Québec, Canada.

Abstract: In the Dark Ages the ‗Lords of the country‘ were expecting that their ‗alchemists‘ - the ‗gurus‘ of their era - would come up with mysterious formula that would transform ‗dust‘ into ‗pots of gold! A lot of current software estimation models, practices and metrics, including in Agile and COCOMO-like models, share characteristics observed in the Dark Ages. Furthermore, when compared to current practices from engineering and sciences, quite a few could be associated to professional malpractices in this 21st century! This talk will present criteria to assess the quality of estimation models and software measures, and will illustrate this with many instances where ‗feel good‘ is preferred to ‗engineering strengths‘.

Biography: Dr. Abran holds a Ph.D. in Electrical and Computer Engineering (1994) from École Polytechnique de Montréal (Canada) and master degrees in Management Sciences (1974) and Electrical Engineering (1975) from University of Ottawa (Canada). He is a professor at the École de Technologie Supérieure (ETS) – Université du Québec (Montréal, Canada). He has over 20 years of experience in teaching in a university environment as well as more than 20 years of industry experience in information systems development and software engineering. His research interests include software productivity and estimation models, software engineering foundations, software quality, software functional size measurement, software risk management and software maintenance management. He has published over 400 peerreviewed publications and he is the author of the book ‗Software Metrics and Software Metrology‘ and a co--author of the book ‗Software Maintenance Management‘ (Wiley Interscience Ed.. & IEEE-CS Press). Dr. Abran is co-editor of the Guide to the Software Engineering Body of Knowledge – SWEBOK (see ISO 19759 and www.swebok.org) and he is the chairman of the Common Software Measurement International Consortium (COSMIC) – www.cosmicon.com Author of: ‗Software Metrics and Software Metrology‘ ‗COSMIC Function Points: Theory and Advanced Practices‘. 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

24

2014 Second World Conference on Complex Systems (WCCS)

WCCS 2014 Keynote Speech (3)

Social Structures in Software Engineering Professor Hans Van Vliet Department of Information Management and Software Engineering (IMSE) Vrije Universiteit, Amsterdam, The Netherlands.

Abstract: Software is designed and written by groups of people, often distributed across sites and continents. These groups form social communities, with different ties, governance structures, membership structures, and so on. In this talk I explore ways to map the actual structure of a software development project onto well-known Organizational Social Structures in order to assess quality aspects of a software development organization, and software developed, in terms of this mapping.

Biography: Hans van Vliet is Professor in Software Engineering at the VU University Amsterdam, The Netherlands, since 1986. He got his PhD from the University of Amsterdam. His research interests include software architecture, knowledge management in software development, global software development, and empirical software engineering. Before joining the VU University, he worked as a researcher at the Centrum voor Wiskunde en Informatica (CWI, Amsterdam). He spent a year as a visiting researcher at the IBM Almaden Research Center in San Jose, California. He is the author of ―Software Engineering: Principles and Practice", published by Wiley (3rd Edition, 2008). He is a member of IFIP Working Group 2.10 on software architecture, and the Editor in Chief of the Journal of Systems and Software.

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

25

2014 Second World Conference on Complex Systems (WCCS)

WCCS 2014 Keynote Speech (4)

Computational Intelligence for Information Fusion and Decision Making Professor Ronald R. Yager Director of the Machine Intelligence Institute Iona College (New York), USA Abstract: Intelligent decision-making requires the use of all available information. However the information used for decision-making generally comes from multiple sources and is expressed in various modalities. We are interested in the problem of multi-source information fusion in the case when the information provided has some uncertainty. In order to address this problem we need to provide methods for the representation of different types of uncertain information. Here we shall discuss some computational intelligence based approaches for attaining this capability. One approach we consider is the use of a set measure for the representation of uncertain information. . We look at some non-standard representations of imprecise information particularly Pythagorean fuzzy sets. We shall also look at some aggregation approaches for the fusion of this information.

Biography: Ronald R. Yager is Director of the Machine Intelligence Institute and Professor of Information Systems at Iona College. He is editor and chief of the International Journal of Intelligent Systems. He has published over 500 papers and edited over 30 books in areas related to fuzzy sets, human behavioral modeling, decision-making under uncertainty and the fusion of information. He is among the world's most highly cited researchers with over 38000 citations in Google Scholar. He was the recipient of the IEEE Computational Intelligence Society Pioneer award in Fuzzy Systems. He received the special honorary medal of the 50-th Anniversary of the Polish Academy of Sciences. He received the Lifetime Outstanding Achievement Award from International the Fuzzy Systems Association. He recently received honorary doctorate degrees, honoris causa, from the State University of Information Technologies, Sofia Bulgaria and the Azerbaijan Technical University. Dr. Yager is a fellow of the IEEE, the New York Academy of Sciences and the Fuzzy Systems Association. He has served at the National Science Foundation as program director in the Information Sciences program. He was a NASA/Stanford visiting fellow and a research associate at the University of California, Berkeley. He has been a lecturer at NATO Advanced Study Institutes. He is a visiting distinguished scientist at King Saud University, Riyadh Saudi Arabia. He received his undergraduate degree from the City College of New York and his Ph. D. from the Polytechnic Institute New York University. 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

26

2014 Second World Conference on Complex Systems (WCCS)

WCCS 2014 Keynote Speech (5)

Predictions, forecasts and scenarios: what can models of complex socio-economic systems tell us? Professor Nigel GILBERT Sociologist and Director of the Centre for Research in Social Simulation University of Surrey, UK

Abstract: Almost all social systems are complex, in the sense that they are composed of many interacting units, and have emergent behaviour and sensitivity to initial conditions. This makes it both theoretically and practically problematic to expect models of social systems to be useful for making predictions about their future behaviour, yet such predications are what many policy-oriented models are expected to provide. In this talk, I shall suggest why social systems need to be treated as complex, consider the implications for making predictions, and review current approaches for deriving policy conclusions from models, focussing mainly on agentbased modelling. I shall propose that scenario analysis is the way to go and show what we can learn from scenarios generated from agent-based simulations.

Biography: Nigel Gilbert is a sociologist with a special interest in computational social science. He was one of the first social scientists to use agent-based models, in the early 1990s, and has since published widely on the methodology underlying computer modelling, on basic issues in social science that can be addressed effectively using such models, and on the value of simulation for applied problems such as understanding commercial innovation and managing environmental resources such as energy and water. Professor Gilbert has received funding from the UK Engineering and Physical Science Research Council, the UK Economic and Social Research Council, the European Commission‘s Framework programme, the Alvey Directorate, Government Departments, and from business and industry, totalling over £13 million. He is currently Principal Investigator of one of EPSRC‘s four ‗Complexity Science for the Real World‘ projects, on the Evolution and Resilience of Industrial Ecosystems, which brings together mathematicians, computer scientists, environmental scientists and social scientists to develop tools for enhancing the resilience of industrial developments. Professor Gilbert is also interested in issues of privacy and surveillance, and authored a report on the subject for the Royal Academy of Engineering, and other publications on the topic. He is a Fellow of the Royal Academy of Engineering and of the Academy of Social Sciences. Previously, he was a Pro Vice-Chancellor of the University of Surrey.

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

27

2014 Second World Conference on Complex Systems (WCCS)

WCCS 2014 Keynote Speech (6)

Survival Management by Living Systems A General System Theory of the Space-Time Modularity and Evolution of Living Systems Professor Pierre BRICAGE University of Pau & Pays de l'Adour, France

Abstract: To survive that is 'to eat and not to be eaten'. Any alive system, within its ecoexotope of survival, is integrated into a food chain: it eats and is eaten! To survive and live on, whatever its spatial and temporal organisation, it owns 7 invariant capacities (gauge invariance). The system is built by embedments and juxtapositions of preexisting ones in a new whole (endophysiotope). Whatever the level of organisation, the ecoexotope has always a limited capacity of hosting. To survive and live on, the system needs a capacity to be hosted but it has 'to be lucky' for 'to be at the right place at the right time'. Soon or late it is impossible not to be eaten. Man is not an exception. The modularity of alive systems allows both a partial allocation and a global recycling of matter and energy. The pleiotropy of the structures and functions, allowing 'to make of a stone several knocks', is the mechanism of exaptation. Within any ecoexotope, the agoantagonistic balance ends soon or late with the disappearance of predators, resulting in a reduction of biodiversity. The merging into 'Associations for the Reciprocal and Mutual Sharing of Advantages and DisAdvantages' allows the emergence of a new biodiversity (Fig. 1). These fruitful paradigm of ARMSADA is independent from the dimensional scaling: the local and global quantitative laws of space-time structuring and functioning are the same. Depending on how they become mutually integrated into their global whole, the local actors are more and less dependent from the new global level of organisation. Reversely (systemic constructal law), the global whole is reciprocally integrating the local parceners? The evolution of living systems is often seen as a ―cooperative evolution‖. Resulting from altruist behaviours it could be modelled and simulated using games like the prisoners' dilemma game. Is the same true for Man's artefacts like banking systems? In what manner is the prisoners' dilemma game justifying extrusion? What can we learn from Reinforcement Learning Dynamics in Social Dilemmas? In reality, humans display a systemic bias towards cooperative behaviour, much more so than predicted by models of "rational" self-interested action. Models based on different kinds of payoffs and driving forces, where people forecast how the game would be played if they formed coalitions to maximise their forecasts, are shown to make better predictions that resemble reality. How are the laws of spatial-temporal stru cturing and functioning of banking systems associated with the basic law of survival of living systems? How do 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

28

2014 Second World Conference on Complex Systems (WCCS)

local actors become mutually integrated into their global whole? And reversely, why and how is the global whole reciprocally integrating the local parceners? Is victory a strategic success? What are the roots for interdependence, conflicts and strategic order challenges? How is emerging a new power balance? Can banking systems survive as parasitic systems? Is a ―money chain― a way of violence escalade, like a ―food chain― is? Is not the ARMSADA paradigm the best way to improve the survival of our societies?

Biography : Born in 1947 in Paris, France, Europe, Pierre Bricage, graduated in biochemistry, embryology and fundamental and quantitative applied genetics from the University of Paris 6 - in ARWU, the first French University, ranking 37, but the top 15 in Natural Sciences and 5 in Mathematics-. Alumnus of the ENS -only in the top 100 in Natural Sciences- (Saint Cloud, Lyon), France, he passed the aggregation of 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

29

2014 Second World Conference on Complex Systems (WCCS)

biology. He learned American Civilization in CalTech (ranking 5), Pasadena California, with the British European Centre. He edited or published more than 250 pedagogic or scientific works in more than 20 countries ( http://web.univpau. fr/~bricage/). During 8 years at the University of Dakar (Sénégal, Africa), the biological rhythms (experimental study and modelling) of biochemical, ecological, physiological & genetical markers of plant enzymes & pigments were his teaching & research first interests in Biology and Ecology (sustainable management of natural resources and environmental education). During 40 years, he led a career as academic full-time researcher and teacher in biochemistry, enzymology, genetics, microbiology, animal and plant physiology, and systems analysis. As head of the Biology department at the University of Pau, France, he co-founded a regional centre for Agricultural Research. He has taught Systems Theories & Micro-Informatics (Data Bases modelling, programming, simulating) applied to Chemistry, Quality Control, Health and Social Sciences (Societal Engineering and Man's Societal Environmental Responsibility). Since 2000, he is pointing back to Fundamentals in Biology & Systemics Practical Applications (http://hal.archives-ouvertes.fr/hal-00130218/fr ) with all OnLine ―Creative Commons‖ works. He has been developing new Methods & Key Words in biosystemics (endophysiotope and ecoexotope, ―the gauge invariance of life―, phylotagmotaphology http://hal.archives-ouvertes.fr/hal-00423730/fr ), through the new predictive Paradigm of ARMSADA ―Associations for the Reciprocal and Mutual Sharing of Advantages and DisAdvantages‖ http://www.armsada.eu with predictive applications in curative vaccines (cancer, AIDS) technology. Now retired, he is Vice-President of the French Association for Systemics and Cybernetics AFSCET (http://www.afscet.asso.fr ), Deputy Secretary General of the European Union for Systemics UES-EUS ( http://ues-eus.eu/ ), Member of the Directorate of the World Organisation of Systems and Cybernetics WOSC (http://www.wosc.co/ ) and Secretary General of the International Academy for Systems and Cybernetic Sciences IASCYS ( http://www.iascys.org ).

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

30

2014 Second World Conference on Complex Systems (WCCS)

Breast Cancer Data Analysis Using Support Vector Machines and Particle Swarm Optimization Ayoub Arafi, Rkia Fajr and Abdelaziz Bouroumi “Sof Computing and Intelligent Systems” research team Information Processing Laboratory, Ben M‟sik Faculty of Sciences Hassan II Mohammedia-Casablanca University (UH2MC) Casablanca, Morocco {a.ayoub.arafi, fajr.rkia, a.bouroumi}@gmail.com

Abstract: We propose a machine learning method for breast cancer data analysis and classification, based on support vector machines (SVMs) and particle swarm optimization (PSO). This method uses SVMs as a model for supervised learning with the goal of minimizing generalization errors, and PSO as an optimization technique for automatic determination of the best values of two algorithmic parameters of SVMs. Its performance in solving classification and recognition problems is experimentally tested for real-world benchmark datasets using three different objective measures of performance. The experimental results are compared to those provided by four other methods.

Keywords: Breast cancer; support vector machines; particle swarm optimization; machine learning; performance measure.

ID 170

Session: Data mining

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

31

2014 Second World Conference on Complex Systems (WCCS)

Incremental Real Time Support Vector Machines for Health Monitoring System Fahmi Ben Rejab, Kaouther Nouira, and Abdelwahed Trabelsi BESTMOD, Institut Superieur de Gestion de Tunis Universite de Tunis, 41 Avenue de la Liberte, 2000 Le Bardo, Tunisie Email: [email protected], [email protected] [email protected]

Abstract: In this paper, we propose a new approach to deal with the high rate of false alarms generated by the health monitoring system (HMS). It consists of an intelligent alarm algorithm based on a new version of the support vector machines (SVM). Actually, medical staff face many issues when using the current HMS in intensive care unit (ICU). This latter generates a large number of alarms due to the exceed of the thresholds of the measured physiological parameters. Care-givers should set the thresholds each time there is a new monitored patient or when a new physiological parameter is added. However, in real situations, the default thresholds are often used for all monitored patients which causes a high level of false (and irrelevant) alarms. In order to overcome the ICU issues and improve the current system, we propose the incremental real-time SVM (IRTSVM) for health monitoring system. This new system can deal with data changing over time especially when the state of a patient is not stable. It also deals with incremental aspect by adding new monitoring parameters. Empirical study shows the efficiency of our new system when using real-world databases by providing important results. The new system guarantees the reduction of the rate of false alarms. Besides, it keeps a high level of sensitivity and detects relevant alarms. As a result, it provides doctors by all their needs which makes their decisions more accurate.

Keywords: ERP; organizational change; human characteristics; change effort; fuzzy logic.

ID 231

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

32

2014 Second World Conference on Complex Systems (WCCS)

Handwritten Digit Recognition based on DCT features and SVM Classifier Bouchra El qacimy1, Mounir Ait kerroum2 and Ahmed Hammouch3 1,3

Laboratory LRGE, ENSET of Rabat, Mohamed V Souissi University, Rabat, Morocco [email protected] 2 Laboratory LARIT, Ibn Tufail University, Faculty of Science, ENCG of Kenitra, Kenitra, Morocco

Abstract:

Handwritten digit recognition is an active topic in optical character recognition applications and pattern learning research. However, the extraction of informative features from handwritten digits for recognition task remains the most important step for achieving high accuracy. This work investigate the effectiveness of four feature extraction approaches based on Discrete Cosine Transform (DCT) to capture discriminative features of handwritten Digits and compare it to classical PCA. These approaches are: DCT upper left corner (ULC) coefficients, DCT zigzag coefficients, block based DCT ULC coefficients and block based DCT zigzag coefficients. The coefficients of each DCT variant are used as input data for Support Vector Machine Classifier to evaluate their performances. The objectif of this work is to identify the optimal feature extraction approach that speed up the learning algorithms while maximizing the classification accuracy. The results have been analysed and compared in terms of classification accuracy and reduction rate and the findings have demonstrated that the block based DCT zigzag feature extraction yields a superior performance than its counterparts.

Keywords: Handwritten Digit Recognition, Feature Extraction DCT, SVM Classifier.

ID 247

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

33

2014 Second World Conference on Complex Systems (WCCS)

Efficient Detection of P300 using Kernel PCA and support vector machine Salma TAYEB, Abdelhak MAHMOUDI, Fakhita REGRAGUI and Mohammed Majid HIMMI LIMIARF, FSR, Mohammed-V Agdal University, Rabat, Morocco [email protected] Abstract: P300 is one of the most studied and used event related potentials (ERP) in brain computer interfaces (BCI). The classical oddball paradigm is usually used to evoke the P300 from Electroencephalogram (EEG) signals. However, EEG raw data are noisy which make the P300 detection very difficult. In this paper, we aim to detect the P300 wave as accurate as possible using appropriate feature extraction method combined with powerful classifier. We compared four methods: Kernel principal component analysis (KPCA), Principal component analysis (PCA), Independent component analysis (ICA) and Linear discriminant analysis (LDA). Each method is used with a linear support vector machine (SVM) classifier and tested on EEG signals from three channels (FZ, CZ and PZ) of four healthy subjects. The results show that the P300 wave is efficiently detected in PZ channel using KPCA-SVM.

Keywords: — P300, Kernel Principal Component Analysis (KPCA), Support Vector Machine (SVM).

ID 282

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

34

2014 Second World Conference on Complex Systems (WCCS)

Performance evaluation of sparse matrix-vector product (SpMV) computation on GPU architecture Najlae Kasmi1, Mostapha Zbakh2, Sidi Ahmed Mahmoudi3 and Pierre Manneback4 1,2

Mohammed V-Souissi University, ENSIAS Rabat, Maroc E-mail: [email protected] 3,4 University of MONS, Faculty of engineering 20, Place du Parc, Mons, Belgium

Abstract: Sparse matrices are entailed in many linear algebra problems such as linear systems resolution, matrix eigen-values/vectors computation and partial differential equations, wherefore sparse matrix vector product (SpMV) constitutes a basic kernel for solving many scientific and engineering applications problems. With the appearance of Graphics Processing Units (GPUs) as platforms that provides important acceleration factors, the optimization of SpMV on GPUs and its implementation has been a subject of broad research for the last few years. In this work, we present a comparative evaluation of sparse matrix vector product (SpMV) on different platforms. We use Cusp library on CUDA GPU architecture and MKL Intel library as reference on CPUs. Experimental results have been conducted using a set of matrices from matrix market repository1, comparing performance between GPUbased Cusp2 and CPU-based MKL3 libraries. The results showed a global speedup, obtained with GPU, ranging from 1.1 x to 4.6 x compared to CPU implementations. An analysis and evaluation of these results is discussed.

Keywords: Sparse matrix; SpMV; GPU; Cusp; MKL, CUDA; Sparse Matrix Vector Product.

ID 308

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

35

2014 Second World Conference on Complex Systems (WCCS)

Discrete Bat-inspired Algorithm for Travelling Salesman Problem Yassine Saji, Mohammed Essaid Riffi and Belaïd Ahiod 1,2

Computer Science Department, LMATIC Faculty of Sciences Chouaïb Doukkali University El Jadida, Morocco [email protected] 3 Computer Science Department LRIT, URAC-29 Faculty of Sciences Mohammed VAgdal University Rabat, Morocco

Abstract: Bat algorithm (BA) is a new nature-inspired metaheuristic optimization algorithm based on the echolocation behavior of bats to find their prey and to avoid obstacles in the darkness. This new algorithm has showed a higher efficiency in solving continuous optimization problems. In this study, we have proposed a novel adaptation of BA for solving travelling salesman problem (TSP), which is known as an NP-hard combinatorial optimization problem. We have also redefined some operators used in basic BA. Implementation is carried out in MATLAB on examples of symmetric instance. The results are optimistic and clearly demonstrate the efficiency of the proposed algorithm in terms of convergence towards optimal solution.

Keywords:

Travelling Salesman Problem; Meta-heuristic; NP-hard Problem; Combinatorial Optimization; Bat Algorithm

ID: 5

Session: Data mining

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

36

2014 Second World Conference on Complex Systems (WCCS)

Clustering as a way to analyze complexity in computer network Karina Raya-Díaz, Carelia Gaxiola-Pacheco and Manuel Castañón-Puga Facultad de Ciencias Químicas e Ingeniería, Universidad Autónoma de Baja California, Calzada Universidad 14418, Tijuana, Baja California, México, 22390. {karina.raya, cgaxiola, puga}@uabc.edu.mx

Abstract: This paper proposes an approach to computer network as a complex system that has some level of self-organization where interactions between nodes result in a diverse set of emergent behaviors. The work analyzes artificial computational model of neural networks in order to help us to understand the dynamics of a complex system, and to show their remarkably flexible ability to capture a variety of behaviors of the individuals (neurons) that compose it. The main aim of this work is to make an analogy of the behavior in a neural network and a computer network centered in the organization behavior.

Keywords: Complex system; neuron; computer network; agents.

ID 159

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

37

2014 Second World Conference on Complex Systems (WCCS)

Case-Deletion Strategy for Maintaining the Case Based Reasoning System Abir Smiti and Zied Elouedi LARODEC, Université de Tunis, Institut Supérieur de Gestion de Tunis, Tunisia 41 Street of liberty, Bouchoucha, 2000 Bardo Email: [email protected]

Abstract: Case-Based Reasoning (CBR) is considered a fundamental modality in Computational Intelligence; It has the ability to accumulate previous cases records of particular past reasoning experiences and retrieve and adjust them in order to help new problem-solving in related situations. Undesirably, this incremental store process causes the uncontrolled case base growth. This mess distresses the competence and the performance of CBR systems after few runs, so the importance of maintenance research. This paper proposes a novel case deletion strategy based on a competence model using a clustering technique. Its target is to decrease both the storage requirements and search time and to spotlight on balancing case retrieval performance and competence of the case base. Series of tests are conducted, on which, our proposed case base maintenance approach will be tested and evaluated by competence and performance criteria.

Keywords: Case based reasoning; Case base maintenance; Clustering; Competence model

ID 178

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

38

2014 Second World Conference on Complex Systems (WCCS)

Rank Aggregation Using Active Learning in Metasearching Beya Boushih and Nahla Ben Amor LARODEC, Institut Supérieur de Gestion Tunis, Université de Tunis, Tunisia 41, Avenue de la Liberté, Cit´e Bouchoucha, 2000 Le Bardo, Tunisie [email protected] Abstract: Existing methods dealing with the problem of rank aggregation in the context of meta-search in information retrieval are considered as a passive learner machine and suffer in the presence of unreliable ranking lists. This paper proposes a novel approach which selects the most informative features and instances to be labeled from which the model will learn. To train an efficient ranking aggregation model from few labeled instances, we use Multiple Hyperplane Ranker algorithm in an active learning environment. Experimental results on the OHSUMED dataset show that our method outperforms the existing methods.

Keywords: Rank aggregation, Information retrieval, Meta-Search, Active learning, Feature selection, Semi-supervised learning

ID 196

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

39

2014 Second World Conference on Complex Systems (WCCS)

Meta-Clustering Approach using PossibilisticMembership: Application to Retail Datasets Asma Ammar1, Zied Elouedi2 and Pawan Lingras3 1,2

LARODEC, Institut Superieur de Gestion de Tunis Universite de Tunis 41 Avenue de la Liberte, 2000 Le Bardo, Tunisie [email protected], [email protected] 3 Department of Mathematics and Computing Science Saint Mary‟s University Halifax, Nova Scotia, B3H 3C3, Canada [email protected]

Abstract: This paper proposes a new uncertain metaclustering approach devoted for handling uncertainty in the belonging of objects to different clusters with respect to their membership values. These values are presented under possibilistic framework to deal with uncertainty when an object belongs to several clusters. In addition, we use the meta-clustering which is based on the k-modes method to double-cluster categorical data. The meta-clustering is used to make an initial clustering of instances of a set and then, use the results to make a second clustering of another set. This double-clustering provides more meaningful clusters and more information to the user. Our metaclustering approach is developed and evaluated with the help of real-world retail datasets. The datasets consist of customers and products data relative to transactions made in a small retail store chain. We study and represent the uncertainty that can exist when a customer and a product belong to several clusters by the membership degrees.

Keywords: Meta-clustering,

possibility theory, retail membership degrees, soft clustering, k-modes method.

ID 233

datasets,

possibilistic

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

40

2014 Second World Conference on Complex Systems (WCCS)

Access Plan Recommendation: A Clustering Based Approach Using Queries Jihad Zahir1, Abderrahim El Qadi2, Salma Mouline3 and Driss Aboutajdine4 1,3,4

LRIT-CNRST Mohammed V-Agdal University, Rabat, Morocco 2 EST-Moulay Ismaïl University, Rabat, Morocco

Abstract: This work relates to SQL query plan reuse based optimization in Database Management Systems (DBMS). We use a collaborative recommendation approach that helps the DBMS optimizer to detect similarity between old queries (already executed by the optimizer) and new upcoming queries (that are yet to execute). This kind of methods, allows the optimizer to use the old access plans to execute future queries which reduces the optimization cost. In our research, we benefit from clustering techniques to establish queries similarity. Hence, query plans are recommended to the optimizer using a log based recommendation approach.

Keywords: Data mining, Clustering; Access plan reuse; SQL Query similarity; collaborative recommendation

ID 248

Session: Data mining

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

41

2014 Second World Conference on Complex Systems (WCCS)

Prediction of Patients Survival Probabilities using Naive Bayesian Classifier & Artificial Neural Networks Imane Sefrioui1, Abdellah El Fallahi2 and Ali El Merzouqi3 1,3

Laboratory LIROSA, Faculty of Sciences, Tetouan University Abdelmalek Essaadi Tetouan, Morocco Email: [email protected] 2 Laboratory TT & LMIA, National School of Applied Sciences, Tetouan, University Abdelmalek Essaadi Tetouan, Morocco

Abstract: Survival probability of injured patients is usually computed using Trauma and Injury Severity Score (TRISS) methodology, a well known scoring system based on a logistic regression technique. In this paper, we propose three novel models to estimate the probability of survival of patients. The first model is based on naive bayesian classifier, the second is based on artificial neural networks using backpropagation technique and the third is based on neural networks with a scatter search algorithm. Tests were conducted using data sets of 300 patients admitted to the University of New Mexico Trauma Center. We showed that our models outperform the TRISS method. Artificial Neural Networks show the highest accuracy, while the naive Bayes Classifier has the highest specificity.

Keywords: Artificial neural network, optimisation, heuristics methods.

ID 322

Session: Data mining

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

42

2014 Second World Conference on Complex Systems (WCCS)

Advanced Nonlinear Control of Photovoltaic System Connected to the Grid Chaouki Aouadi, Abouloifa Abdelmajid, Abdellatif Hamdoun and Yasser Boussairi LTI Lab. Faculty of Science Ben M‟sik, University HASSAN II MohammediaCasablanca, Casablanca, Morocco [email protected]

Abstract: This paper involves the nonlinear control of single phase grid connected photovoltaic system with LCL filter. The control objective is threefold i) extracting the maximum power from the PV array by acting on the DC/DC converter (MPPT) ii) providing a current with sinusoidal waveform and in phase with the grid voltage by means of controlling DC/AC converter (power factor correction: PFC) iii) regulating the DC voltage to a desired value (VR). The whole system is described by 5th order nonlinear mathematical model and controlled by using the backstepping approach and tools from Lyapunov stability. The simulation results have been performed through Matlab/Simulink environment and show that the designed controller meets its objective.

Keywords: PV array; averaging model; backstepping technique; Lyapunov stability; MPPT; PFC.

ID 283

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

43

2014 Second World Conference on Complex Systems (WCCS)

Optical character recognition for multilingual documents: Amazigh-French Khadija EL GAJOUI1 and Fadoua ATAA ALLAH2 1

Laboratory of research in Informatics and Telecommunications Faculty of Sciences – Rabat, Mohamed-V University, Rabat, Morocco [email protected] 2 Computer Science Studies, Information System and Communication Centre the Royal Institute of the Amazigh Culture Rabat, Morocco

Abstract: Optical Character Recognition (OCR) is a process that allows converting scanned or photographed images of typewritten or printed text into editable text. The OCR studies have been explored towards many languages. However, there are not many reliable OCR systems available for the Amazigh language. Furthermore, the existed studies focus only on Tifinagh writing system, an alphabet that has been recently generalized with the creation of the Royal Institute of Amazigh Culture, in 2001. Hence, it is important to treat Amazigh writing transcribed in Latin or Arabic alphabet, which was the most used in Morocco. In this paper, we focus our study on Amazigh documents transcribed in Latin.

Keywords: Optical character recognition; Amazigh languag; image; multilingual text.

ID 95

Session: Software Engineering- Optical recognition 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

44

2014 Second World Conference on Complex Systems (WCCS)

Comparative systems of handwriting Arabic character recognition Zahra ASEBRIY1, Said RAGHAY2, Omar BENCHAREF3 and Younes CHIHAB4 1,2

Dept. Mathématique et Informatique. Laboratoire Mathématiques Appliquées et Informatique. Faculté des Sciences et Techniques, Université Cadi Ayyad Marrakeh, Maroc [email protected] 3 Laboratoire des Sciences Appliquées à l‟Environnement et Développement Durable. Ecole Supérieure de Technologie, Université Cadi Ayyad Essaouira, Maroc 4 Faculté Polydisciplinaire, Université Cadi Ayyad Safi, Maroc

Abstract: Handwriting Arabic character recognition is one of the most challenging and complex tasks of research in Optical Character Recognition (OCR) and little research has been achieved in this area in the past few decades. This is due to the cursive nature of Arabic writing and the lack of public Arabic handwriting databases. In this paper, we present a general model of OCR system and an overview on several recently researches on offline handwriting Arabic character recognition systems. To evaluate the performance of these systems we compare their results using same database Benchmarking IFN/ENIT.

Keywords:

OCR; Handwriting character recognition; Windows sliding; Hidden Markov Models; Database IFN/ENIT

ID 229

Session: Software Engineering- Optical recognition 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

45

2014 Second World Conference on Complex Systems (WCCS)

An Approach for Improving Business Process Models Using Risk Analysis Techniques Hanane Lhannaoui, Mohammed Issam Kabbaj and Zohra Bakkoury AMIPS Research Group, Ecole Mohammadia d‟Ingénieurs MOHAMMED V University, Agdal Rabat, Morocco [email protected], [email protected], [email protected]

Abstract:

In this paper, we propose an approach that aims to improve business process models using risk management techniques.This approach suggests a design change based on the results of risk analysis. Actually, we advocate, in this work, that risk controls can be addressed at an early stage of business process lifecycle: the design stage, so as to minimize failures during process execution. To this aim, we present a method for analysing business process models using an adaptation of a risk analysis technique HAZOP (HA-Zard OP-erability). Afterward, we represent the mechanisms used to evolve from the risk analysis phase into the design phase using patterns that implement recommendations related to a specific kind of risk controls.

Keywords: Business process management; risk management; risk analysis; business design; HAZOP.

ID 88

Session: Software Engineering- Process & Governance 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

46

2014 Second World Conference on Complex Systems (WCCS)

A study of the relationship between the business actor characteristics and the success of an ERP project Brahim SADKI, Hassan LATRACHE, Jamaa BENGOURRAM and Mustapha MABROUKI Industrial Engineering Laboratory, BP: 523 Sultan Moulay Slimane University, Faculty of Science and Technology Beni Mellal, Morocco [email protected]

Abstract: Organizations are exposed from time to time to significant changes. This requires careful thought. This issue is addressed here by means of the practices of human resource management. Indeed, jobs change and influence the performance of the company because of the lack of satisfaction among business actors. The present work focuses on the change when implementing an Entreprise Resource planning (ERP). Many approaches are used to study and understand the relationship between the organizational change and the human behaviours. Human characteristics such as skills, attitudes etc... influence the performance of business process in the ERP system. We will consider these characteristics as variables that contribute first to the explanation of the ERP projects success and second to estimate the change effort required when assigning a role to an operator. The ultimate goal is to have a feedback and decision support in organizational change management. A fuzzy logic model is discussed to map all major human characteristics to the change effort necessary to achieve the desired performance.

Keywords: ERP; organizational change; human characteristics; change effort; fuzzy logic.

ID 230

Session: Software Engineering- Process & Governance 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

47

2014 Second World Conference on Complex Systems (WCCS)

Urbanized Information Systems based on Business Services Maryam Radgui1, Rajaa Saidi2 and Salma Mouline3 1,3

LRIT associated unit to CNRST (URAC 29), Faculty of Sciences, Mohammed V-Agdal University BP 1014, Rabat, Morocco [email protected] 2 INSEA BP 6217, Rabat, Morocco

Abstract: The urbanization of the Information System (IS) aims to ensure the flexibility, reactivity, adaptability and agility of the system. Indeed, urbanization is an approach that provides a modular IS so that the change of each component is almost independently. This article addresses the urbanization of IS within a vision including business process and business service concepts. Indeed, our proposed IS is serviceoriented. To do this, we propose a model of business service that encapsulates an elementary business unit in the IS of companies. We aim to urbanize the company in order to obtain a directory of reusable business services.

Keywords: Business services, Urbanization, SOA, Information System, business process, BPMN.

ID 270

Session: Software Engineering- Process & Governance 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

48

2014 Second World Conference on Complex Systems (WCCS)

IT Governance Implementation: A Tool Design of Cobit 5 Roadmap Karim Youssfi, Jaouad Boutahar and Souhail Elghazi Ecole Hassania des Travaux Publics Casablanca, Morocco E-mail: [email protected], [email protected], [email protected]

Abstract: In recent years, the role of information technology in organizations has changed from a supportive function to being an essential prerequisite for strategic value generation. IT governance (ITG) is one of the main concepts that emerged due to this increasing dependency on IT solutions and became a key factor for enterprise success. There are several approaches available to deal with ITG. One wellaccepted ITG framework is COBIT, designed for a global approach. This paper describes a design of a tool for ITG implementation roadmap based on COBIT 5 framework. The model is being developed in the course of ongoing PhD research.

Keywords: IT governance, COBIT, Tool design, Roadmap, Implementation

ID 310

Session: Software Engineering- Process & Governance 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

49

2014 Second World Conference on Complex Systems (WCCS)

A Hybrid Particle Swarm Optimization for Service Identification from Business Process Merabet Mohamed1, Benslimane Sidi Mohamed2 and Mohamed El Amine Chergui3 1

Higher National School of Computer Sciences, Algiers, Algeria [email protected] 2,3 Computer Sciences Department, Djillali Liabes University, Sidi Bel Abbes, Algeria [email protected], [email protected]

Abstract: Service identification - as the first step of Service-Oriented Architecture holds the main emphasis on the modelling process and has a broad influence on the system development. Selecting appropriate service identification method is essential for prosperity of any service-oriented architecture project. Existing methods for service identification ignore the automation capability while providing human based prescriptive guidelines, which mostly are not applicable at enterprise scales. In this paper, we propose a top down approach to identify automatically services from business process. We use for clustering a hybrid particle swarm optimization algorithm and several design metrics for produce reusable services with proper granularity and acceptable level of cohesion and coupling .The experimental results show that our method HPSOSI (Hybrid Particle Swarm Algorithm for Service Identification) can achieve a high performance in terms of execution time and convergence speed.

Keywords: Service Identification, Hybrid Particle Swarm Optimization, Service Oriented Architecture, Business Process Modeling.

ID 16

Session: Software Engineering- Process & Governance

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

50

2014 Second World Conference on Complex Systems (WCCS)

A Formal Model of EIA-632 Standard: An approach for Emergent Properties Analysis Abd-El-Kader SAHRAOUI LAAS-CNRS, 7 avenue du Colonel Roche, F-31077 Toulouse, France Université de Toulouse; UTM, F-31077 Toulouse, France [email protected]

Abstract:

This paper gives a preliminary investigation on emergent properties analysis in a systems engineering framework. The contribution is twofold, the first is to give a formal model of requirements in EIA-632 standards and then propose an approach for emergent properties analy-sis. The formal model is built upon existing best practice in systems engineering by mapping Pre-Post conditions for each requirement mainly the technical requirements. The emergent property as safety issues, as assumption in the model as an identified property that can be generated either through the process or through non reliable compo-nent. The process can be either a transformation (machin-ing) or a composition (assembly).

Keywords: Emergent properties, EIA 632, Pre-Post condi-tions, Safety

ID 33

Session: Software Engineering- Quality and Non Functional Requirements

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

51

2014 Second World Conference on Complex Systems (WCCS)

Using ISO 9126 with QoS DiffServ Model for Evaluating Software Quality in Mobile Environments Karima Moumane and Ali Idri Software Project Management Research Team ENSIAS, Mohammed V Souissi University Rabat, Morocco [email protected], [email protected]

Abstract: Evaluation of software quality in mobile environments is a subject of active research and is a difficult task. This is caused by dynamic characteristics of mobile networks and the limited resources of mobile devices. This paper presents a study to help quality managers and evaluators using the ISO 9126 software quality standard, with the DiffServ QoS model to evaluate product quality in mobile environments. The effects of mobile technologies limitations are analysed for each QoS parameter and for each Diffserv class. As a result of this study, the reliability and the efficiency are the software product quality characteristics, the most correlated with Diffserv classes in terms of influence of the mobile environment limitations. It is caused by the fact that these characteristics are dependent on the software runtime environment and the Diffserv QoS model focuses on the quality at the network level, unlike the ISO 9126 standard that applies to the application level.

Keywords: ISO 9126, Software quality, Quality of Service, DiffServ, mobile environments.

ID 185

Session: Software Engineering- Quality and Non Functional Requirements 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

52

2014 Second World Conference on Complex Systems (WCCS)

Idea to predict the Critical Faults in Software-Systems with different Stochastic Reliability Methods Ossmane Krini, Jamal Krini and Josef Börcsök Department of Computer Architectureand System Programming University of Kassel, Germany Email: [email protected]

Abstract: This paper explains how you can predict the software reliability. A computer system consists of two major components: hardware and software. Software reliability is similar to hardware reliability in that both are stochastic processes and can be described by probability distributions. Software reliability is the probability that given software will be functioning without failure in a given environment during a specified period of time. Hence, software reliability is a key factor in software development process and software quality. Software reliability is different to hardware reliability in the sense that software does not wear out, burn out, or deteriorate; therefore its reliability does not decrease with time.

Keywords: Software reliability, software prediction, failure rate

ID 318

Session: Software Engineering- Quality and Non Functional Requirements 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

53

2014 Second World Conference on Complex Systems (WCCS)

A Co-evolution Model for Software Product Lines: an Approach Based on Evolutionary Trees Anissa Benlarabi, Bouchra El Asriy and Amal khtira IMS Team, SIME Laboratory. ENSIAS, Mohamed V Souissi University Rabat, Morocco [email protected]

Abstract: Software product line engineering allows for the development of common reference assets that can be reused in the development of a set of products of a particular market, the purpose of such large scale reuse is the improvement of time to market and the reduction of costs. This goal can only be achieved if the software product line assets are continuously evolved to cope with changes of user requirements. In this paper we present a co-evolution model for checking the integrity of the software product line during its evolution. The model is established using cladistics and trees reconciliation that are used in biology to analyze the co-evolution between organisms. This model shows the divergent co-evolution which represents a difference between the evolutionary trees of the software product line and a derived product. The model helps to find out changes of products that were not propagated to the reference assets and to anticipate the future development to be done on these reference assets to cope with products evolution. By its application we protect software product lines from the aging phenomenon.

Keywords: Software product line; Co-evolution; Cladistics.

ID 67

Session: Software Engineering- Requirements engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

54

2014 Second World Conference on Complex Systems (WCCS)

Towards a Variable Non-Functional Requirements Integration for Component-Based Product Line A Generic Approach Fatima Zahra HAMMANI, Maryem RHANOUI and Bouchra EL ASRI IMS Team, SIME Laboratory. ENSIAS, Mohammed V Souissi University Rabat, Morocco [email protected]

Abstract:

Software Product Line and Component-Based Software Engineering are two expanding paradigms for developing critical and complex systems. Therefore, these two paradigms seem have complementary strengths. So, significant benefits can be gained from their integration. Despite the fact that Non-Functional Requirements (such as security, performance and reliability) are critical to software systems, and they must be taken into account at early stage of software development life cycle and should be explicitly specified as well as functional requirements; these NFR are overlooked in Software Product line and Component-Based Software Development Processes. So, our main objective is to discuss some recent approaches in the field and to propose a new extension to Software Product Line processes that supports Component-Based Approaches, and integrates Non-Functional Requirement in domain requirements stage.

Keywords: CBSD; Complex systems; Components; Development process; Domain engineering; Feature Model; NFR; Reuse; SPL.

ID 70

Session: Software Engineering- Requirements engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

55

2014 Second World Conference on Complex Systems (WCCS)

Towards a Requirement-Based Approach to Support Early Decisions in Software Product Line Engineering Amal KHTIRA, Anissa BENLARABI and Bouchra EL ASRI IMS Team, SIME Laboratory, ENSIAS. Mohammed V Souissi University Rabat, Morocco [email protected]

Abstract: During the creation of a software product, the stakeholders have to take a lot of decisions. These decisions are related to the product scope, requirements priority, architecture assumptions, technological issues, etc. In the domain of Software Product Lines, many studies have dealt with decisions taken during the lifetime of the product, but a little attention has been given to the pre-project decisions. The aim of this paper is to propose a requirement-based framework that capitalizes on the specific products already derived from the product line, in order to support the benchmarking of the possible solutions that respond to a customer‘s needs, and to help the stakeholders of aproduct take decisions concerning the scope of the product and the requirements to implement.

Keywords: Software Product Line, Requirements Selection, Early Stage Decisions, Product Benchmarking.

ID 71

Session: Software Engineering- Requirements engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

56

2014 Second World Conference on Complex Systems (WCCS)

An automated object-based approach to transforming requirements to class diagrams Walid DAHHANE, Adil ZEAARAOUI, El Hassane ETTIFOURI and Toumi BOUCHENTOUF Team SIQL, ENSA Oujda, Mohamed First University Oujda postal 60000 Morocco. [email protected]

Abstract: Requirements Engineering (RE) is a set of activities concerned with identifying and communicating the purpose of a software system and its contexts of use as well. The requirements explain the purpose of a particular system as well as its suitability in fitting the desired purpose. Hence, the loss of information and precision, during the construction phase, leads to a poor quality zone of the system‘s target. Moreover, this problem becomes obvious in practice when using the classical approaches (e.g.scenario-based approach). Thus, OOADA-RE (Object-oriented Analysis and Design Approach for Requirements Engineering) has been introduced with the aim of breaking the gap between RE and other phases. It demonstrates a way to handling object classes based on the classical template of the user story, which is enhanced as follows: '―As a , I want to , so that ‖'; this is to allow an automated creation of classes with objects and actions mapped and gathered straight from the requirements. User stories are also used as a communication mean with customer. However, the approach has not offered a way yet to handling associations between the mapped class diagram's objects. This paper aims to tackle this issue and introduce the Constraint Story Card (CSC) upon which we suggest four templates in a natural language so as to manage the standard UML associations (Simple association, Inheritance, Aggregation and Composition) including association's roles and cardinality management. We conclude this paper with an illustrating example to clarify our main idea

Keywords: Constraint Story Card (CSC); OOADA-RE;Associations; Requirement Engineering; User Story;User Story Template; Model Transformation; Transforming requirements to class diagrams.

ID 188

Session: Software Engineering- Requirements engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

57

2014 Second World Conference on Complex Systems (WCCS)

Towards Flexible and Reusable SaaS for Multi-tenancy to design, implement and bind multi-functional variability for Rich-Variant services Houda Kriouile, Bouchra EL ASRI and M'barek EL Haloui IMS Team, SIME Laboratory ENSIAS, Mohammed V Souissi University Rabat, Morocco [email protected]

Abstract: Software-as-a-Service (SaaS) is a new delivery model that involves providing applications to the customer on demand over the Internet. SaaS promotes multi-tenancy as a tool to exploit economies of scale. However, the flexibility of an application to be adapted to individual tenant‘s needs is a major requirement. Thus, we initiate in this paper to an approach proposing a more flexible and reusable SaaS system for multi-tenancy. This approach consist on integrating a functional variability using Rich-Variant Components with a deployment variability enabling the customers to choose with which others tenants they want or don't want to share instances. The approach presented enables exploiting the economies of scale while avoiding the problem of customers' hesitation about sharing with other tenants.

Keywords: SaaS; Rich-Variant Component; Functional Variability; Deployment Variability; Multi-tenancy;

ID 288

Session: Software Engineering- Requirements engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

58

2014 Second World Conference on Complex Systems (WCCS)

iRE: A Semantic Network based Interactive Requirements Engineering Framework Kushal Ahmed, Lian Wen and Abdul Sattar Institute for Integrated and Intelligent Systems, Griffith University, 170 Kessels Rd, Nathan, QLD 4111, Australia Email: [email protected], fl.wen, [email protected]

Abstract:

Requirements engineering (RE) involves processing informal natural language descriptions of system requirements into an integrated and structured formal specification. The traditional RE process is ad-hoc, laborious, time-consuming, and error-prone manual process. For large-scale software intensive systems, the RE process becomes very difficult to manage. It is further complicated by ill-defined, incomplete, and redundantly specified requirements. To streamline the process, an end-to-end seamless RE framework is therefore needed. In this paper, we present an overview of an end-to-end semi-automated change-tolerant interactive requirements engineering (iRE) framework. It keeps and maintains the meta-level information of the interrelated requirements models into a semantic network model (SNM), and provides a method and processing system to derive an integrated and structured model. The iRE involves the requirements analysts in an interactive fashion during the modeling process.

Keywords: Requirements Engineering, Behavior Engineering, Behavior Trees, Semantic Network Model, Defects Detection, Change Management, Model Integration.

ID 303

Session: Software Engineering- Requirements engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

59

2014 Second World Conference on Complex Systems (WCCS)

Extraction of relational schema from deep web sources: a form driven approach Yasser SAISSI, Ahmed ZELLOU and Ali IDRI ENSIAS, Mohammed V-Souissi University, Morocco Rabat - Morocco [email protected]

Abstract: The deep web is the biggest unexplored part of the web and we need to access directly to its entire data web sources data without using any crawling or surfacing method. But, we choose to use a virtual web integration system. However, the deep web virtual integration methods existing today, focuses only on the integration of the query interfaces giving access to the deep web. These query interfaces are integrated to build a global query interface able to query all the deep web sources. The objective of our work is to propose another vision of a deep web virtual integration system that uses a mediated schema built with the relational schema describing each deep web source. This paper proposes our approach to extract a relational schema describing a deep web source. The key idea underlying our approach is to analyze two structured information: the HTML Form and HTML Table extracted from the deep web source to discover its data structure and to allow us to build a relational schema describing it. We use also a knowledge table to take profit of our learning experience on extracting relational schema from deep web source.

Keywords: Deep web source; Web source integration; structured data; HTML form.

ID 138

Session: Software Engineering- Schema-Indexing-DB 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

60

2014 Second World Conference on Complex Systems (WCCS)

A Deductive Database Framework for Interprocedural Program Analysis

Nassima Aleb and Samir Kechid USTHB-FEI, BP 32 Al ALLIA 16111 Bab Ezzouar Algiers Algeria [email protected], [email protected]

Abstract: Symbolic analysis shows promise as a foundation for bug-finding, specification inference, verification, and test generation. However, path explosion problem hampers its use for real size programs. This paper proposes to combine two ideas to deal with this problem. First, we represent the source code of programs as databases and we manipulate them by Datalog queries. Second, we address demanddriven symbolic analysis which is based on interprocedural backwards propagation of weakest preconditions.

Keywords:

Analysis; Datalog; Weakest Precondition; Software Testing; Path

Executions.

ID 165

Session: Software Engineering- Schema-Indexing-DB

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

61

2014 Second World Conference on Complex Systems (WCCS)

Toward a Formal Meta-transformation of a Parametrized Component Model

Meriem Belguidoum and Faiza Belala Lire Laboratory, University of Constantine 2, Constantine, Algeria [email protected], [email protected]

Abstract:

The software development process involves a number of complex activities. Therefore, the development methodology must provide abstract description to simplify the design process, enable software development, give a high degree of software reuse and offer the possibility to verify several levels of abstraction. This is possible with MDE (Model Driven Engineering) approach through the use of multiple models, meta-models and the transformations from one model to another one. Our contribution consists in making a meta-transformation process in order to promote reusability. At first time with a specification of component model architecture as a source model and the second time with the refinement of the formal and executable Maude language. Then, a meta-transformation process is given to translate our parameterized component model to Maude model using MOMENT2 which is a formal model transformation tool. It enables the specification and the verification of component based systems using QVT transformation within the Eclipse Modeling Framework.

Keywords: — software component; component deployment; MDA; metatransformation; formal specification and verification.

ID 237

Session: Software Engineering- Schema-Indexing-DB

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

62

2014 Second World Conference on Complex Systems (WCCS)

Graph File Format for ETL

Siham YOUSFI and Dalila CHIADMI Computer Science Department, EMI School Mohammed V University-Agdal Rabat, Morocco [email protected], [email protected]

Abstract: Graph file formats are formats that structure and organize a set of graph information in a file. It‘s a normalized way which ensures interoperability between heterogeneous software programs. While ETL (Extraction-Transformation-Loading) processes are almost represented as graphs, the use of graph technologies may be a high-level way to design ETL solutions without handling the complexity and heterogeneity of physical languages. Therefore, the aim of this document is to make a comparative study between four XML graph file formats XGMML, GraphXML, GraphML, and GXL by implementing in each format, a scenario of an ETL process converting a Gregorian date to Hijri date, in order to show that graph file formats could be used as abstraction languages for representing ETL processes.

Keywords: Graph file format, GraphML, XGMML, GraphXML, GXL, ETL.

ID 245

Session: Software Engineering- Schema-Indexing-DB

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

63

2014 Second World Conference on Complex Systems (WCCS)

Indexing Evidential Data Anouar Jammali1, Mohamed Anis Bach Tobji2, Arnaud Martinz3 and Boutheina Ben Yaghlane4 1

LARODEC, University of Tunis, ISG, Tunisia [email protected] 2 LARODEC, University of Manouba, ESEN, Tunisia [email protected] 3 IRISA, University of Rennes 1, IUT of Lannion, France [email protected] 4 LARODEC, University of Carthage, IHEC, Tunisia [email protected]

Abstract:

Querying imperfect data received increasing attention in the area of database management. The complexity and the volume of imperfect data require advanced techniques for efficient access, and satisfying user-queries in a reasonable response time. In this paper, we are particularly interested in evidential databases, i.e., databases where imperfection is represented through Dempster-Shafer theory. To answer userqueries in such databases, we propose a new index system based on a tree data structure (e-Tree) that is adapted to the complexity of the evidential data. The experiments done on our solution showed encouraging results.

Keywords: Dempster-Shafer theory, indexing data, evidential database.

ID 259

Session: Software Engineering- Schema-Indexing-DB 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

64

2014 Second World Conference on Complex Systems (WCCS)

Implementing SysPEM in the context of a Citizen Data Management System Engineering Maria Zrikem1, Abdeslam Jakjoud2, Ayadi Abderrahmane3 and Claude Baron4 1,2,3

Modeling and Information Technologies Laboratory (TIM), National School of Applied Sciences Cadi Ayyad University, Marrakech, Morocco [email protected], [email protected]

4

CNRS - LAAS, 7 avenue du colonel Roche INSA, Toulouse university, 135 av. de Rangueil F-31400 Toulouse Cedex 4, France [email protected]

Abstract: Consistency between the different views of a systems engineering process is of vital importance to the industry. It guarantees high-level coordination between the different actors and the absence of compromised data and inaccurate information. In a former work we proposed a two-part solution to this problem named SysPEM (System Process Engineering Metamodel). On one hand, SysPEM offers the needed mechanisms to express the different aspects of an engineering process. On the other hand the solution is equipped with an orchestration engine that allows automating execution control process. In this paper we propose the implementation of SysPEM to the case of setting up a digital citizens data management system acquired by territorial provinces and districts in the context of computerizing public administrations

Keywords: -Systems engineering, Coordination, Requirements, SysPEM, CDMS.

ID 342

Session: Software Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

65

2014 Second World Conference on Complex Systems (WCCS)

Parallelism: Interference between the data and indexes using major of indexing types

Mohamed CHAKRAOUI, Abderrafiaa EL KALAY and Naoual MOUHNI Laboratory of applied Mathematics and Computer Science, Faculty of Sciences and Techniques Gueliz Cadi Ayyad University, B.P 549, Av.Abdelkarim Elkhattabi, Guéliz Marrakech, Morocco. [email protected]

Abstract: As in engineering and research, database tuning becomes an inescapable part of big projects since the conception phase. The needs of companies including big data have increased to databases optimization. A lot of systems cause many blockages at least the five years after the production, because they didn‘t take into account the optimization and its rules since the conception phase, these reasons were of a paramount of importance to prepare this paper. Indexing is the most suitable way to optimize databases system, further one of the best ways of optimizing the index is the application of parallelization. In this paper we will talk about parallelization, and we will use different query with different types of indexes and we will compare the results gotten from each index, to top it all, the most suitable interference between the major types of index: b*tree index, bitmap index, composite index, local index and global index.

Keywords: optimization, index, interference between index, b*tree, bitmap, local index, global index, data partitioning, tuning, sub-query

ID 348

Session: Software Engineering- Schema-Indexing-DB

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

66

2014 Second World Conference on Complex Systems (WCCS)

Network Load of push and pull delivery for driver assistance systems Abderrahim Krini1 and Jamal Krini2 1

Chair for Communication Technology University of Kassel Kassel, Germany [email protected] 2 Department of Computer Architecture University of Kassel, Kassel, Germany [email protected]

Abstract: Car-to-Car communication is used to improve road traffic safety through active measures. Vehicle occupant safety can be improved by passive and active safety elements. In contrast to passive safety elements, which protect the driver in case of an accident, active elements warn the driver of imminent danger with the aim to prevent or minimize the severity of accidents. Sensor data regarding traffic and unexpected events are evaluated and exchanged between vehicles. A central unit should reach vehicles, which depends on the position, via cellular infrastructure and forward data e.g. warnings about event-controlled data in the form of push-messages. Thereby, existing push-services have to be re-analyzed. The resulting network load is compared with the standard pull-service.

Keywords: Car-to-Car, Push-Service, Pull-Service, Application-Server.

ID 314

Session: Wireless Network, Communications and security 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

67

2014 Second World Conference on Complex Systems (WCCS)

An efficient Transceiver for Vehicular Ad hoc Network Based on IR-UWB

Asmaa El Gueraa1, AnouarDarif2, Rachid Saadane3, and Driss Aboutajdine4 1,2,4

LRIT-GSCM, Associated Unit to CNRST(URAC 29), FSR, Mohammed V-Agdal UniversityRabat, Maroc 3 SIRC/LaGeS,EHTP, Km 7, Oasis, route El Jadida Casablanca, Maroc [email protected]

Abstract:

Recently, vehicular ad hoc network (VANET) has become an attractive area of research, and developed the application which can improve road safety, traffic efficiency and provides a comfort to both drivers and passengers. In VANET, the vehicles can communicate with each other to warn and inform drivers via wireless communication technology. The vehicles in VANET act as a transmitter and receiver to exchange data which can be attenuated in presence noise and obstacles. With these constraints, we are proposed to use Impulse Radio Ultra wideband (IR-UWB) technology as a new radio-communication for inter-vehicle communication (IVC) system. In order to obtain a reliable data, we are interested to evaluate the IR-UWB transceiver as an efficient solution for the communication between moving vehicles. In this paper we show the performance of the IRUWB transceiver suitable for intervehicle communication system with analyzing the effect of the multi-user interference (MUI).

Keywords: VANET; IR-UWB; IEEE 802.15.4a; Rake Receiver; Energy Detector.

ID 73

Session: Wireless Network, Communications and security

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

68

2014 Second World Conference on Complex Systems (WCCS)

Wireless Charging using Mobile Robot for Lifetime Prolongation in Sensor Networks Mourad Ouadou, Ouadoudi Zytoune and Driss Aboutajdine LRIT, Associated Unit to CNRST (URAC 29. Faculty of Science Mohammed V-Agdal University Rabat, Morocco [email protected]

Abstract: Wireless sensor networks (WSN) are energy constrained. It is often very difficult to charge directly sensor nodes due to environmental constraints. The ―wireless charging‖ technology has enabled nodes a possibility to recover additional energy. In this paper, we present first a topology construction for minimum spanning tree based sensor networks using Kursals algorithm. Then, we present our proposed algorithm that aims to extend network lifetime. This algorithm is based on giving additional energy to nodes depending on their positions in the spanning tree. We consider a mobile charger vehicle traveling the sensor network and charging each sensor node‘s battery. Finally, we implemented our proposed algorithm using Matlab to evaluate performance in large-scale networks and shows the simulation results that show an improvement of network‘s lifetime.

Keywords: Wireless Sensor Networks, Minimum Spanning TreeTopology, Wireless Charging, Lifetime Prolongation.

ID 99

Session: Wireless Network, Communications and security

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

69

2014 Second World Conference on Complex Systems (WCCS)

Mutual zero-knowledge authentication based on Virtual Passwords per Session (MAVPS) Younes ASIMI, Abdallah AMGHAR, Ahmed ASIMI and Yassine SADQI LabSiv : Laboratoire des Systèmes informatiques et Vision SCCAM : Equipe de la Sécurité, Cryptologie, Contrôle d‟Accès et Modélisation Departments of Mathematics, Physic and Computer Sciences Faculty of Sciences, Ibn Zohr University, Morocco [email protected]

Abstract: In this paper, we proposed a new mutual authentication system based on virtual words per session (MAVPS). The aim is to introduce an authentication system able to the zero knowledge users‘ identification ensuring untraceabilitie, portability, unpredictability, integrity and reusability of their authentication settings. In the second section, we studied the difficulties and users habits followed in the selection, storage or memorizing passwords, as well, the evolution and the limits of all categories of texture or object password authentication. Also, we located the importance of integration of salts per session in authentication mechanisms and their impacts on the robustness of passwords regenerated. As for the third part, we started by detailing the description of all mechanisms and component contributing to the robustness of our system of mutual authentication in occurrence cryptographically secure random regenerator disposable salts, an algorithm for dynamic rotation binary strings, a function of one-way hash and a random nonce. The security analysis of our proposal, which is the goal of the fourth section, shows their ability to resist against multiple types of attacks.

Keywords: Mutual authentications, Virtual password per session, cryptographically secure random regenerator, Dynamic rotation of binary strings, One-way hash function and Random nonce.

ID 101

Session: Wireless Network, Communications and security 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

70

2014 Second World Conference on Complex Systems (WCCS)

Comparative analysis performance of OSTBC/STBCMIMO under Rayleigh fading channel Bakir Hadj Ali1, Debbat Fatima2 and Bendimerad fethi Tarik3 1

Department of electronics, university of tlemcen, Algeria [email protected] 2 Dept of informatique, University of Mascara, Algeria [email protected] 3 Dept of electronics, university of tlemcen, Algeria [email protected]

Abstract: The demand for mobile communication systems with high data rates has been growing rapidly over the recent years. Multiple-Input Multiple-Output (MIMO) systems are the most efficient leading innovation of wireless systems for maximum capacity and improved quality and coverage. This paper presents the analysis of Space-Time Block Codes (STBC) used in MIMO systems to assure transmits diversity. The receive diversity is resolved with a ML decoding. This paper guides to select proper architecture of MIMO system in term of best BER, data rates and SNR of system. The results of performance evaluation for MIMO receivers revealed that OSTBC coding has better BER performance than STBC coding.

Keywords: MIMO systems, STBC, OSTBC. Rayleigh Multipath channel Model, BER (Bit Error Rate).

ID 131

Session: Wireless Network, Communications and security

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

71

2014 Second World Conference on Complex Systems (WCCS)

A Study with Simulation of Power Consumption and Latency for MAC Protocols in WSN based on IR-UWB Transceiver Anouar Darif1, Rachid Saadane2 and Driss Aboutajdine3 1,3

LRIT-GSCM Associated Unit to CNRST (URAC 29), FSR Mohammed V-Agdal University, BP 1014 Rabat Morocco anouar. [email protected] 2 SIR2C2S/LASI-EHTP, Hassania School of Public Labors Km 7 El Jadida Road, B.P 8108 Casa-Oasis, Casablanca Morocco [email protected]

Abstract: The introduction of the Impulse The introduction of the Impulse Radio Ultra Wide Band (IR-UWB) in the field of Wireless Sensor Network (WSN) was promising for researchers especially for its low power consumption feature. To implement such a solution, we need a suitable MAC protocol to exploit the specific features of this new technology. In this paper, we provide a comparative study of MAC protocols for IR-UWB based WSN, evaluating their main features in terms of various metrics, including the Packets arrival delays (latency) and power consumption. It is believed that the comparison presented in this paper would benefit in selecting an appropriate protocol. A simulation of a sink based architecture network with various nodes‘ number has been performed.

Keywords:

WSN, IR-UWB, MAC Protocols, Power Consumption, Latency, Omnet++, MiXiM.

ID 144

Session: Wireless Network, Communications and security 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

72

2014 Second World Conference on Complex Systems (WCCS)

Intrusion Detection System In wireless Sensor Network Based on Mobile Agent

Y.EL Mourabit, A.Toumanari, A.Bouirden, H zougagh and R Latif Equipe signaux, Systèmes et Informatique, Ibn Zohr University, ENSA Agadir, Morocco

Abstract: The wireless sensor network is a network of simple sensing devices, which are capable of sensing some changes of Incidents or parameters and communicating with other devices, however, the wireless sensor network was easy to be attacked because of its opening and mobility. Protecting networks against different types of intrusions or attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. This work describes the proposal for a new Intrusion Detection System architecture that uses multi-agent system and a classification algorithm to detect the intrusion. We use the Weka tool to implement algorithms of detection intrusion and to perform the rate classification.

Keywords:

Intrusion Detection System; Multi-Agent System; Wireless Sensor Network; Mobile Agent.

ID 193

Session: Wireless Network, Communications and security

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

73

2014 Second World Conference on Complex Systems (WCCS)

A new model of IDS architecture based on multiagent systems for MANET Sara CHADLI1, Mohammed SABER2, Mohamed EMHARRAF3 and Abdelhak ZIYYAT4 1,4

Laboratory Electronics and Systems FS, Mohammed First University Oujda, Morocco [email protected] 2 Laboratory Electronics and Telecoms ENSA, Mohammed First University Oujda, Morocco

Abstract: Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDS for MANETs have attracted much attention recently and thus, there are many publications that propose new IDS solutions or improvements to the existing. In this paper, we study the different architectures existing the IDS for MANETs. We briefly present for each architecture, after an analysis, the strengths and weaknesses, the methods/techniques that have been proposed to improve the performances and the provided security services. Then, we propose a new IDS architecture for MANET, this architecture is a combination of model hierarchical based on clusters and cooperation model based on a multi-agent system (SMA). In this architecture, agents use a knowledge base related to a global security ontology, it can be used to infer new detection rules.

Keywords:

Intrusion Detection System(IDS); IDS architectures; Mobile ad hoc networks(MANETs); Multi-Agent System (SMA);MANETs security; Security attacks; Security vulnerabilities;

ID 219

Session: Wireless Network, Communications and security

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

74

2014 Second World Conference on Complex Systems (WCCS)

Comparative analysis of contention Oriented Power Saving based medium access control Protocols for Wireless Sensor Networks R. OAUAMI, M. RIFI and M. OUZZIF University of Casablanca, CED Science Engineering, ENSEM, Lab. RITM, 20000 Casablanca Morocco [email protected]

Abstract: Wireless sensor networks are an emerging technology for low-cost that are becoming involved in almost every field of life, due to the advancement in wireless technologies and reductions in size. Idle listening is disastrous in WSNs based on the fact that nodes in this mode consume the same magnitude of power as in receiving. Overhearing means that nodes decode packets are destined to others. Collisions result in corrupted packets and the following MAC layer retransmissions consume extra energy. From the network perspective, channel contention is a serious problem in WSNs resulting in collisions, re-transmissions. In this paper, we focus on the MAC layer problem with contention protocols oriented saving energy and latency. We have compared the existing contention-based protocols: IEEE802.11/802.15.4, SMAC, T-MAC and OB-MAC protocols. We simulated and evaluated the performance of existing protocols using the NS-2 simulator. Evaluations show that the optimized OB-MAC achieved considerable improvement in energy and latency.

Keywords: Wireless Sensor Network, Medium Access Protocol,S-MAC, T-MAC, IEEE802.15.4.

ID 228

Session: Wireless Network, Communications and security

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

75

2014 Second World Conference on Complex Systems (WCCS)

Effect of QAM modulation of diversity coding for MIMO Communications system

Soukaina ETTARFAOUI1, Haitham J. Taha2 and Mohammed Majid HIMMI3 1

LIMIARF, Faculty of Sciences, Mohammed-V Agdal University Rabat, Morocco [email protected] 2 Department of Electrical Engineering LIMIARF, University of Technology Baghdad, Iraq [email protected] 3 Faculty of Sciences, Mohammed-V Agdal University Rabat, Morocco [email protected]

Abstract: The digital communication using multiple-input multiple-output (MIMO) has considered as one of the most significant technical in modern communications. MIMO has emerged as a hot topic in wireless communications during the last decade. This is due to possible dramatic increases in reliability and capacity as compared to single-antenna solutions. This paper presents a detailed study of diversity coding (Alamouti Code, and Golden code) for MIMO systems. Performance results show that comparison between these codes on the one hand the performance according to their Bit Error Rates (BER) and signal to noise ratio (SNR) by using 4-QAM and 16-QAM modulation schemes are considered over Rayleigh channel for two transmitters and two receivers.

Keywords: MIMO; Alamouti; Golden.

ID 278

Session: Wireless Network, Communications and security

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

76

2014 Second World Conference on Complex Systems (WCCS)

A stochastic model of maliciel process attack for the evaluation of network security Noureddine RAHMOUN, Sara CHADLI, Elhassane ETTIFOURI, Mohammed SABER and Toumi BOUCHENTOUF Laboratory Computer Systems and Software Quality National School of Applied Sciences, Mohammed First University Oujda, Morocco [email protected] Abstract: To trust a computer system that is supposed to be secure, it is necessary to predict the degree to which the system‘s security level can be achieved when operating in a specific environment under attacks. In this paper, the main focus of the study is on how to model the progression of an attack process over time, we propose a stochastic model based on chains Markov. The basic assumption of our model is that the time parameter plays the essential role in capturing the nature of an attack process. In practice, the attack process will terminate successfully, possibly after a number of unsuccessful attempts. What is important is, indeed, the estimation of how long it takes to be conducted. The proposed stochastic model is parameterized based on a suitable definition of time distributions describing attacker‘s actions and system‘s reactions over time. For this purpose, probability distribution functions are defined and assigned to transitions of the model for characterizing the temporal aspects of the attacker and system behavior. The proposed method shows a systematic development of the stochastic modeling techniques and concepts, used frequently in the area of dependability evaluation, for attack process modeling.

Keywords: Component; Markov chain; attacks process; Network Security; Maliciel; Evaluating; stochastic model

ID 286

Session: Wireless Network, Communications and security

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

77

2014 Second World Conference on Complex Systems (WCCS)

Routing based on Network Coding and Clustering in DTMN Tarik CHANYOUR1, Rachid SAADANE2 and Mostafa BELKASMI3 1,3

Mohammed V-Souisi University. SIME Labo, ENSIAS, Rabat, Morocco [email protected] 2 SIRC2S/LASI EHTP, Km 7, Oasis, route El Jadida Casablanca, Morocco [email protected]

Abstract: Network coding is a novel technique that aims to improve routing schemes‘ throughput. Besides, clustering is used to cope with the scalability problem among high scale networks. This paper combines the use of both techniques to address routing problem in Delay Tolerant Mobile Networks (DTMN). By the mean of its routing, the cluster based routing protocol we use offers opportunities for principal network coding operation, mainly the coding and decoding operations. Once a routed packet is received by the cluster head, it codes it regarding its destination cluster. The last cluster head performs decoding operation to deliver packets to their destination.

Keywords: DTMN; routing; network coding; clustering.

ID 298

Session: Wireless Network, Communications and security 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

78

2014 Second World Conference on Complex Systems (WCCS)

Event-based Controller for noisy environments Rafael Socas, Sebastian Dormido and Raquel Dormido Departamento de Informatica y Automatica Universidad Nacional de Educacion a Distancia, UNED Madrid, Spain [email protected], [email protected], [email protected]

Abstract: In this work we focus on the development of anew event-based control strategy for noisy environments. The proposed architecture estimates the level of noise in the system and dynamically computes the event-threshold solution presented has a similar response to that obtained when the classical event-based controller is used. However, the number of events and the noise in the control signals are much smaller than those on the classical strategy. The controller has been tested on an autopilot for longitudinal movements of the Aerosonde UAV. Set-point tracking, load disturbance rejection and high level noise in the sensors have been checked to compare the proposed controller and a classical event-based controller. As result the new strategy obtains a higher efficiency in communication resources usage than the classical one because it generates less number of events which is directly related to a reduction in the communication effort. It also represents a good solution that helps to reduce the chattering effects in the actuators.

Keywords: Event-based control, dynamic event-threshold, UAVguidance.

ID 36

Session: Modeling and Control Systems- Control and Diagnostic of Dynamic Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

79

2014 Second World Conference on Complex Systems (WCCS)

A Polynomial-Time Algorithm for Diagnosability Verification of Discrete Event Systems Eric Gascard1, Zineb Simeu-Abazi2 and Bérangère Suiphon3 1

TIMA Laboratory, UJF/CNRS/Grenoble INP, 46, Avenue F´elix Viallet, FR-38031 Grenoble, FRANCE [email protected] 2,3 G-SCOP Laboratory, UJF/CNRS/Grenoble INP, 46, Avenue F´elix Viallet, FR38031 Grenoble, FRANCE [email protected]

Abstract: This paper concerns the problem of diagnosing the occurrence of permanent fault events in partially observed discrete event systems modelled as finitestate automata in a eventbased framework. The first step is the verification of the existence of diagnosers (the diagnosability problem) for such systems. We define a necessary and sufficient condition of diagnosability of such systems. The results proposed in this paper allow testing the diagnosability of discrete event systems in an efficient way, i.e. in polynomial time. The diagnosability test is stated in terms of existence of similar cycles of observable events both in the faultless model and in the faulty model.

Keywords: Discrete event systems, diagnosability, failure diagnosis, automata.

Paper ID 42

Session: Modeling and Control Systems- Control and Diagnostic of Dynamic Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

80

2014 Second World Conference on Complex Systems (WCCS)

Studying the existing communities in the Urban Bus System of Madrid

Mary Luz Mouronte Escuela Tecnica Superior de Ingenieria y Sistemas de Telecomunicacion. Departamento de Ingenieria y Arquitecturas Telematicas Universidad Politecnica de Madrid, Madrid, Spain [email protected]

Abstract: This paper applies the methods Fag-Ec, Mcode, Blondel and Walktrap to identify the existing communities in the Urban Bus System of Madrid, the obtained results for each algorithm are compared. For the best method, the singularity of the transport lines in each district of the city is studied.

Keywords: Network Science; Transport Network; Communities

ID 319

Session: Modeling and Control Systems -Modelling Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

81

2014 Second World Conference on Complex Systems (WCCS)

Control of a Minirotorcraft Unmanned Aerial Vehicles via Backstepping Technique M.Rida Mokhtari and Brahim Cherki Automatic Control Laboratory of Tlemcen (LAT) Electrical Engineering Department, Tlemcen University, ALGERIA mokhtari rida [email protected]

Abstract: This paper presents the design of a new control strategy to solve the path tracking problem for a small rotorcraft unmanned aerial vehicle (RUAV) weighing less then 2 kg. The detailed mathematical modelling of the rotorcraft dynamics is presented. The backstepping technique is used to ensure the convergence of the translation positions and yaw angle to the reference trajectories and stabilize the pitch and the roll angles simultaneously. The design methodology is based on the Lyapunov stability theory. Numerical simulation results are provided to show the good tracking performance of proposed control laws.

Keywords: Backstepping technique, Lyapunov method, Quadrotor, Rotocraft.

ID 44

Session: Modeling and Control Systems- Control and Diagnostic of Dynamic Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

82

2014 Second World Conference on Complex Systems (WCCS)

Design and Simulation of Adaptive Neuro Fuzzy Inference System (ANFIS) Controller for a Robot Manipulator Baghli Fatima Zahra, Lakhal Yassine, El Bakkali Larbi and Hamdoun Ouafae Modeling and Simulation of Mechanical Systems Laboratory Faculty of Sciences, University Abdelmalek Essaadi BP.2121, M‟Hannech, 93002, Tetuan, Morocco [email protected]

Abstract: Research on the dynamic modeling and control of the arms manipulators has received increased attention since the last years due to their advantages. In this present work we present a new approach for a robot manipulator with two degrees of freedom based on the Adaptive Neuro-Fuzzy Inference System (ANFIS) controller to ensure the position robot control strategy, the proposed control scheme is based on the dynamic model derived using Lagrange-Euler formulation. Our robot manipulator ANFIS system control‘s simulated in Matlab Simulink environment; the results obtained present the efficiency and the robustness of the proposed control with good performances compared with and the FIS method.

Keywords: Robot Manipulator, FIS controller, ANFIS Controller.

ID 103

Session: Modeling and Control Systems- Control and Diagnostic of Dynamic Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

83

2014 Second World Conference on Complex Systems (WCCS)

Production/Maintenance Control of Multiple-Product Manufacturing System Lahcen Mifdal, Zied Hajej and Sofiene Dellagi LGIPM-Lorraine University Metz, France [email protected]

Abstract: This paper presents a method to find the optimal production rate and preventive maintenance policies for a multiple-product manufacturing system. The manufacturing system under consideration consists of one machine which produces several products in order to satisfy randomly demands corresponding to every product. The machine is subject to random failures. A preventive maintenance action is considered in order to improve the reliability of the machine, thereby reducing the amount of degradation caused by machine failures. The decision variables are the production rate, the sub-periods of production and the preventive maintenance rate. The objective of the study is to find the decision variables that minimize the overall cost, including production, preventive maintenance and inventory holding costs over a finite planning horizon. A numerical example is given to illustrate the proposed model.

Keywords:

Preventive maintenance; production rate; multiple-product system; failure rate; random demand

ID 182

Session: Modeling and Control Systems- Control and Diagnostic of Dynamic Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

84

2014 Second World Conference on Complex Systems (WCCS)

Internal Model based Fault Tolerant Control Strategy for PMS Motors H. Mekki1, O. Benzineb2, D. Boukhetala3, M. Tadjine4 and L. Chrifi-Alaoui5 1 University of M‟sila, B.P 166, Ichbilia, M‟sila, Algeria [email protected] 2 University of Blida, B.P 270 Road of Soumaa, Blida, Algeria [email protected] 3,4 Ecole Nationale Polytechnique, Process Control Laboratory, Algiers, Algeria [email protected] 5 University of Picardie Jules Verne, Laboratory of Innovative Technology, Cuffies, France [email protected]

Abstract: In order to increase the reliability, which is crucial topic in industrial applications and to create a fault tolerant control (FTC) unite based internal model strategy for permanent magnet synchronous motors (PMSM). Two ideas are presented in this paper. The first one is to design a robust controller, which is able to steer the current and the speed variables to their desired references under load torque disturbances. The second one is to design an internal model. This later is activated automatically as the appearances of plant fault to compensate its effect by generate an additive control law. The proposed scheme ensures closed-loop stability (based Lyapunov theory) throughout the entire closed-loop response of the system even in the presence of load torque and plant fault. Simulation results show the high precision of the proposed control techniques, and the good PMSM characteristics in healthy and during the faulty condition.

Keywords: Fault tolerant control, internal model control, Lyapunov theory, plant fault, PMSM.

ID 202

Session: Modeling and Control Systems- Control and Diagnostic of Dynamic Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

85

2014 Second World Conference on Complex Systems (WCCS)

Continuous-time Generalized Predictive Control based on Poisson-Laguerre models Lhoussain EL BAHIR Department of Electrical Engineering National School of Applied Sciences, Cadi Ayyad University Marrakech, Morocco [email protected]

Abstract: A Generalized Continuous-time Predictive Control (CGPC) based on Poisson-Laguerre (PL) models is proposed and analyzed. The output signal predictor is obtained without truncating the McLaurin series and then no output predictor order (Ny) is needed. The used matrices integrals in the CGPC algorithm could be computed analytically. Conditions on control parameters to guarantee the stability of the closed loop are given and discussed. For this kind of models, with a non-zero controlweighting parameter the disturbances elimination is not guaranteed. This problem has been diverted by proposing another way to compute the command signal.

Keywords: Predictive control; Continuous-time systems; CGPC; Poisson-Laguerre models.

ID 263

Session: Modeling and Control Systems- Control and Diagnostic of Dynamic Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

86

2014 Second World Conference on Complex Systems (WCCS)

Synthesis and implementation of distributed control for a flexible manufacturing system Yassine QAMSANE1, Abdelouahed TAJER2 and Alexandre PHILIPPOT3 1,2

Laboratory of Electrical Engineering and Control Systems. Cadi Ayyad university– National School of Applied Science, Marrakech, Morocco [email protected] 3 Research Center for Science and Information Technology and Communication. University of Reims Champagne Ardennes Reims, France [email protected]

Abstract: We are interested in the synthesis and implementation of distributed control for manufacturing discrete event systems (DESs). To avoid combinatorial explosion related to this class of systems, the distributed control is based on the modularity of the system and the specification of constraints as logical equations in Boolean algebra. In order to ensure the flexibility required in manufacturing systems, two modes of operation (local and global) are guaranteed by the distributed control. An interpretation method of the distributed controllers into PLC language is given. An application on a real manufacturing system used to distribute, test and sort three types of parts illustrates the paper.

Keywords: Discrete event systems; supervisory control; distributed control; manufacturing systems

ID 294

Session: Modeling and Control Systems- Control and Diagnostic of Dynamic Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

87

2014 Second World Conference on Complex Systems (WCCS)

Maximization of Generated Power from Wind Energy Conversion Systems using a Doubly Fed Induction Generator with Active Disturbance Rejection Control Ali Boukhriss1, Ahmed Essadki2, Abdellah Bouallouch3 and Tamou Nasser4 1,2,3

Electrical Engineering Department of ENSET, Mohamed V Souisssi University, Rabat, Morocco [email protected] 4 Communication Networks Department of ENSIAS, Mohamed V Souisssi University Rabat, Morocco

Abstract: This paper presents the control of doubly fed induction generator (DFIG) used in the wind energy conversion systems. Maximum power point tracking (MPPT) strategy is used to extract the maximum of power during the conversion and taking care that the system does not exceed the operating limits. This is done by acting on the pitch angle to control the orientation of the turbine's blades. Having regard to its robustness and performance, active disturbance rejection control (ADRC) based on the extended state observer (ESO) is employed to achieve the control of both rotor and grid side converters. Simulations are carried out using matlab simulink.

Keywords: Active disturbance rejection control; extended state observer; doubly fed induction generator; maximum power.

ID 19

Session: Modeling and Control Systems- Energy and Electrical

Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

88

2014 Second World Conference on Complex Systems (WCCS)

Performance Analysis of an Energy Detector using Random Sampling for Cognitive Radio Systems Hayat Semlali1, Najib Boumaaz2, Abdellilah Ghammaz3, Abdallah Soulmani4 and Jean-François Diouris5 1,2,3,4

Department of Physics Laboratory of Electrical Systems and Telecommunications, Faculty of Sciences and Technology, Cadi Ayyad University, Marrakech, Morocco [email protected] 5 Electronics and Telecommunications Institute of Rennes, (IETR –UMR 6164). Ecole Polytechnique of the University of Nantes, Nantes, France [email protected]

Abstract:

In this paper, we propose an Energy Detector (ED) using random sampling for spectrum sensing applications. This approach is performed in cognitive radio to analyze the occupancy of radio frequency spectrum. The performance of the proposed approach is evaluated in term of the false alarm probability and compared to the uniform sampling case. The application of the random sampling presents more flexibility in sampling frequencies.

Keywords: cognitive radio; energy detector; random sampling; spectrum sensing;

ID 21

Session: Modeling and Control Systems- Energy and Electrical

Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

89

2014 Second World Conference on Complex Systems (WCCS)

Variable Structure Control for Permanent Magnet Synchronous Generator Based Wind Energy Conversion System Operating Under Different Grid Conditions Youssef Errami1, Mohammed Ouassaid2 and Mohamed Maaroufi3 1

Department of Physical, Faculty of Science, Chouaib Doukkali University, Eljadida, Morocco [email protected] 2 Department of Industrial Engineering, Ecole Nationale des Sciences Appliquées, Cadi Ayyad University, Safi, Morocco 3 Department of Electrical Engineering Mohammadia School‟s of Engineers, Mohammed V- Agdal University, Rabat, Morocco

Abstract:

This paper presents a nonlinear power control strategy for a grid connected Variable Speed Wind Energy Generation System (VS-WEGS) based on a Permanent Magnet Synchronous Generator (PMSG). The proposed system includes a wind turbine (WT) and a PMSG connected to the grid by back-to-back voltage source converter (VSC). The generator side converter is employed to control the speed of the generator with MPPT, and the grid side regulator controls the reactive power flow, the dc link voltage and the power factor during wind variations. The efficacy of the VSWEGS can be greatly improved by using an appropriate control. So, this work explores a sliding mode control strategy to maximize the energy production of a VSWEGS. The conditions for the existence of the sliding mode are found by applying Lyapunov stability theory. The performance of the system has been demonstrated under varying wind conditions and under a grid voltage dip. The simulation results show the effectiveness of the proposed sliding mode control.

Keywords: VS-WEGS; PMSG; MPPT; Sliding mode control; Lyapunov theory; Grid fault.

ID 75

Session: Modeling and Control Systems- Energy and Electrical Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

90

2014 Second World Conference on Complex Systems (WCCS)

Global path tracking control for multiple quadrotors Nguyen Dang Hao, Boutayeb Mohamed and Hugues Rafaralahy CRAN, Lorraine University, Longwy, France [email protected], [email protected], [email protected]

Abstract: Global path tracking is one of basic control tasks when designing motion control for a vehicle. To archive the global path tracking, unit-quaternion model usually is applied. Formation control for multiple vehicles is more difficult than control of single ones because it additionally needs to perform cooperative tasks. More specifically, one of the difficulties when dealing with control design is that no collision is required. In this paper, a formation controller for N quadrotors on three dimensional spaces to be distributed and track a predefined formation and path is presented. A collision avoidance function based on a pairwise collision function, a function of both relative positions and relative velocities among quadrotors, is applied. The formation control design is based on direct Lyapunov method and backstepping technique. The simulation results for N=12 quadrotors show the effectiveness of the proposed controller.

Keywords: Formation control, nonlinear system, UAVs.

ID 90

Session: Modeling and Control Systems- Energy and Electrical Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

91

2014 Second World Conference on Complex Systems (WCCS)

Electrical behavior modeling of power PIN diode in SIMULINK Naoual Mijlad1, Elmostafa Elwarraki2 and Abdelhadi Elbacha3 Laboratory of Electric Systems and Telecommunications Faculty of Sciences and Technologies Cadi Ayyad University Marrakech, Morocco [email protected] 3 Laboratory of Electrical Engineer and Systems command National School of Applied Sciences (ENSA) Cadi Ayyad University Marrakech, Morocco 1,2

Abstract: MATLAB/SIMULINK is a universal software used in different fields. The 'SIMPOWER', 'SIMSCAPE' and 'SIMULINK' libraries are dedicated to electrical engineering domain. The power electronic devices models of these libraries do not reflect their effective functioning. In this work we are interested in the discrete power electronic device, the power PIN diode, we present the implementation of their behavioral electric model in MATLAB/SIMULINK. The integrated SIMULINK PIN diode model is based on electric elements of SIMSCAPE library. Simulation results have been achieved and compared to manufacturer data to verify the validity of the model in the switching phase closure.

Keywords: Powerelectronic; Power PIN diode; behavior modeling; SIMULINK;

ID 105

Session: Modeling and Control Systems- Energy and Electrical Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

92

2014 Second World Conference on Complex Systems (WCCS)

A comparative analysis between conventionnal and new direct torque control strategies of induction machine Mouna ESSAADI1, Mohamed KHAFALLAH2, Abdallah SAAD3, Abdellatif HAMDOUN4, Hamid CHAIKHY5 1,2, 3

Hassan II University-ENSEM, BP 8118, Oasis, Casablanca, Morocco. [email protected] 4 Laboratoire de traitement de l‟informationFaculté des sciences Ben Msik, hassan II UniversityCasablanca, Morocco 5 Laboratory of Engineer Sciences for Energy (LabSIPE), National School of Applied Sciences, University Chouaib Doukkali, El Jadida, Morocco [email protected]

Abstract:

this paper presents a comparative analysis between conventional direct torque control (C_DTC), Modified direct torque control (M_DTC) and twelve sectors direct torque control (12_DTC).Those different strategies are compared by simulation in term of torque, flux and stator current performances. Finally, a summary of the comparative analysis is presented.

Keywords:

C_DTC, M_DTC, 12_DTC, torque dynamic,stator current ,flux,

performances.

ID 106

Session: Modeling and Control Systems- Energy and Electrical Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

93

2014 Second World Conference on Complex Systems (WCCS)

Neural Network MPPT Control for PV Boost Dc-Dc Converter

NAOUFEL KHALDI1, MALIKA ZAZI2, HASSAN MAHMOUDI3 and YOUSSEF BARRADI4 1,2 Mohammedia School of Engineer, LEEP Mohamed V University Agdal Rabat, Morocco [email protected], [email protected] 3,4 Higher School of Technical Education, LMIP Mohammed V University Souissi Rabat, Morocco [email protected], [email protected]

Abstract: The objective of this paper is to present an electronic system allowing the extraction of the maximum power of the photovoltaic panels. Parameters values were extracted using Newton Raphson method from characteristics of Shell SP75 module. The nonlinear and time-varying output characteristics of photovoltaic (PV) in the changing weather cause the difficult maximum point power tracking (MPPT) process for a better characteristics. Neural networks algorithm is suitable for solving the nonlinear relation. In this work, we present boost realized thus that its control circuit, we present also the simulation results. These results show that the objective is achieved and the MPPT controller based on Back Propagation (BP) networks play an effective role to improve the efficiency and reduce the oscillations of PV power system comparing with an another control strategies such as perturb observe (PO) algorithm.

Keywords: Photovoltaic systems, Newton Raphson, Artificiel neural network, MPPT, dc-dc converter.

ID 109

Session: Modeling and Control Systems- Energy and Electrical Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

94

2014 Second World Conference on Complex Systems (WCCS)

Sliding Mode Control for a Grid-Connected Wind Turbine with Asynchronous Generator K. Elyaalaoui1, M. Ouassaid2 and M. Cherkaoui3 Department of Electrical Engineering, Ecole Mohammadia d‟Ingénieurs Mohammed V University, Rabat, Morocco [email protected], 2 Member, IEEE Department of Industrial Engineering, Ecole Nationale des Sciences Appliquées- Safi, Cadi Ayyad University, Morocco [email protected] 1,3

Abstract: In this paper, a sliding mode control is proposed to control a large wind turbine (3 MW). Sliding mode control is considered more robust than the linear controllers. The complete model of the conversion system of wind energy is established. It includes a wind turbine, a gearbox, a variable speed squirrel cage asynchronous generator, two PWM converters, DC bus circuit and the filter. The sidegenerator converter is used to generate the maximum power from Wind Turbine Generator. Then, the control strategy, which combines maximum power point tracking and a pitch control, is given. The grid side converter is used to maintain the DC link voltage constant, to achieve unity power factor, and injects the generated power into AC network. The models and control schemes are validated through simulations by using MATLAB/ Simulink environment. The results of simulation show that the proposed control is efficient and gives good performance.

Keywords: Sliding mode, asynchronous generator, MPPT, power factor and PWM converters.

ID 201

Session: Modeling and Control Systems- Energy and Electrical Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

95

2014 Second World Conference on Complex Systems (WCCS)

Modeling and control design of a boost converter used with a fuel cell Ahmed Moutabir1, E. Abdelmounim2, M. Aboulfatah3, A. Touati4, R. Majdoul5 and A. Abouloifa6 1,2,3,4,5

L.A.S.T.I, University HASSAN 1st, Faculty of Sciences and Technology of Settat Settat, Morocco [email protected] 6 L.T.I, University HASSAN II Casablanca-Mohammedia, Faculty of Sciences Ben M‟sik Casablanca, Morocco

Abstract: This paper deals with the synthesis of a cascade of two BOOST converters used with a fuel cell. First, a nonlinear model of the whole controlled system is developed. Then, a robust nonlinear controller of currents is synthesized using a backstepping design technique. A formal analysis based on Lyapunov stability and average theory is developed to describe the control currents loops performances. A classical PI controller is used for the voltages loops. The study of the stability of the system will also be discussed. Simulated results are displayed to validate the feasibility and the effectiveness of the proposed strategy.

Keywords: nonlinear control; fuel cell; backstepping control.

ID 242

Session: Modeling and Control Systems- Energy and Electrical Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

96

2014 Second World Conference on Complex Systems (WCCS)

Luenberger observer based sensorless Indirect FOC with stator resistance adaptation Zineb Kandoussi, Zakaria Boulghasoul, Abdelhadi Elbacha and Abdelouahed Tajer Laboratory of Electrical Engineering and Control Systems (LGECOS), Department of Electrical Engineering, National School of Applied Sciences (ENSA), Cadi Ayyad University Marrakech, Morocco [email protected]

Abstract:

In the last years, several Field Oriented Control (FOC) methods of induction motors without rational transducers have been proposed. The major drawback of most of these methods is there sensitivity to motor parameters variations especially the stator resistance that affects the drive performances at low speeds. Therefore, simultaneous estimation of rotor speed and stator resistance from measured stator terminal voltages and currents is proposed using Luenberger adaptive observer approach. The stability of this observer is proved by the Lyapunov‘s theorem and the feasibility of the proposed method is verified by simulation under Matlab /Simulink.

Keywords: Indirect Field Oriented Control; sensorless control; Luenberger observer; Lyapunov criteria; induction motor; identification

ID 244

Session: Modeling and Control Systems- Energy and Electrical Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

97

2014 Second World Conference on Complex Systems (WCCS)

Comparative study of MPPT using variable step size for photovoltaic systems Abdourraziq Mohamed Amine1, Ouassaid Mohammed2 and Maaroufi Mohamed3 1

Department of Electrical Engineering Ecole Mohammadia d'Ingénieurs, Mohammed V Agdal University, Rabat, Morocco [email protected] 2 Department of Industrial Engineering Ecole Nationale des Sciences Appliquées, Cadi Ayyad University, Safi, Morocco 3 Department of Electrical Engineering Ecole Mohammadia d'Ingénieurs, Mohammed V Agdal University, Rabat, Morocco

Abstract: The maximum power point tracking technique is widely used to extract maximum power from the PV generator. In this paper, a comparative study of the performance of maximum power point tracker algorithms is presented, under different atmospheric conditions. These algorithms are based on variable step size of Perturb & Observe, Conductance-Increment methods and Perturb & Observe using fuzzy logic controller to track the maximum power point with more efficiency. The objective is to compare the speed of response time and oscillations around the maximum power point for each technique. All the algorithms have been implemented in MATLAB /Simulink environment.

Keywords: Maximum Power Point Tracking (MPPT), Photovoltaic (PV), Variable step size, Perturb and Observe algorithm (P&O), Fuzzy Logic Control (FLC), Conductance-Increment.

ID: 255

Session : Systems Modeling and Automatic Control

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

98

2014 Second World Conference on Complex Systems (WCCS)

Management and Control of Storage Photovoltaic Energy Using Battery-Supercapacitor Combination Zineb Cabrane1,Mohammed Ouassaid2 and Mohamed Maaroufi3 Department of Electrical Engineering, Ecole Mohammadia d‟Ingénieurs (EMI), Mohammed V-Agdal University, Rabat, Morocco 2 Department of Industrial Engineering, Ecole Nationale des Sciences Appliquées-Safi, Cadi Ayyad University [email protected]

1,3

Abstract: Due to the variable characteristics of photovoltaic energy production, batteries used in storage systems renewable power can undergo many irregular cycles of charge / discharge. In turn, this can also have a detrimental effect on the life of the battery and can increase project costs. This paper presents a study of the storage of photovoltaic energy by using a hybrid batteries-Supercapacitors system. Supercapacitors are used to improve batteries life and reduce their stresses. The photovoltaic cells are connected to DC bus (400V) with boost converter and controlled with MPPT algorithm, Supercapacitors and batteries are linked to the DC bus through the buck-boost converter. The inductive load is connected to the DC bus by a DC-AC converter. The static converters associated with batteries and supercapacitors are controlled by current. The components of the systems are supervised through a block of energy management. The complete model of the system is implemented in MATLAB/Simulink environment. Some simulation results prove the effectiveness of the proposed control strategy.

Keywords: Photovoltaic, batteries, supercapacitors, DC bus, energy storage, energy management, converters control.

ID 160

Session: Modeling and Control Systems- Energy and Electrical Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

99

2014 Second World Conference on Complex Systems (WCCS)

Modeling and Control of Grid Connected Wind Energy Conversion System with Power Factor Correction Y. Boussairi1, A. Abouloifa2, A. Hamdoun3 and C. Aouadi4 LTI Lab. Faculty of Science Ben M‟sik University HASSAN II Mohammedia-Casablanca Casablanca, Morocco [email protected], [email protected] 3,4 LTI Lab. Faculty of Science Ben M‟sik University HASSAN II Mohammedia-Casablanca Casablanca, Morocco [email protected], [email protected] 1,2

Abstract: This paper presents modeling and nonlinear control of a grid connected wind energy conversion system based on a wind turbine using a permanent magnet synchronous generator (PMSG). The objective of the control is: enforcing power factor correction (PFC) with respect to the power network. First, a model of the whole controlled system is developed in the Park‘s coordinates. Thereafter control strategies PFC is used to inject power into a grid while keeping a very good power factor. A nonlinear controller is synthesized using the backstepping design technique. A formal analysis based on Lyapunov stability is developed to describe the control system performances. The results of various simulations of all the chain of conversion, carried out under MATLAB/Simulink software, made it possible to evaluate the performances of the proposed system.

Keywords: Nonlinear control systems, Lyapunov stability, backstepping approach, AC/DC/AC converters, Wind power.

ID 293

Session: Modeling and Control Systems- Energy and Electrical Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

100

2014 Second World Conference on Complex Systems (WCCS)

Optimization of radiation patterns for an array of an air gap tuned high Tc superconducting rectangular microstrip antennas Ouarda Barkat Electronics Department, University of Constantine 1, 25000 Constantine, Algeria [email protected]

Abstract: In this paper, two methods are proposed for the synthesis of non uniform linear array which are composed of the superconducting tunable rectangular microstrip antennas (STRMA). The proposed synthesis methods consist of two steps. First, we find the scattering properties of STRMA by using spectral method. Then, the stationary phase method is used for computing the far zone field. Second, the particle swarm optimization (PSO) is used to obtain a non uniform linear array with optimized excitation magnitudes, phases and locations. The obtained results show the proper performance of the array antenna to provide the directive radiation and low side lobe level. Several synthesis studies are conducted to validate the effectiveness of the proposed synthesis method.

Keywords: superconducting rectangular, antenna array, full-wave, radiation pattern, PSO.

ID 25

Session: Modeling and Control Systems- Modelling Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

101

2014 Second World Conference on Complex Systems (WCCS)

Mathematical modelling of love affairs between the characters of the pre-masochistic novel Mikhail Zhuravlev1, Irina Golovacheva2 and Polina de Mauny3 1

Faculty of Liberal Arts and Sciences St Petersburg State University St Petersburg, Russia [email protected] 2 Philological Faculty St Petersburg State University St Petersburg, Russia [email protected] 3 Faculty of Liberal Arts and Sciences St Petersburg State University St Petersburg, Russia [email protected]

Abstract: We investigate the love dynamics in Ivan Turgenev‘s pre-masochistic novel Torrents of Spring, using the system of ordinary differential equations. Unlike previous authors, we based our analysis not only on psychological credibility. We relate our model to the ideas of literary criticism.

Keywords: -love dynamics, ordinary differential equations, artistic space, premasochistic novel.

ID 43

Session: Modeling and Control Systems -Modelling Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

102

2014 Second World Conference on Complex Systems (WCCS)

Modeling a production system based on parametric identification approach RACHAD Sofia, FOURAIJI Hicham and and Bahloul Bensassi PMMAT Laboratory Faculty of Sciences Ain Chok, Hassan II University Casablanca, Morocco [email protected]

Abstract: This paper refers to possibility of utilization a new method for modeling an industrial production system using the identification approach. The production system studied is considered as a black box, which does not require any knowledge of the internal parameters. Two structures of linear parametric models are outlined and compared i.e. Autoregressive with Exogenous (ARX) model and Autoregressive Moving Average with Exogenous (ARMAX) model. The best linear model is ARMAX, due to its higher percentage of best fit.

Keywords: - Production system; system identification; ARX model; ARMAX model.

ID 107

Session: Modeling and Control Systems -Modelling Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

103

2014 Second World Conference on Complex Systems (WCCS)

Inverse of multivariable LTV systems: a bond-graph approach Chafik Andaloussi1, Zakaria Chalh2 and Hicham Hihi3 1

LSET, FSTG BP 549, Av. Abdelkarim Elkhattabi, Guéliz Marrakech, Morocco. [email protected] 2 LSIS, ENSAF BP 72, Quartier Industriel Ain Chkef Route Bensouda Fez, Morocco. [email protected] 3 LGECOS, E NSAM, BP 575, Avenue Abdelkrim Khattabi, 40000, Guéliz-Marrakech Morocco. [email protected]

Abstract: The study of the inversion of multivariable linear time varying systems modelled by bond-graph is proposed in this paper. An analysis method based on noncommutative differential algebra concepts is presented. The inverse and the reduced inverse models are studied depending on the decouplability of the multivariable LTV system. To show the interest of this new approach, two applications have been realized, among which is the thyristor circuit model TCSC often used in power electronics.

Keywords: MIMO LTV systems, Inversion, Bond-Graph, input-output decoupling.

ID 217

Session: Modeling and Control Systems -Modelling Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

104

2014 Second World Conference on Complex Systems (WCCS)

Phenomenological Percolation in Conceptual Networks associated to Complex Systems Gonzalo A. Aranda-Corral1, Joaquín Borrego-Díaz2 and Juan Galán-Páez3 1

Department of Information Technology Universidad de Huelva Palos de La Frontera, Spain 2 Dept. Computer Science and AI Universidad de Sevilla Sevilla, Spain 3 Computer Science and AI Universidad de Sevilla, Sevilla, Spain

Abstract:

A notion of phenomenological percolation for Conceptual Structures associated to Complex Systems (CS) is proposed. This process on concept lattices (from Formal Concept Analysis) consists in the allocation of (non-previous) objects in the lattice, which can induce its extension. The aim is to study the robustness of this conceptual structure when facing unexpected changes (represented by the new object) in the CS it models. Results show that concept lattices associated to CS present more robustness than concept lattices modeling other kind of systems.

Keywords: Complex Systems, Formal Concept Analysis, Phenomenological Percolation.

ID 277

Session: Modeling and Control Systems -Modelling Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

105

2014 Second World Conference on Complex Systems (WCCS)

Optimal neural network sliding mode control for avariable speed wind turbine based on APSO algorithm El-mahjoub Boufounas1 and Jaouad Boumhidi2 and Ismail Boumhidi3 1,2

Department of computer science, LIIAN Laboratory University of sidi Mohammed ben Abdellah Faculty of sciences Dhar Mehraz Fez, Morocc, {boufounass & jboumhidi}@yahoo.fr 3 Department of physics, LESSI Laboratory University of sidi Mohammed ben Abdellah Faculty of sciences Dhar Mehraz Fez, Morocc, [email protected]

Abstract: In this paper, artificial neural network sliding mode (ANNSM) controller is designed for a variable speed wind turbine in order to optimize the energy captured from the wind. Sliding mode control (SMC) approach can be used for a variable speed wind turbine. However, in the presence of large uncertainties, the SMC produces chattering phenomenon due to the higher needed switching gain. In order to reduce this gain, artificial neural network (ANN) with one hidden layer is used to estimate the uncertain parts of the system plant with on-line training using backpropagation (BP) algorithm. The learning rate is one of the parameters of BP algorithm which have a significant influence on results; Adaptive particle swarm optimization (APSO) algorithm with global search capabilities is used in this study in order to improve the network performance in terms of the speed of convergence. The stability is shown by the Lyapunov theory and the control action used did not exhibit any chattering behavior. The performance of the proposed approach is investigated in simulations by the comparison with traditional sliding mode control.

Keywords: variable speed wind turbine; artificial neural network; sliding mode control; adaptive particle swarm optimization.

ID 200

Session: Modeling and Control Systems -Modelling Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

106

2014 Second World Conference on Complex Systems (WCCS)

An artificial immune optimization approach in tuning nonlinear PID controllers Mustapha SAHRAOUI1, Mohammed SALEM2 and Mohamed Fayçal KHELFI3 1,2

Faculty of Sciences and Technology University of Mascara Algeria [email protected] 3 Faculty of Applied and exact Sciences University of Oran Algeria [email protected]

Abstract: This paper is dedicated to present one of newly developed evolutionary algorithm; we considered a new way to tune the PID controller of nonlinear systems where the parameters of PID are optimized using the optimization method which is Artificial Immune Algorithm (AIA) based on the immune system defends the body against harmful diseases and infections. This article describes the application of AIA Technique based on two fitness function to optimally tune the three terms of the classical PID controller to regulate a nonlinear process .Simulations of the proposed algorithm are carried out over a massspring damper system. To validate the approach of AIA, comparison with GA is performed with the same system. The results of Simulation indicate that Artificial Immune Algorithm is a reasonable and effective method for parameter optimization of PID controllers.

Keywords: Artificial immune algorithm; PID; optimization; nonllineair system; genetic algorithm; control.

ID 205

Session: Modeling and Control Systems -Modelling Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

107

2014 Second World Conference on Complex Systems (WCCS)

Access Control Models: State of the Art and Comparative Study

Mouad MAMMASS and Fattehallah GHADI Mathematical Modeling and Simulation Team (MMS) Faculty of Science, Ibn Zohr University Agadir, Morocco [email protected], [email protected]

Abstract: This paper is devoted to the state of the art on the access control models and a more specific classification of security models, which are: Access Control, Flow Control and Administration. We propose a comparative study of access control models and we evaluate their advantages and limitations and also their security policies. Then we present models of flow control and finally models of administration.

Keywords: security models, access control models, flow control, security, policy, organization.

ID 345

Session: Modeling and Control Systems -Modelling Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

108

2014 Second World Conference on Complex Systems (WCCS)

New result for OFDM in Optical Code Division Multiple Access using direct detection A.Cherifi1, B. Bouazza2, A.Omar Dahmane3 and B.YAGOUBI4 1,2

Technology of Communication Laboratory University Of Tahar Moulay Saida, Algeria. [email protected] 3 Directeur, laboratoire de Microsystems et telecommunication(LMST) Universite du Quebec a Trois rivieres, canada [email protected] 4 University of Abdelhamid Ibn Bdis Mostaganem Mostaganem, algeria [email protected]

Abstract:

In optical communication systems, OFDM has received increased attention as a means to overcome various limitations of optical transmission systems such as modal dispersion, relative intensity noise, chromatic dispersion, polarization mode dispersion and self-phase modulation. The multipath dispersion limits the maximum transmission data rates. In this paper we investigate OFDM system where multipath induced intersymbol interference (ISI) is reduced and we increase the number of users by combining OFDM system with OCDMA system using direct detection Incorporate OOC (orthogonal optical code) for minimize a bit error rate.

Keywords: OFDM , OCDMA , OOC (orthogonal optical code) , (ISI), prim codes ( Pc)

ID 167

Session: Modeling and Control Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

109

2014 Second World Conference on Complex Systems (WCCS)

The Wiener, the hyper-Wiener and the degree distance indices of diamond's lower face ATMANI Abderrahmane1, Mohamed El MARRAKI and Mohamed ESSALIH 1

LRIT associated unit to CNRST, Faculty of Sciences, Mohammed V-Agdal University, BP 1014, Rabat, Morocco [email protected] 2 LRIT associated unit to CNRST, Faculty of Sciences, Mohammed V-Agdal University, BP 1014, Rabat, Morocco [email protected] 3 LRIT associated unit to CNRST, Faculty of Sciences, Mohammed V-Agdal University, BP 1014, Rabat, Morocco [email protected] Abstract: The graph theory, with its diverse applications in natural (Chemistry, Biology) and social sciences in general and in theoretical computer science in particular, is becoming an important component of the mathematics curriculum in colleges and universities all over the world. In this paper we will present some topological indices such as the Wiener index W(G), the hyper-Wiener index WW(G) and the degree distance DD(G) of diamond's lower face. Keywords: Graph, Hyper-Wiener index, Wiener index, degree distance index, first Zagreb index, QSAR/QSPR, topological indices.

ID 122

Session: Modeling and Control Systems -Modelling Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

110

2014 Second World Conference on Complex Systems (WCCS)

Analysis and Comparison between the Artificial Neural Networks and Fuzzy Logic in the Measurement of the Group Velocity of Acoustic Circumferential Waves Youssef Nahraoui1, Elhoucein Aassif2 and Gérard Maze3 1,2

Laboratoire de Métrologie et Traitement de l‟information, Faculté des sciences, Université Ibn Zohr, Agadir, Maroc 3 Laboratoire Ondes et Milieux Complexes, LOMC UMR CNRS 6294, Normandie Université, 75 rue Bellot, CS 80 540, 76058 Le Havre [email protected]

Abstract: In recent years, the development of new concepts, methodologies and algorithms in the field of artificial intelligence, has provided alternative tools to address the problem of modeling and predicting the process of nonlinear systems. In this work, an Adaptative Neuro-Fuzzy Inference System (ANFIS) and an Artificial Neural Network (ANN) are developed to predict the velocity dispersion curves of the symmetric (S0) and antisymmetric (A1) circumferential waves propagating around an elastic cooper cylindrical shell of various radius ratio b/a (a: outer radius and b: inner radius) for an infinite length cylindrical shell excited perpendicularly to its axis. The group and phase velocities, are determined from the values calculated using the eigenmode theory of resonances. These data are used to train and to test the performances of these models. These techniques are able to model and to predict the group and phase velocities, of the symmetric and the anti-symmetric circumferential waves, with a high precision, based on different estimation errors such as mean relative error (MRE), mean absolute error (MAE) and standard error (SE). A good agreement is obtained between the output values predicted using the propose model and those computed by the eigenmode theory. Keywords: fuzzy logic; neuro-fuzzy logic system; Neural Networks Artificial; Acoustic response; Submerged elastic shell; Scattering waves; Circumferential waves; Phase velocity; Group velocity

ID 8

Session: Modeling and Control Systems -Modelling Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

111

2014 Second World Conference on Complex Systems (WCCS)

Dynamic behaviour of network cellular automata with non-chaotic standard rules Heverton Barros de Macêdoê1, Gina Maira Barbosa de Oliveira2 and Carlos Henrique Costa Ribeiro3 1

Dept. Informatics Goiás, Federal Institute, IFG Jataí, Brazil [email protected] 2 Dept. Computer Science Federal University of Uberlˆandia, UFU Uberlândia, Brazil [email protected] 3 Dept. Computer Science Technological Institute of Aeronautics, ITA São José dos Campos, Brazil [email protected]

Abstract: Rules classified as non-chaotic are usually discarded from the set of keys in cellular automata used as cryptographic methods, as they exhibit predictable behavior regarding the dynamic evolution of the cellular automata configurations. The number of possible keys, in fact, is an important factor for the security of a cryptographic method. This paper investigates the dynamic behavior of a type of cellular automata network whose structure is derived from small-word concepts, when evolving rules not classified as chaotic. The constructed connection structure of the cellular automata network modifies the dynamic behavior of transition rulesassociated to the standard model. The experiments show that rules classified as periodical are capable of producing results equivalent to those by chaotic rules, thus suggesting the use of such structures as better candidates for criptography applications than standard cellular automata.

Keywords: cellular automata; complex network; cellular network; cryptography

ID 84

Session: Computational Intelligence and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

112

2014 Second World Conference on Complex Systems (WCCS)

Mutualistic Relationships in Service-Oriented Communities and Fractal Social Organizations Vincenzo De Florio1, Hong Sun2 and Mohamed Bakhouya3 1

MOSAIC group, Universiteit Antwerpen & iMinds 2020 Antwerpen-Berchem, Belgium [email protected] 2 AGFA Healthcare, 9000 Gent, Belgium [email protected] 3 International University of Rabat 11 100 Sala el Jadida, Morocco [email protected]

Abstract: In this paper we consider two social organizations –service-oriented communities and fractal organizations– and discuss how their main characteristics provide an answer to several shortcomings of traditional organizations. In particular, we highlight their ability to tap into the vast basins of ―social energy‖ of our societies. This is done through the establishing of mutualistic relationships among the organizational components. The paper also introduces a mathematical model of said mutualistic processes as well as its translation in terms of semantic service description and matching. Preliminary investigations of the resilience of fractal social organizations are reported. Simulations show that fractal organizations outperform non-fractal organizations and are able to quickly recover from disruptions and changes characterizing dynamic environments.

Keywords:

Service-oriented communities, fractal organization, agent-based simulations, mutualistic relationships, semantic service description and matching.

ID 287

Session: Computational Intelligence and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

113

2014 Second World Conference on Complex Systems (WCCS)

Threshold Selection Based On Type-2 Fuzzy 2-Partition Entropy Approach

Ouarda Assas and F. Benmedour Department of Computer Science, University of M‟sila, Algeria. Laboratory Analysis of Signals and Systems (LASS). University of M‟sila, Algeria. [email protected] Abstract: Thresholding is a fundamental task and a challengefor many image analysis and pre-processing process. The fuzzy 2-partition entropy approach for threshold selection is one of the best image thresholding techniques. In this work, a new thresholding method for image segmentation using type-2 fuzzy 2-partition entropy is presented. Type-2 fuzzy sets represent fuzzy sets with fuzzy membership values. The experiment results show that the proposed approach gives good segmentation. Keywords: Segmentation; Thresholding; Fuzzy Logic; Type-2 Fuzzy Sets; Entropy; Fuzzy c-partition.

ID 26

Session: Computational Intelligence and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

114

2014 Second World Conference on Complex Systems (WCCS)

A Neuro-Fuzzy System as a Complex System of Emergent Behavior in Organizations Ernesto R. Álvarez-Molina, Luis G. Martínez, Manuel Castañón-Puga and Antonio Rodríguez-Díaz Universidad Autónoma de Baja California, Calzada Tecnológico 14418, Mesa de Otay, CP 22390 Tijuana BC, México {ralvarez, luisgmo, puga, ardiaz}@uabc.edu.mx

Abstract: The organization is not like a machine that just needs to meet a target with efficiency, it presents larger problems like survival and adaptation to a changing and uncertain environment. It is also an open system influenced by other systems outside of it. This interaction can be seen as emerging behavior that acts as a living organism that adapts and is self-organized. Humanity moves increasingly faster thus organizations must adapt; reductionist studies that only consider hierarchy and economic factors are no longer sufficient, nowadays approaches have emerged to manage and understand an organization from a complexity approach highlighting the progress of organizational cybernetics. In this paper, we propose the use of NeuroFuzzy Systems for modelling the emergent behavior of a self-organized organization to achieve effectiveness.

Keywords: Neuro-fuzzy, Multi-Agent Systems, Complexity, Organizations, Viable System Model.

ID 157

Session: Computational Intelligence and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

115

2014 Second World Conference on Complex Systems (WCCS)

The Nabladot Operator for Hybrid Functions in Complex Systems Claudio Cioffi-Revilla Center for Social Complexity and Department of Computational Social Science George Mason University, Fairfax, Virginia 22030, USA Email: [email protected]

Abstract: Complex systems are frequently characterized by hybrid functions consisting of both continuous and discrete variables—i.e., so-called ―concrete‖ multivariate functions in the sense of D. Knuth. Examples include the fundamental probability functions for serial and parallel structures in the causal architecture governing all complex systems, the Binomial Principle for structural complexity, complex adaptive systems, Amdahl‘s Law, the geometric mean associated with power-law distributions, and rank-size or Zipfian distributions. Traditional gradientbased operators from classical multivariate differential calculus and sensitivity analysis are not applicable to a broad class of such systems due to the presence of hybrid functions of discrete and relatively low-range integer values, such as small cardinalities within the range of Miller‘s number 7 2. The new ―nabladot‖ operator for hybrid concrete functions of continuous and discrete variables is introduced and demonstrated with examples from complex social and technological systems. Results show new features of complex systems previously unknown through extant traditional approaches and continuous approximations.

Keywords: Complex systems, hybrid functions, nabladot discrete calculus, multivariate calculus, serial and parallel systems, complex adaptive systems, Amdahl's Law

ID 290

Session: Computational Intelligence and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

116

2014 Second World Conference on Complex Systems (WCCS)

Ensemble with Radial Basis Function Neural Networks for Casablanca Stock Market Returns Prediction Salim Lahmiri ESCA School of Management Casablanca, Morocco [email protected]

Abstract: We present a radial basis function neural network (RBFNN) ensemble system (ES) to predict Casablanca Stock Exchange (CSE) returns based on its microstructure modeling. Its performance is compared to each RBFNN component and the conventional auto-regressive moving average (ARMA) process. Based on the mean of absolute errors (MAE) and mean of squared errors (MSE), the forecasting results showed that the RBFNNES outperformed each of its RBFNN components and also the traditional ARMA model. Our obtained results suggest that the proposed approach could be promising for CSE returns modeling and forecasting.

Keywords: component; radial basis function neural network; ensemble system; ARMA process; stock market; forecasting

ID 41

Session: Computational Intelligence and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

117

2014 Second World Conference on Complex Systems (WCCS)

An Evolutionary Algorithm for Feed-Forward Neural Networks Optimization Youssef Safi1 and Abdelaziz Bouroumi2 1

Laboratoire Traitement d'Information, Faculté des Sciences Ben M'sik, Casablanca, Morocco 2 Hassan II Mohammedia-Casablanca University [email protected]

Abstract: We propose an evolutionary algorithm for optimizing both the topology and the synaptic weights of single hidden-layer feed-forward neural networks (SLFN). We introduce new evolutionary operators of recombination and mutation we designed for evolving a population of SLFN candidate solutions to a specific problem. The performance of the proposed algorithm in solving classification and prediction problems is experimentally tested using five real-world benchmark datasets. The experimental results are analyzed and compared to those produced by two other methods using two measures of performance.

Keywords: evolutionary algorithms, artificial neural networks, machine learning, optimization, evolutionary strategies.

ID 173

Session: Computational Intelligence and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

118

2014 Second World Conference on Complex Systems (WCCS)

Binary Bat Algorithm for Graph Coloring Problem Halima Djelloul, Sara Sabba and Salim Chikhi Computer Science department , Constantine 2 University MISC Laboratory Constantine, Algeria [email protected]

Abstract: Bat algorithm (BA) is one of the most recent bio-inspired algorithms. It is based on the echolocation behavior of microbats. The standard BA is proposed only for continuous optimization problems. In this paper, we try to solve the graph coloring problem using a binary bat algorithm. To show the feasibility and the effectiveness of the algorithm, we have used the DIMACS benchmark, and the obtained results are very encouraging.

Keywords: Bat algorithm, bio-inspired algorithm, binary bat algorithm, graph coloring problem, heuristic, discrete optimization problem.

ID 60

Session: Computational Intelligence and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

119

2014 Second World Conference on Complex Systems (WCCS)

Probabilistic Distributed Algorithm for Uniform Election in Polyo-triangular Grid Graphs Ismail Hind and Dahmani Ali FS Abdelmalek Essaâdi University P.O. Box. 2121 M'Hannech II 93030 Tetuan Marocco [email protected]

Abstract: Electing in a network consists in choosing one and only one element in this network. The element can be used for example to manage the resource sharing (printer, connection, ...) or centralize some of the network informations (size, diameter ...). In this case, many algorithms are available with dierent topologies and applicable under appropriate assumptions, for example: the uniform election in trees [1], k*trees [2], polyominoides [3], and triangular grid graph [4]. The work presented here is a continuation of our last researches. Indeed, we introduce a probabilistic algorithm for uniform election in a network with the topology of polyo-tg graph. thereby and rst, we will discuss the rules that allow generating in distributed manner such family of graphs. Then we present the dierent rules of the elimination process of our algorithm. These rules are executed in parallel with every simplicial vertex of the network. In a second time, we analytically analyze this process. To do we modelled by a continuously Markov death process. We show, therefore, that our algorithm is totally fair in fact that all the vertices have the same probability of being elected.

Keywords:

Uniform Election, Distributed Algorithms, Probabilistic Election, Markov Process, Randomized Algorithm Analysis.

ID 276

Session: Computational Intelligence and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

120

2014 Second World Conference on Complex Systems (WCCS)

A Learning Adaptation Cases Technique for Fuzzy Analogy-based Software Development Effort Estimation Soufiane Ezghari1, Azeddine Zahi2 and Ali Idri3 1,2

System Intelligent and Application Laboratory (SIA), FST Fez, Morocco. [email protected] 3 Software Projects Management Research Team, ENSIAS, Mohamed V University, Rabat, Morocco [email protected]

Abstract: the aim of this paper is to enhance the Fuzzy Analogy technique for software effort development estimation. Fuzzy Analogy selects the similar projects that will be used in the adaptation step according to the definition of the qualification 'closely similar'. The adopted definition considers two projects as closely similar if their similarity is in the vicinity of 1. The qualification 'closely similar' is represented by a fuzzy set defined by a fixed threshold which is obtained experimentally from the environment. However, in many cases the available empirical knowledge may not allow estimators to fit the adequate fuzzy representation of the qualification ‗closely similar‘. In this study, we propose an approach to learn this fuzzy representation from the similarities obtained in the retrieval step of the Fuzzy Analogy technique. The proposed method provides for each new project, an adequate threshold by using the quasi-arithmetic mean operators. Indeed, the quasi-arithmetic mean operators use a weighted similarities to calculate the threshold that often ensures the selection of the closest projects in the adaptation step. This paper also presents an empirical validation of the proposed approach based on the COCOMO'81 dataset.

Keywords:

software cost estimation; fuzzy analogy; quasiarithmetic operators; Minkowski mean

ID 289

Session: Computational Intelligence and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

121

2014 Second World Conference on Complex Systems (WCCS)

Turing Instability of a Predator-Prey Model with Beddington-DeAngelis functional Response on a Circular Domain Walid Abid1, Radouane Yafia2, M. A. Aziz-Alaoui3, Habib Bouhafa4 and Azgal Abichou5 Laboratoire d‟ingenierie Mathématique de l‟ecole polytechnique de Tunis, [email protected] 2 Université Ibn Zohr, Faculté Polydisciplinaire de Ouarzazate, B.P:638, Ouarzazate, Morocco. [email protected] 3 Laboratoire de Mathématiques Appliquées du Havre 25 rue Philippe Lebon, 76600 Le Havre, France, [email protected] 4 Laboratoire d‟ingenierie Mathématique de l‟ecole polytechnique de Tunis, [email protected], [email protected] 1

Abstract: In the present work, we investigate the spatiotemporal dynamics predatorprey model with modified Leslie-Gower and Beddington-DeAngelis functional response. This model is given by a reaction diffusion system defined on a circular spatial domain. We prove the existence of critical lines of Hopf and Turing bifurcations in the circular spatial domain by using mathematical theory. In the end, we carry out numerical simulations to interpret how biological processes affect spatio temporal pattern formation in a disc spatial domain and the role of bifurcation parameter on the solutions of the model.

Keywords: Beddington-DeAngelis, functional response local and lobal stability, Hopf and Turing bifurcation, pattern formation, chaos

ID 169

Session: Computational Intelligence and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

122

2014 Second World Conference on Complex Systems (WCCS)

A Comparison of Public and Private Partner Selection Models in the Battle of Sexes Game

Pedro Mariano, Davide Nunes and Luís Correia LabMAg Faculdade de Ciências Universidade de Lisboa 1749-016 Lisboa, Portugal [email protected], [email protected], [email protected]

Abstract: We examine the effect of different partner selection models in population diversity and dynamics when agents interact through a coordination game, namely the Battle of Sexes. In this type of game there are usually more than one Nash Equilibrium. Each one can be considered as a niche that a population may occupy. We compare a partner selection model based on private information with one based on public opinion. Experimental analysis shows that each one is better than random partner selection, but the outcome is different. While in the private based partner selection usually only one of the Nash Equilibrium survives, in opinion-based partner selection each strategy profile is able to resist. These results were obtained when each strategy was confined to its location and no movement was allowed between places. This raises some questions on how diversity can be maintained with mutation and strategy mobility having a negative impact.

Keywords: Bat algorithm, bio-inspired algorithm, binary bat algorithm, graph coloring problem, heuristic, discrete optimization problem. :

ID 61

Session: Multi-Agent Systems and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

123

2014 Second World Conference on Complex Systems (WCCS)

An Agent-Based Model of Civil Violence with Imprisonment Delay and Legitimacy Feedback Carlos M. Lemos1, Rui J. Lopes2 and Helder Coelho3 1

Instituto de Estudos Superiores Militares, Rua de Pedrouços, 1449-027 Lisbon, Portugal [email protected] 1,2 ISCTE-Instituto Universitário de Lisboa, Av. Forças Armadas, 1649-026 Lisbon, Portugal 1,3 Faculdade de Ciências da Universidade de Lisboa, Campo Grande, 1749-016 Lisbon, Portugal 2 Instituto de Telecomunicações IT-IUL, Av. Forças Armadas, 1649-026 Lisbon, Portugal

Abstract: Epstein‘s Agent-Based model of civil violence has been very successful due to its simplicity and explanatory power, but does not represent important phenomena, such as processes operating at multiple scales and feedback mechanisms. In this work, we present an extension of Epstein‘s model that includes the effects of imprisonment delay, media coverage and feedback of rebellion bursts of the government‘s legitimacy. These innovations are relevant for a more realistic modeling of the complex and path-dependent effect of protests and violent confrontations on the evolution of the social context. The resulting simulations showed punctuated equilibrium as in Epstein‘s model, but the violence bursts lasted longer and displayed more complicated structure and interdependence on previous events. The rebellion peaks lead to drops and lowering of the time-averaged value of the government‘s legitimacy.

Keywords: Agent-Based model; Epstein‘s model; civil violence; complexity; social simulation

ID 79

Session: Multi-Agent Systems and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

124

2014 Second World Conference on Complex Systems (WCCS)

An overview of different techniques and algorithms for network topology discovery Rafat Ahmed Alhanani and Jaafar Abouchabaka Department of Computer Science IBN Tofail University. Faculty of Science. Kénitra, Morocco. [email protected]

Abstract: Network topology discovery describes the physical structure of the network, which in turn reflects the purpose of this network design. Used tools and techniques vary depending on that structure in order to choose the optimal method for the appropriate distributed applications implementation. Mobile agents has become a focus of attention for implementing distributed management architectures because of their Autonomy, Flexibility and ability of Asynchronous communication, while centralized models affect on the network performance such as latency, throughput and jitter; The main objective of this study is to discuss the use of mobile for discover the network topology either by traditional methods/protocols or by graphic theory, Genetic and Swarm algorithms that belong to the artificial intelligence filed and compare between them. As a result, identify the appropriate technique for extracting the network management information to obtain optimal itineraries for mobile agents.

Keywords:

Mobile Agent; Graphic Theory; Artificial Intelligence; Genetic Algorithm; Swarm Algorithm; Topology Discovery.

ID 89

Session: Multi-Agent Systems and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

125

2014 Second World Conference on Complex Systems (WCCS)

Multi-Agent Simulation of Water Contact's Patterns in relation to Schistosomiasis: A BDI Architecture Using Kernel Functions Papa Alioune Cissé1, Christophe Cambier2, Jean Marie Dembele3 and Moussa Lô4 1 Université Gaston Berger, UFR SAT Saint-Louis, BP 234, Senegal [email protected] 2 UMI 209 UMMISCO – IRD/UPMC [email protected] 3 Université Gaston Berger, UFR SAT UMI 209 UMMISCO – IRD/UPMC [email protected] 4 Université Gaston Berger, UFR SAT UMI 209 UMMISCO – IRD/UPMC Email: [email protected]

Abstract: In this work, we propose architecture based on the BDI (Belief, Desire and Intention) paradigm to specify simple rules in order to reproduce, through a multiagent simulation, individual behaviors to obtain emerging collective behaviors. We have established this architecture in a context of studying the phenomenon of Individuals accessibility to potentially infective waters with Schistosomiasis. Our approach is to consider the "Human-Water" contact as a phenomenon emerging from human behavior in respect to water areas. Such behavior is determined by a combination of social, economic, demographic, cultural, temporal, and spatial factors in the context of studied populations. An application of this architecture is implemented with a specific case of schistosomiasis in Niamey (Niger).

Keywords:

Multi-Agent Simulation, BDI Schistosomiasis, Human-Water contact Patterns

ID 147

Architecture,

Session: Multi-Agent Systems and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

kernelfunctions,

126

2014 Second World Conference on Complex Systems (WCCS)

Engineering change management through consensus seeking by fuzzy agents Benoît Beroule1, Alain-Jérôme Fougères2 and Egon Ostrosi3 1,2

ESTA Laboratoire IRTES-M3M Université de Technologie de Belfort- Montbéliard 90010 Belfort – FRANCE [email protected], [email protected] 3 Laboratoire de Recherche Mécatronique3M Université de Technologie de BelfortMontbéliard 90010 Belfort – FRANCE [email protected]

Abstract: Uncertainty is a feature of the collaborative and distributed design process. Dilemmas can be found face to change of specifications, product functions, elementary solutions, and process constraints. This situation leads to consensus seeking during the collaborative and distributed design process. Our contribution consists in modelling and implementation of consensuses by agent technology. Consensus agents are implemented in a fuzzy agent-based platform. The robust parts of configurations are found. It permits the designer to distinguish the robust components and flexible ones in a set configuration. Keywords: Fuzzy agents; consensus; product configuration; change management

ID 222

Session: Multi-Agent Systems and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

127

2014 Second World Conference on Complex Systems (WCCS)

Policy Computation for Constrained Communicating Agents

Hiba Abdelmoumène and Habiba Belleili LabGED Laboratory, Computer Science Department Badji Mokhtar University, Annaba, Algeria [email protected], [email protected]

Abstract: Decentralized Markov Decision Processes (DECMDPs) provide powerf ul modeling tools for cooperative multiagent decision making under uncertainty. However, as basic models, they fail in modeling problems where decision makers must act under time pressure and regarding complex constraints. In this paper, we focus on adapting DEC-MDP model in order to take into account temporal constraints, precedence constraints and uncertain action durations. Particularly, we extend a solution method called opportunity cost DEC-MDP to handle more complex precedence constraints. Because problems we consider require a tight coordination, we introduce communication among agents. We aim at optimizing communication decisions since dealing with offline planning for communication is intractable. To this end, we propose to exploit problem structure in order to limit information sharing. Experimental results show that even if communication is costly, it improves the degree of coordination between agents and it increases team performances regarding constraints.

Keywords: Communication; Decentralized Markov Decision Process; Execution constraints; Planning under uncertainty.

ID 223

Session: Multi-Agent Systems and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

128

2014 Second World Conference on Complex Systems (WCCS)

Multi-agent architecture for smart micro-grid optimal control using a hybrid BP-PSO algorithm for wind power prediction

Didi Omar Elamine, El Habib Nfaoui and Boumhidi Jaouad Computer science department Sidi Mohamed Ben AbdEllah University, LIIAN, FSDM Fez, Morocco [email protected]

Abstract: In this paper we present a multi-agent architecture based on wind power prediction using neural network (NN) trained by hybrid particle swarm optimization (PSO) algorithm and back-propagation algorithm,this process aims to implement smart micro-grid with different generation units like wind turbines and fuel generators. In the proposed architecture this micro-grid can exchange electricity with the main grid therefore it can buy or sell electricity .The main objective is to find the optimal policy using average wind speed prediction for the next hour in order to maximize the benefit and minimize the cost. Finally, for the simulation the JADE (Java Agent Development Framework) platform is proposed to implement the approach and analyze the results.

Keywords:

Multi-agent architecture, prediction, neural propagation(BP), particle swarm optimization (PSO), BP-PSO

ID 280

network(NN),back-

Session: Multi-Agent Systems and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

129

2014 Second World Conference on Complex Systems (WCCS)

Extending NetLogo with Interval Type-2 Fuzzy Inference Systems Manuel Castañón–Puga1, Josue Miguel Flores–Parra2, Carelia Gaxiola– Pacheco3, Luis Enrique Palafox–Maestre4 and Eduardo Ahumada-Tello5 1,2,3,4

Chemistry and Engineering School Universidad Autonoma de Baja California Calzada Universidad 14418, Tijuana, Mexico, 22390 fpuga, mflores31, cgaxiola, [email protected] 5 Acounting and Administration School Universidad Aut´onoma de Baja California Calzada Universidad 14418, Tijuana, M´exico, 22390. [email protected]

Abstract: The use of computational intelligence in a Multi-Agent System (MAS) can aid the process of modelling complex social phenomena. Fuzzy Inference Systems (FIS) have been broadly used in control systems on engineering applications, but this also in Social Simulation could be very useful due the possibility to represent nonlinear systems. In Type-2 Fuzzy Logic, uncertainty was introduced on the model enriching the capability of description in complex decision-making systems. In this paper, we introduce an Interval Type-2 Fuzzy Inference System extension for Netlogo, which is a very used computational modelling tool. With this extension, we aim to implement complex decision making systems in MAS and Social Simulation using Type-2 Fuzzy Logic.

Keywords: Type-2 Fuzzy Inference Systems, NetLogo extension, Perception and uncertainty.

ID 162

Session: Multi-Agent Systems and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

130

2014 Second World Conference on Complex Systems (WCCS)

From Hodgkin Huxley Neurons to Visual Attention Networks in the Brain

Terje Kristensen Department of Computing Bergen University College 5020, Bergen, Norway [email protected]

Abstract: A Multi-Agent System (MAS) has been developed to simulate the Visual Attention Network Model of the brain. Tasks are assigned to the agents according to the Attention Network Theory developed by neuroscientists. A sequential model based on simple objects has been constructed, aiming to show the relations and the workflow between the different visual attention networks. Each agent is being used as an analogy to a different role or function of the visual attention systems in the brain. Some experimental results based on this model have been presented in an earlier paper. In addition, a numerical solution of Hodgkin Huxley equations is presented to describe the behavior of a neuron. The solution is illustrated by a graphical chart interface to finely tune the behavior of the neuron visually. The two approaches are at the moment not integrated. The long term goal is to develop an integrated parallel layered object model of the visual attention process as a tool for simulating neuron interactions described by Hodgkin Huxley‘s equations.

Keywords: Hodgkin Huxley equations; Runge Kutta method; Visual Attention Networks; Multi-Agent System; JADE; Simulation

ID 163

Session: Multi-Agent Systems and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

131

2014 Second World Conference on Complex Systems (WCCS)

An agent-particle on GPU for deterministic convectiondiffusion Cheikhou Oumar KA1, Christophe CAMBIER2, Jean Marie DEMBELE3 and Moussa Lô4 Universit´e Gaston Berger,UFR SAT Saint Louis, BP 234, Senegal [email protected] 2 UMI 209 UMMISCO IRD/UPMC [email protected] 3 Université Gaston Berger,UFR SAT UMI 209 UMMISCO - IRD/UPMC [email protected] 4 Universit´e Gaston Berger,UFR SAT UMI 209 UMMISCO - IRD/UPMC [email protected]

Abstract: This paper proposes an implementation of wellknown convection-diffusion processes that is realized entirely on GPU with CUDA. Indeed, these dynamics are widely observed in biological areas such in displacements of millions of cells specially during aggregations or repulsions movements. This implementation rests on mesh-free method instead of gridbased method. Therefore we used the agent-particle formalism described here and which is based on SPH (Smoothed Particle Hydrodynamics) numerical method and agent-based modelling. To perform convection-diffusion, neighboring search, density computation and velocity and position update are the main stages of computing. While agent level simulations require high degree of computational power to show realistic behaviors, we use the GPU computing to drive large-scale simulation. The results show more increased performance compared to CPU and suggest that GPU is a valuable tool to deal with complex systems simulation such in biology.

Keywords: GPU programming, Agent-based Modelling, Particle systems, Convection-Diffusion

ID 151

Session: Multi-Agent Systems and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

132

2014 Second World Conference on Complex Systems (WCCS)

Vertical Query-Join Benchmark in a Cloud Database Environment Jens Kohler1 and Thomas Specht2 1,2

Institute for Entreprise Computing, Universiyt of Applied Sciences Mannheim, Germany {[email protected]}

Abstract: Nowadays, enterprises across all branches and sectors face a new hype regarding ―Big Data‖. Thus, new requirements in the context of Business Intelligence emerge. Big Data demands to process vast amounts of unstructured data from social networks, sensor data, etc. in near real-time. In order to tackle these challenges, current research works aim to develop new ways of data storage and analysis from a database point of view. This is the advent of so-called ―In-Memory‖ databases (e.g. SAP HANA) that hold the entire data in their fast RAM memory and use hard disks only for logging or archiving purposes. Another promising technology with respect to this topic is ―Cloud Computing‖. Storing and analyzing vast amounts of heterogeneous data require appropriate underlying hardware infrastructures. Obtaining such hardware capabilities form external cloud providers is an auspicious way to avoid expensive investments in new hardware. However, using external hardware resources from the public cloud always means that crucial data has to leave the internal enterprise network and enterprises have to trust external providers. Bringing ―Big Data‖ into the cloud, our approach follows the principle of vertically distributed database tables. The main idea is to divide crucial database data and distribute it across different (public and private) cloud providers. Thus, every provider only gets a small part of the data. These individual small parts are worthless without the other parts, this enables enterprises to meet their compliance rules concerning data security and protection and so Cloud Computing becomes an interesting alternative to store vast amounts of data. This work evaluates our approach from a performance point of view and presents the corresponding query times with and without vertically partitioned data. Keywords: Vertical Partitioning, Vertical Join, Distributed Cloud, Database Performance

ID 28

Session: Cloud computing

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

133

2014 Second World Conference on Complex Systems (WCCS)

MarUnivCloud: Towards a Moroccan inter-University Cloud Mohamed Riduan Abid1, Ismail Fassi Fihri2, Hajar Mousannif3, Mohamed Bakhouya4, Chaker El Amrani5, Mohammed Aissaoui6, Moulay Driss El Ouadghiri7, Abdelkrim Haqiq8, Aawatif Hayar9 and Mohamed Essaaidi10 1,2

Alakhawayn University, Ifrane, Morocco Cadi Ayyad University, Marrakech, Morocco 4 International University in Rabat, Rabat, Morocco 5 AbdelMalek Essadi University, Tangier, Morocco 6 Mohamed I University, Oujda, Morocco 7 Moulay Ismail University, Meknes, Morocco 8 Hassan I University, Settat, Morocco 9 Mundiapolis University, Casablanca, Morocco 10 Mohamed V University, Rabat, Morocco 3

Abstract: Cloud Computing is emerging as a very promising technology changing the way we approach Computing. MarUnivCloud is a project aiming at the promotion of Cloud Computing via the deployment of a real-world private Cloud interconnecting multiple Moroccan Universities. The deployed Cloud will benefit both students and researchers, and can serve as a seed for a futuristic public Cloud. In this paper, we present the goals, and the mission, of MarUnivCloud. We delineate relevant technical aspects (e.g., architecture and services), and present real-world testbed deployments, at two university sites, using open-source software, e.g., OpenStack and OpenNebula.

Keywords: cloud computing, private clouds, real-world testbed deployment, openstack, opennebula

ID 45

Session: Cloud computing 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

134

2014 Second World Conference on Complex Systems (WCCS)

The load balancing based on the estimated finish time of tasks in cloud computing Youssef FAHIM, Elhabib BEN LAHMAR, El houssine LABRIJI, Ahmed EDDAOUI and Sara OUAHABI Hassan II University - Mohammedia – Casablanc a, Faculty of Sciences Ben M'sik Laboratory of Information Technology and Modeling Casablanca Morocco [email protected]

Abstract: The performance parameters are parameters with which we measure and test the profitability and the performances of several static or dynamic load balancing algorithms. The static load balancing algorithms, share the client query between virtual machines in a data center for the processing. But, there is a problem when it comes to the current load of each virtual machine. The dynamic algorithms as "Efficient Response Time Load Balancer" and "Mini time processing load balancer" prove to be a solution to respond to this problem. The advantage of these algorithms, before allocating a task, is that they search in the allocation tables on the virtual machine, with a metric which is quite inferior (be it the response time or the processing time). In this paper, we propose a new improvement of the load balancing by the algorithm « estimated finish time load balancer », that takes into account, the current load of the virtual machine of a data center and the estimation of the processing finish time of a task before any allocation, in order to overcome the problems caused by the static algorithms. The algorithm « estimated finish time load balancer » allows cloud service providers, to improve the performance, availability and maximize the use of virtual machines in their data centers.

Keywords: Load balancing, Data center, Virtual machine, estimated finish time load balancer, Cloud computing.

ID 150

Session: Cloud computing 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

135

2014 Second World Conference on Complex Systems (WCCS)

Automatic control of the quality of service contract by a third party in the Cloud Computing Adil Maarouf1, Abderrahim Marzouk2 and Abdelkrim Haqiq3 1,2,3

Computer, Networks, Mobility and Modeling laboratory, FST, Hassan 1st University, Settat, Morocco 3 e-NGN research group, Africa and Middle East [email protected]

Abstract: One of the challenges of Cloud Computing (CC) is SLA assurance (SLA: Service Level Agreements). Due to the highly dynamic nature of cloud environment, defining the quality of service (QoS) in real-time is crucial to meet SLA specifications of the consumer. In this context, agreements (contract) service level form an appropriate solution to specify these QoS guarantees. It specifies one or more service level objectives (SLO), to guarantee that the QoS delivered satisfies the customer expectations. Monitoring these QoS agreements for the management of the relationships between cloud providers and their services customers is an area that attracts the attention of many researchers and industrialists in the cloud. In our work we introduce the concept of monitoring and respect of the QoS, then we present a third party service provider that ensures the respect of the quality of service in real-time to guarantee the performance and the reliability of the Cloud.

Keywords: Cloud Computing, quality of service contract, Service Level Agreements, Third Party Cloud service Provider, real-time verification

ID 295

Session: Cloud computing

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

136

2014 Second World Conference on Complex Systems (WCCS)

MUltimicrophone Source LOcalization Data base (MUSLOD) H. MERAOUBI1 and B. BOUDRAA2 1

Department of System and Multimedia Architecture, Centre for Development of Advanced Technologies CDTA BP. 17 Cité 20 Août 1956, Baba Hassen, 16303, Alger, Algérie [email protected] 2 Faculty of Electronic and Informatics, University of Sciences and Technology Houari Boumediene USTHB BP. 32 El Alia, Bab Ezzouar, 16111, Alger, Algérie [email protected]

Abstract: The MUSLOD (MUltimicrophone Source LOcalisation Data base) data base presented in this document is the result of work carried out in the center of development of advanced technologies in collaboration with the laboratory of « communication parlée» at USTHB. The database thus obtained contains 63,360 seconds (18 hours). Inspired from existing databases of specialized community, we propose a platform for sound acquisition using four microphones in order to develop a database called MUSLOD. It will be used for localization of sound sources in reverberant environments. We present the experimental device used for the development of basic MUSLOD data and place of registration and the terms of implementation. It consists of actual data desktop environment from a network of linear microphones. For this, we use different values of sampling and different intermicrophone distances frequencies, location data are presented for different emission angles of the sound source. The database is divided into two broad categories registration: The first category contains records acquired but denoised by a method of spectral subtraction. The second category contains rough recordings. The sampling frequencies used are 8, 16, 44.1 , and 64 KHz.

Keywords: source; localization; data base; microphone array;

ID 23

Session: Information and Communication Technologies for Services modeling, Services composition and Services management 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

137

2014 Second World Conference on Complex Systems (WCCS)

A (max - plus)-based approach for charging management of electric vehicles Azizbek Ruzmetov1, Ahmed Nait-Sidi-Moh2and Jaafar Gaber3 1,3

University of Technology of Belfort-Montbéliard Laboratory of Systems and Transport-IRTES Belfort, France {azizbek.ruzmetov; gaber}@utbm.fr 2 University of Picardie Jules Verne-INSSET Laboratory of Innovative Technologies Saint - Quentin, France [email protected] Abstract: The management of electric vehicles charging and adequate assignment to charging stations are the major challenges facing managers of EV fleet. These issues required then to be optimized considering all functioning constraints and real situation of the charging process. Therefore development of a faithful model to the context integrating all entities of the process while considering the interaction of these entities is required. In this paper we propose a (max-plus) based approach to represent a sequence of events and states of the charging process involving the principal entities. Three main components of the system will be represented: EV as a discrete entity, charging stations as energy providers and an integrated platform that ensures the synergy between the two mentioned entities. Each entity is modeled and the occurrence date of each event will be evaluated. A predictive charging approach is proposed to anticipate and improve the provided service to drivers and to suggest the adequate charging station according to their characteristics. Keywords: — Electric vehicles, Charging process, Modeling and evaluation, Prediction, (Max – plus) algebra, Timed Event Graphs.

ID 132

Session: Information and Communication Technologies for Services modeling, Services composition and Services management 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

138

2014 Second World Conference on Complex Systems (WCCS)

On managing evolution of configurable services based on configurable processes

Hanae Sbai, Mounia Fredj, Boutaina Chakir and Laïla Kjiri AlQualsadi research team on Enterprise Architecture Ecole Nationale Supérieure d‟Informatique et d‟Analyse des Systèmes, ENSIAS Mohammed V-Souissi University Rabat (10000), Morocco [email protected]

Abstract: Today, SOA is the most dominant and broadly adopted architecture style by enterprises. It defines how to use services to achieve business goals, and allows interoperability with multiple customers within different business domains.The growing use of SOA has increased research interest on how to improve the reuse of services. Hence, managing services variability was introduced by many approaches as a new leading edge concept for improving reuse. Indeed, variability refers to the characteristic of a system to adapt, specialize and configure itself with the context of use. Several proposals have been made in this respect. However, none of these seem to deal with the evolution of these configurable services. In service oriented systems, the evolution of services is usually introduced by the evolution of the associated business process. Therefore, if a configurable process model (CPM for short) should evolve in reaction to changing business needs, the associated configurable services (CS for short) are also impacted by this change. In our previous work, we proposed a complete methodology for managing evolution in configurable process models. In this paper, we extend our proposed approach to develop an evolution process for managing the changes of configurable services (variable services) caused by changing the associated configurable process model.

Keywords: — configurable service; evolution; configurable process model; variability

ID 246

Session: Information and Communication Technologies for Services modeling, Services composition and Services management

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

139

2014 Second World Conference on Complex Systems (WCCS)

Hybridization of best acoustic cues for detecting persons with Parkinson's disease

Achraf BENBA, Abdelilah JILBAB and Ahmed HAMMOUCH Laboratoire de Recherche en Génie Electrique, Ecole Normale Supérieure de l‟Enseignement Technique, Mohammed V Souissi University,Rabat, Morocco [email protected]

Abstract: Parkinson's disease (PD) is a degenerative disorder of unknown etiology. It causes vocal impairment in approximately 90% of patients. In order to improve the assessment of speech disorders in patients with Parkinson's disease, and because objective acoustic analysis methods do not always yield correct diagnosis, we present in this paper a method of hybridization of acoustic parameters that gives improved diagnosis results according to pathological thresholds defined by the MultiDimensional Voice Program (MDVP). Extracted acoustic features were fed into knearest neighbor (k-NN) and support vector machines (SVM), which were trained to classify the voice as pathological or normal. In this work, we collected a variety of voice samples which includes sustained vowel /a/ phonation from a set of 20 individuals, 14 (7 female, 7 male) with Parkinson‘s and six healthy individuals (2 female, 4 male). The best classification accuracy achieved was 95%.

Keywords: Parkinson‘s disease (PD), acoustic features, speech analysis, MDVP, PRAAT, Hybridization, Support Vector Machine (SVM), k-nearest neighbor (KNN).

ID: 13

Session ; Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

140

2014 Second World Conference on Complex Systems (WCCS)

Computer-Aided Breast Cancer Detection Using Mammograms: A Review Nadia El Atlas, Mohammed El Aroussi and Mohammed Wahbi Electrical Engineering Department LaGeS-EHTP Casablanca, Morocco [email protected]

Abstract:

Breast cancer is the second most common cancer in the world and it is more prevalent in the female population. Since the cause of the disease remains unknown, early detection and diagnosis is the optimal solution to prevent tumor progression, to allow a successful medical intervention, to save lives and to reduce cost. Mammography is an x-ray exam of the breasts performed in the absence of symptoms. It can detect very small tumors, even before they become tangible or they manifest other symptoms. Conducted as part of a screening program, mammography is currently the recommended method for early detection of breast cancer for 50 to 70 years old women. It can detect very small tumors that generally have not yet formed metastases, which increases the chances of survival and recovery. Mammographic screening has been shown to be effective in reducing breast cancer mortality rates: screening programs have reduced mortality rates by 30–70%. Mammograms are difficult to interpret, especially in the screening context. The sensitivity of screening mammography is affected by image quality and the radiologist‘s level of expertise. Computer-aided diagnosis (CAD) technology can improve the performance of radiologists, by increasing sensitivity to rates comparable to those obtained by double reading, in a cost-effective manner. This paper presents an overview of digital image processing and pattern analysis techniques to address several areas in CAD of breast cancer, including the four stages of CAD system: image preprocessing, image segmentation, features extraction and image classification.

Keywords: - Breast cancer, computer-aided diagnosis (CAD), digital ammography, classifiers, features extraction, segmentation.

ID 74

Session: Image, Signal Processing and Biomedical Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

141

2014 Second World Conference on Complex Systems (WCCS)

A robust comparative study of five brain extraction algorithms SANDABAD Sara1, BARA Samir2, HAMMOUCH Ahmed3 and CHERRADI Bouchaib4 1,2,3

Laboratory LRGE, ENSET, Mohamed V-Souissi University Rabat, Morocco [email protected] 4 Laboratory SSDIA, ENSET, Hassan II - University Mohammedia, Morocco

Abstract: The segmentation of the brain is one of the preprocessing steps performed neuroimaging laboratories, and many brain extraction algorithms (BEA) have been developed to meet this need and to make it automatic to cope with the huge number of MRI must be treated every day. In this paper we propose a comparative study of famous different algorithms of brain extraction most popular and recent methods proposed, namely BSE (Brain Surface Extractor), BET (Brain Extraction Tool), SPM2 (Statistical Parametric Mapping v2), McStrip (Minneapolis Consensus Strip) and the new method TMBE (Threshold Morphologic Brain Extraction). This will be validated by comparison of synthetic and real MRI using different criteria for evaluation. This comparison may then play the role of a guide for future researchers…

Keywords: - Extraction algorithms; Brain; McStrip; TMBE; BSE; BET; SPM2; MRI.

ID 54

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

142

2014 Second World Conference on Complex Systems (WCCS)

A New Simple and Efficient Technique for ECG Compression Based on Leads Converter and DWT Coefficients Thresholding Mustapha El hanine1, Elhassane Abdelmounim2, Rachid Haddadi3 and Abdelaziz Belaguid4 1,2,3,4

LASTI Faculty of Science and Technology, University of Hassan I 26000, Settat, Morocco 5 LP Faculty of Medicine and Pharmacology, University of Mohammed V-Souissi 10000, Rabat, Morocco [email protected]

Abstract:

In this paper, a new scheme for ElectroCardioGram (ECG) signal compression is proposed. The idea behind this efficient scheme is simple. Primary, the redundancies between the six leads represented in frontal plane (DI to aVF) was exploited to perform only 2 leads using a converting method; in this step, the scheme provided a near lossless Compression Ratio (CR) up to 3:1. Secondly, to increase the CR, we have used the recent powerful Discrete Wavelet Transform (DWT) signal processing combined to its thresholded coefficients and Adaptive Decimal to Binary Converter (ADBC). Experiments are carried out on the selected records from the PTB Arrhythmia Database and obtained an average Percent Root mean squared Difference (PRD) as around 0.59% to 16.38% for an average CR of 4.96:1 to 130.34:1 respectively. The results indicate that this technique can be applied without altering a real morphology ECG signals and it applies to all types of ECG signals, whether normal or presenting arrhythmias.

Keywords:

Compression; ECG; DWT; PRD; CR; Leads Converter; Adaptive Decimal to Binary Converter.

ID 192

Session: Image, Signal Processing and Biomedical Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

143

2014 Second World Conference on Complex Systems (WCCS)

An enhanced method of lossless ECG data compression using ASCII character encoding O. EL B‘CHARRI, R. LATIF, A. DLIOU, A. ABENAOU and H. JAKJOUD ESSI, National School of Applied Sciences Ibn Zohr University Agadir, Morocco [email protected]

Abstract: Cardiac arrest is quoted as the major contributor to sudden and unexpected death around the globe. For detection and identification of cardiac problems, the electrocardiogram (ECG), which represents electrical activity of the heart, has to be continuously monitored typically over 24-h period. As a result, the produced ECG recording amounts to huge data sizes. In this paper, a new ECG data compression algorithm for real-time applications is proposed. The whole algorithm is written in Cplatform. The algorithm is tested on various ECG data taken from PTB Diagnostic ECG Database. The compression scheme is such that the compressed file contains only ASCII characters. It is observed that the compression module gives a high compression ratio (CR = 18.48). The data reconstruction algorithm has also been developed using the reversed logic and it is seen that the difference between original and reconstructed ECG signal is almost negligible which leads to an excellent Quality Score.

Keywords: ECG; lossless compression; ASCII character encoding;

ID 274

Session: Image, Signal Processing and Biomedical Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

144

2014 Second World Conference on Complex Systems (WCCS)

An FPGA-Based Implementation of a Pre-Processing Stage for ECG Signal Analysis Using DWT EL Mimouni El Hassan and Mohammed Karim University Sidi Mohammed Ben Abdellah, Fès, Morocco [email protected]

Abstract: This paper falls within the scope of implementation of Digital Signal Processing (DSP) algorithms in the state of the art Field Programmable Gate Array (FPGA); so, it presents an FPGA-based embedded system design and its evaluation for a pre-processing stage of ECG signal analysis; such a design uses the Discrete Wavelet Transform (DWT) approach. Thus, the system deals mainly with the baseline wander (BLW) removal and the QRS detection. As the DWT-based implementation requires important hardware resources, our system is designed, in a spirit of optimization, to fit in low-cost and low-power FPGA device for portable medical equipment. It is developed with the Xilinx design tool, System Generator for DSP which is a plug-in to Simulink. This hardware design is tested with ECG data records from the MIT-BIH Arrhythmia database. By a careful visual examination of the simulation results, we report that the whole design provides a good response especially for the part of BLW suppression; moreover, only this part concerning the BLW is tested with a JTAG Hardware co-simulation in the available board at the time of experimentation, that is the Nexys 3 board of Digilent featuring Xilinx SPARTAN 6 XC6SLX16.

Keywords: Baseline wander; DSP; DWT; ECG; FPGA; QRS detection.

ID 238

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

145

2014 Second World Conference on Complex Systems (WCCS)

Content-Based Color Image Retrieval based on the 2-D Histogram and Statistical Moments ELASNAOUI Khalid, AKSASSE Brahim and OUANAN Mohammed Moulay Ismail University Faculty of Sciences and Techniques Department of Computer Science ASIA Team BP 509 Boutalamine 52000, Errachidia, Morocco [email protected]

Abstract: In this paper, we are interested in the problem of finding similar images in a large database. For this purpose we propose a new algorithm based on a combination of the 2-D histogram intersection in the HSV space and statistical moments. The proposed histogram is based on a 3x3 window and not only on the intensity of the pixel. This approach can overcome the drawback of the conventional 1-D histogram which is ignoring the spatial distribution of pixels in the image, while the statistical moments are used to escape the effects of the discretisation of the color space which is intrinsic to the use of histograms. We compare the performance of our new algorithm to various methods of the state of the art and we show that it has several advantages. It is fast, consumes little memory and requires no learning. To validate our results, we apply this algorithm to search for similar images in different image databases.

Keywords:

2-D histogram, Statistical moments, Indexing, Similarity distance, Histograms intersection.

ID 47

Session: Image, Signal Processing and Biomedical Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

146

2014 Second World Conference on Complex Systems (WCCS)

A Survey on Fundamental Concepts and Practical Challenges of Hyperspectral images Hasna NHAILA1, Elkebir SAGHROUNI2 and Ahmed HAMMOUCH3 LRGE, ENSET, Mohammed V – Souissi University Rabat, Morocco [email protected] 2 LRIT, FSR, Mohammed V – Agdal University Rabat, Morocco

1,3

Abstract:

The remote sensing provides a synoptic view of land by detecting the energy reflected from Earth‘s surface. The Hyperspectral images (HSI) use perfect sensors that extract more than a hundred of images, with more detailed information than using traditional Multispectral data. In this paper, we aim to study this aspect of communication in the case of passive reception. First, a brief overview of acquisition process and treatment of Hyperspectral images is provided. Then, we explain representation spaces and the various analysis methods of these images. Furthermore, the factors influencing this analysis are investigated and some applications, in this area, are presented. Finally, we explain the relationship between Hyperspectral images and Datamining and we outline the open issues related to this area. So we consider the case study: HSI AVIRIS 92AV3C. This study serves as map of route for integrating classification methods in the higher dimensionality data.

Keywords: Component: Hyperspectral images, Passive Sensing, Classification, Data minnig.

ID 65

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

147

2014 Second World Conference on Complex Systems (WCCS)

Video shot boundary detection method using histogram differences and local image descriptor Bendraou Youssef1, Essannouni Fedwa2, Aboutajdine Driss3 and Salam Ahmed4 1,3

Faculty of Sciences, GSCM-LRIT Laboratry Associate Unit to CNRST (URAC 29), University Mohamed V-Agdal Rabat B.P. 1014, Morocco [email protected] 1,4 University of Lille North of France, ULCO LMPA, BP 699, 62228 Calais, Cedex, France [email protected]

Abstract: Video shot boundary detection is a fundamental component in automatic video indexing, archiving and editing. Different techniques have been developed in the past with reliable performances in the video processing, especially for the key frame extraction and video summarization. In this paper, we propose a new method for video cut detection in two steps. First, we calculate the histogram differences between each two consecutive frames. Afterwards, we define a thresholding selection that give a set of images candidates for which we adapt the surf algorithm to eliminate false detections. Experimental results are presented to illustrate the good performance of the proposed method with a pourcentage of 100% for the recall criterion.

Keywords: Video shot boundary detection, Histogram differences, SURF algorithm.

ID 114

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

148

2014 Second World Conference on Complex Systems (WCCS)

Fast Stereo Matching for Advanced Driver Assistance Systems Mohamed El Ansari1, Stéphane Mousset2, Abdelaziz Bensrhair3 and George Bebis4 1

LabSIV, Department of Computer Science, Faculty of Science, University of Ibn Zohr, 80000 Agadir, Morocco. [email protected] 2,3 LITIS EA 4108, INSA de Rouen, Avenue de l'Université, BP 8, 76801 Saint-Etienne-du-Rouvray Cedex, France 4 CVL Lab., Department of Computer Science and Engineering, University of Nevada, Reno, NV 89557, USA

Abstract: In this paper, we present a new fast method for matching stereo images acquired by a stereo sensor embedded in a moving vehicle. The method consists in exploiting the matching results obtained in one stereo pair (frame) for computing the disparity map of the following stereo pair. This can be achieved by finding a temporal relation-ship, which we named association, between consecutive frames. The disparity range of the current frame is deduced from the disparity map of the preceding frame and the association between the two frames. Dynamic programming technique is considered for matching the image features. The proposed approach is tested on virtual and real stereo image sequences and the results are satisfactory.

Keywords: stereo sensor embedded, matching the image features, virtual and real stereo image sequences.

ID 350

Session: Image, Signal Processing and Biomedical Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

149

2014 Second World Conference on Complex Systems (WCCS)

A New Shape Descriptor 2D for Content Bsesd Image Retrieval H. Silkan, A.Tmiri, S. E. Ouatik and A.Lachkar EMMID, Equipe Modélisation Mathématique et Informatique Décisionnelle, El Jadida LMATIC, Laboratoire Mathématiques Appliquées et Technologies de l‟Information et Communication LIM, laboratoire d'Informatique et Modélisation, Fès L.S.I.S, Laboratoire des Sciences de l‟Information et Systèmes, ENSA, Fès [email protected], [email protected], [email protected], [email protected]

Abstract: Content-Based Image Retrieval (CBIR) systems have been developed to support the image retrieval based on image properties, such as color, shape and texture. In this paper, we are concerned with shape-based image retrieval. In this context, we propose a new descriptor invariant to common geometrical transformations and robust to noise to describe shapes, it is an extension of the descriptor of Berretti and al., it is based on the curvature zero-crossing points from a Gaussian smoothed boundary to obtain primitives, called tokens. We propose to describe each token by its inverse of the curvature corresponding to the radius of osculating circle, its orientation and its normalized surface. Several experiments were conducted on the widely used MPEG-7 database. The performance was measured in terms of recall and precision. The obtained results show the promising performance of our method and its superiority over descriptor proposed by Berreti and al.

Keywords: Multi scale analysis, Shape similarity, Image database retrieval.

ID 179

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

150

2014 Second World Conference on Complex Systems (WCCS)

Quality of GRAPPA Reconstruction in Parallel Imaging Iles Amel and Bessaid abdelhafid Laboratory of Biomedical engineering, Department of Electrical and Electronics engineering. Tlemcen University, 13000, Algeria [email protected]

Abstract: In clinical routines nearly all MRI methods can be achieved by parallel MRI to increase scan speed. GRAPPA (GeneRalized Autocalibrating Partially Parallel Acquisitions) is one of the parallel imaging methods that are known to be robust in practice. The principal convenient is when the acceleration factors increase, GRAPPA reconstruction can suffer from a high level of noise and aliasing artifacts even with a large number of auto-calibration signals. Inspired by the conventional GRAPPA reconstruction, we propose an accurate solution for this reconstruction. An algorithm is illustrated to compare GRAPPA reconstructions performances with limited receiver channels from uniform Cartesian and randomly under-sampled k-space. So, the signalto-noise ratio (SNR), and normalized mean squared error (NMSE) parameters are discussed to quantify the quality of reconstruction.

Keywords: Parallel MRI; GRAPPA; uniform undersampling; random undersamplig; SNR; NMSE.

ID 180

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

151

2014 Second World Conference on Complex Systems (WCCS)

A Cuckoo Search Algorithm for Fingerprint Image Contrast Enhancement Amira Bouaziz 1, Amer Draa2 and Salim Chikhi3 1,3

Misc Laboratory University of Constantine Constantine, Algeria [email protected] 2

Abstract: The quality of fingerprint images strongly affects any fingerprint biometric system. In order to deal with low quality fingerprint images and overcome the limits of traditional enhancement techniques, a cuckoo-search based algorithm for fingerprint image contrast enhancement is proposed in this paper. The algorithm combines the use of cuckoo search for both the gray level mapping technique for contrast enhancement, and a new objective function as a quality metric for global fingerprint image enhancement. The enhancement scheme is assessed on low quality images from a reference database, the FVC 2000. The obtained results show that the proposed cuckoo algorithm can qualitatively and quantitatively enhance fingerprint images, on the general level of both noise eradication and quality metrics. In addition, the proposed algorithm can visually and numerically clarify the fingerprints ridge structure, thus, the minutiae detection process in comparison with the use of a traditional enhancer. Hence, the proposed algorithm has proven to be very efficient for fingerprint image quality enhancement for easy further processing.

Keywords:

component; fingerprint recognition; fingerprint image contrast enhancement; cuckoo search; gray level mapping.

ID 239

Session: Image, Signal Processing and Biomedical Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

152

2014 Second World Conference on Complex Systems (WCCS)

Zernike moments and Histogram oriented gradient descriptors for face recognition from video sequence Fatma Zohra CHELALI and Amar DJERADI Speech communication and signal processing Laboratory, Faculty of electronics and computer science (of Affiliation): University of science and technology Houari Boumedienne USTHB.Box N°32, 16111, Algiers, ALGERIA [email protected]

Abstract:

The aim of our work is to investigate the use of two powerful feature descriptor known as Zernike moments and histogram oriented gradient (HOG) for facial images extracted from a video sequence uttered ten times by four speakers where MLP neural network classifier is used to identify the correct speaker. We‘ve demonstrated good recognition rate obtained for both Zernike moments and HOG descriptors.

Keywords: component; face recognition;zernike oments;HOG;MLP.

ID 77

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

153

2014 Second World Conference on Complex Systems (WCCS)

Algorithm for Moving Object Detection and Tracking in Video Sequence Using Color Feature Hamd Ait Abdelali, Fedwa Essannouni, Leila Essannouni and Driss Aboutajdine Faculty of Sciences Rabat GSCM-LRIT Laboratry Associate Unit to CNRST (URAC 29) Mohammed V-Agdal - University Rabat Email: {[email protected], [email protected], [email protected], [email protected]}

Abstract: In this paper we present an algorithm research on moving object detection and tracking in video sequence using color feature. In this algorithm we combine between the probability product kernels as a similarity measure, and theintegral image to compute the histograms of all possible target regions of object tracking in data sequence. The objective of this algorithm is to associate target object in consecutive video frames. The association can be especially difficult when the objects are moving fast relative to the frame rate. Another situation that increases the complexity of the problem is when the tracked object changes orientation over time. For these situations the proposed algorithm is used to improve the tracking accuracy and decrease the tracking failures in the video tracking process, and usually employ a motion model which describes how the image of the target might change for different possible motions of the object..

Keywords:

Object Tracking; Computer Vision; Probability Product Kernels; Histogram-Based; Integral Image;

ID 81

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

154

2014 Second World Conference on Complex Systems (WCCS)

Efficient Fetal Heart Rate Extraction Using Undecimated Wavelet Transform Khalifa Elmansouri1, Rachid Latif2 and Fade Maoulainine3 1,2

Signals System and Computer Sciences Group (ESSI) National School of Applied Sciences, Ibn Zohr University, Agadir, Morocco [email protected] 3 Team of Child, Health and Development, CHU Faculty of Medicine,Cadi Ayyad University Marrakech, Morocco Abstract: Fetal Heart Rate (FHR) is a very important information because it contains potentially precise informations that could assist clinicians to making more appropriate decisions. In this work a novel method is presented to estimate the FHR of the fetus cardiac activity using one composite abdominal ECG recording. The abdominal ECG is considered to be composite, as it contains both the mother‘s signal and the ECG signals of fetus. No accessory preprocessing step for noise filtering is required. The method is based on the translation-invariant property of the Undecimated Wavelet Transform (UWT); and it is advantageous since it is based on the analysis of one abdominal lead, in contrast to other proposed methods which need a large number of abdominal ECG recordings. Keywords: FHR; FECG; UWT; Peak detection;

ID 59

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

155

2014 Second World Conference on Complex Systems (WCCS)

Key Frame Extraction using Faber-Shauder Wavelet A. Azeroual , K. Afdel, M. El Hajji and H. Douzi dept. Computer Science and Mathematics Faculty of Science Agadir, Morocco [email protected]

Abstract: Key frame extraction methods select the most representative frames of a video, which can be used in different areas of video processing such as video retrieval, video summary, and video indexing. In this paper we present a novel approach for extracting key frames from video sequences. The frame is characterized uniquely by his contours which are represented by the dominant blocks. These dominant blocks are located on the contours and its near textures. When the video frames have a noticeable changement, its dominant blocks changed, then we can extracte a key frame. The dominant blocks of every frame is computed, and then feature vectors are extracted from the dominant blocks image of each frame and arranged in a feature matrix. Singular Value Decomposition is used to calculate sliding windows ranks of those matrices. Finally the computed ranks are traced and then we are able to extract key frames of a video. Experimental results show that the proposed approach is robust against a large range of digital effects used during shot transition.

Keywords: Key Frame Extraction; FSDWT; Singulat Value Decomposition

ID 317

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

156

2014 Second World Conference on Complex Systems (WCCS)

Pre-Processing the Cover Image before Embedding Improves the Watermark Detection Rate Rabia Riad1, Frédéric Ros2, Rachid Harba3, Hassan Douzi4 and Mohamed El hajji5 1,4,5

RF-SIC Laboratory, Ibn Zohr University, BP 8106 - Cité Dakhla, 80000 Agadir, Morocco 1,2,3 PRISME Laboratory, University of Orléans, 12 Rue de Blois, 45067 Orleans, France

Abstract: Watermark robustness against both geometric and signal processing attacks is still challenging in the watermarking community. In this work, we propose an approach to increase the watermark detection rate. The novel feature of the method resides in pre-processing the image before the embedding process, and involves no interaction with other improvements. It is based on the following idea: given the same watermarking scheme, some images are naturally more appropriate for the embedding process as they obtain better detection rates than others. In the Fourier scheme for example, it was observed that lower amplitude variations at Fourier coefficients correspond to a better detection rate. We theoretically justify these findings and demonstrate that by applying a dedicated low-pass filtering on the magnitude of the frequency bands the watermark detection rate is significantly improved.

Keywords: image, watermarking, DFT, pre-processing, counter attacks.

ID 315

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

157

2014 Second World Conference on Complex Systems (WCCS)

An Improved Rao-Blackwellized Particle Filter BasedSLAM Running on an OMAP Embedded Architecture Mohamed Abouzahir1, Abdelhafid Elouardi2, Samir Bouaziz3, Rachid Latif4 and Tajer Abdelouahed5 Institut d‟Electronique Fondamentale Université Paris-Sud CNRS 8622, 91405, Orsay, France 4 Equipe Signaux-Systèmes et Informatique, ENSA Agadir 5 Laboratoire de Génie Electrique et Commande des Systèmes ENSA Marrakech 1,2,3

Abstract:

A monocular SLAM system uses a single-camera trying to solve the problem of simultaneous localization and mapping. The FastSLAM2.0 employs a Rao-Blackwellized particle filter to estimate the robot pose based on a set of hypotheses that represent the diffrent possible trajectories, while mapping a large number of landmarks. The most common problem related with such a system is the initialization of the landmarks. The monocular camera is a bearing only sensor and can not provide the depth of the observed feature. A lot of methods was developed for an efficient estimation of the depth of the landmarks. The unified inverse depth paramtrization allows an efficient and undelayed initialization of landmarks. This work present a full monocular SLAM system based on the FastSLAM2.0 algorithm. The algorithm is tested on a real dataset, optimized and then implemented on a low cost embedded architecture.

Keywords: FastSLAM2.0, Undelayed initialization, Parallel implementation, Embedded Systems.

ID 85

Session: Embedded and Real-time Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

158

2014 Second World Conference on Complex Systems (WCCS)

Embedded Control of robot arm driving by Brushless DC motor on FPGA Lilia Zouari, Mossaad Ben Ayed and Mohamed Abid Laboratory on Computer and Embedded Systems(CES), Department of Electrical Engineering,National School of Engineering of Sfax, Tunisia, Sfax University [email protected]

Abstract:

Robot manipulators are widely used in industries. The raised complexity of robot manipulators dynamics considering actuator part makes control strategies hard to design and verify. In fact, the design and the verification of the control strategies have achieved a special attention via Matlab Simulink environment tool. However, the high time simulation is an essential drawback of this tool due to the complexity of robotic system. This paper proposes a Hardware Software In the Loop (HSIL) technique via FPGA board of the Brushless DC Motor (BDCM)-inverter association control for robot with two degrees of freedom. This later has shown its rapidity, high performances and low cost which represent a big challenge for power electronics systems especially in the robotic field.

Keywords: Robot arm, HSIL, BDCM, Control.

ID 53

Session: Embedded and Real-time Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

159

2014 Second World Conference on Complex Systems (WCCS)

Modeling and simulation with ISSPT approach of multiprocessor systems MPSoC by SystemC/TLM2 Abdelhakim ALALI, Ismail ASSAYAD and Mohamed SADIK Ecole Nationale Supérieure d‟Electricité et de Mécanique, RTSE team Route D'El Jadida, Casablanca, Morocco [email protected], [email protected], [email protected]

Abstract: The current manufacturing technology allows the integration of a complex ultiprocessor system on one piece of silicon (MPSoC for Multiprocessor System-onChip). This increasing complexity is requiring communication infrastructures that will efficiently accommodate the communication needs of integrated computation resources. To complete and refine a previous work already published [1], in this paper, we present a transaction-level modeling cosimulation methodology for modeling, validating and verifying our embedded open architecture platform which is composed of two MicroBlazes, RAM memory, VGA controller, interruption controller and timer. In this work, we integrate a new model in our platform; it is ISSPT that we can explore the arbitration space for achieving low latency communication. For this, we illustrate an arbiter modelling approach that allows a high performance MPSoC communication. A round-robin method is chosen because it is simple, minimizes the communication latency and has an accepted speed-up. The performance of the proposed approach has been analyzed in our platform MPSoC based on multiMicroblaze.

Keywords: — embedded multiprocessor systems; MPSoC; TLM; SystemC; ISS; CABA; priority management.

ID 234

Session: Embedded and Real-time Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

160

2014 Second World Conference on Complex Systems (WCCS)

Robust Vehicle Detection and Tracking Method for Blind Spot Detection System by using Vision Sensors Seunghwan Baek1, Heungseob Kim2, Kwangsuck Boo3 and Jaeop Jung4 1,2,3

High Safety Vehicle Core Technology Research Center Inje University Gimhae-si, Gyeongsangnam-do, Republic of Korea [email protected] 4 Cheil Electronics Co., Ltd. Gimhae-si, Gyeongsangnam-do, Republic of Korea [email protected]

Abstract: This paper presents a method to detect the present vehicles from side and rear for BSDS(Blind Spot Detection System) with vision system. Because the real image acquired during car driving has a lot of information to exam the target vehicle, background image, and the noises such as lighting and shading, it is hard to extract only the target vehicle for the background image with satisfied robustness. In this paper, the target vehicle is detected by repetitive image processing such as sobel and morphological operations and a Kalman filter is also designed to cancel the background image and prevent the misreading of the target image. Compared to previous researches, the proposed method can get an image processing with much improved speed and robustness. Various experiments were performed on the highway driving situations to evaluate the performance of the proposed algorithm.

Keywords: Blind Spot Detection System (BSDS), Lane Change Assist(LCA), Vehicle Detection, Collision Prevention, Kalman Filter

ID 50

Session: Embedded and Real-time Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

161

2014 Second World Conference on Complex Systems (WCCS)

Platform Simulation Based Unmanned Aircraft Systems Design Rabah LOUALI1, Samir BOUAZIZ2, Abdelhafid ELOUARDI3 and Mohamed ABOUZAHIR4 1

École Militaire Polytechnique BP 17, Bordj El Bahri, Algiers, Algeria. [email protected] 2,3,4 Institut d'Electronique Fondamentale (IEF)University of Paris-Sud Orsay, France

Abstract: Unmanned Aircraft Systems (UAS) know a tremendous interest in many fields thanks to their wide range of applications. UAS are complex ―system of systems‖ because, in addition to stringent safety and embedded constraints, they incorporate heterogeneous interacting sub-systems. Adequate development approaches and tools have to be provided to deal with this complexity. A literature review concerning this perspective shows a lack because current UAS simulation tools focus on limited or isolated development application. We propose a system-level simulation platform for the development of UAS. The proposed platform supports a componentbased design for the UAS where each component is developed using a based-model methodology. A network-oriented architecture and object-oriented conception was adopted to design the platform. This allows the latter to be modular, flexible and integrate many UAS components simultaneously. A Controller Area Network (CAN) data bus is integrated to the platform. It will permit a ―smooth‖ transition from the simulation phase to experimentation phase. To accelerate the platform design, a COTS flight simulator is integrated. This latter implements the dynamic, graphic and environmental model of the aircraft. Keywords: Unmanned Aircraft System; System of Systems; Simulation Platform; System-Level Design; Component-Based Conception; Based-Model Methodology; Network-Oriented Architecture; Object-Oriented Design; Multithread Programming; Controller Area Network (CAN); COTS Flight Simulator.

ID 87

Session: Embedded and Real-time Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

162

2014 Second World Conference on Complex Systems (WCCS)

POSTERS

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

163

2014 Second World Conference on Complex Systems (WCCS)

Acoustic Wave Propagation in Functionally Graded Materials Cylindrically: Polynomial Approach Lahoucine Elmaimouni1, Jean-Etienne Lefebvre2, Faniry Emilson Ratolojanahary3, PM. Rabotovao4, Antoine Raherison5(4), and Tadeusz. Gryba6 ERSITA, Faculté polydisciplinaire d‟Ouarzazate, Univ. Ibn Zohr, BP 638, 45000 Ouarzazate, Morocco [email protected] 2,3,6 Univ Lille Nord de France, F-59000 Lille, France, IEMNDOAE, F-59313 Valenciennes, France and CNRS, UMR 8520, F-59650 Villeneuve d‟Ascq, France. 4,5 LAPAUF, Univ Fianarantsoa, Fianarantsoa, Madagascar 1

Abstract: A new approach is presented to determine the guided waves in hollow FGM cylinders made up of macroscopically inhomogeneous composite materials. The materials properties, elastic coefficients and mass density, are assumed to vary in the direction of the thickness according to a known radial variation law. The equations of motion are solved numerically by expanding each displacement component using Legendre polynomials and trigonometric functions. Dispersion curves of the guided waves for longitudinal, torsional and flexural modes are calculated and presented. Mechanical displacements, normal stresses and power flow distributions are presented for certain specific modes. This approach could be of use in waveguiding engineering, in non-destructive evaluation to predict which modes could be of interest either in non-destructive testing of FGM structures or, by means of a numerical inversion algorithm, to determine through-thickness gradients in material parameters.

Keywords: — Legendre polynomial, Functinally Graded Materials, Normalized frequencies, Field profiles, Anisotropic material

ID 97

Session: Modeling and Control Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

164

2014 Second World Conference on Complex Systems (WCCS)

A Post-Filter for Acoustic Echo Cancellation in Frequency Domain Farid Ykhlef and Hadjer Ykhlef LATSI Laboratory, Department of Electronics, University of Blida, Algeria. [email protected]

Abstract: Most of the traditional acoustic echo cancellation algorithms are based on an adaptive filter in time domain for estimating the echo path response. Other solutions to this problem using adaptive filter in frequency domain were proposed. Impressive performances were obtained in frequency domain compared with time domain, this is due to the flexibility and low computational complexity of frequency domain techniques. In this paper, an acoustic echo canceller using frequency domain adaptive filter is combined with spectral noise suppressor technique. Results indicated that the performances of the combined scheme yielded superiority in the performances than the traditional schemes.

Keywords: Echo cancellation, noise reduction, frequency domain, adaptive algorithm, spectral attenuation.

ID 250

Session: Modeling and Control Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

165

2014 Second World Conference on Complex Systems (WCCS)

Acoustic circumferential waves analysis and Modeling of the Tickness of a Submerged Tube by Fuzzy Logic and the Artificial Neural Network Youssef Nahraoui1, Elhoucein Aassif2 and Gérard Maze3 Laboratoire de Métrologie et Traitement de l‟information, Faculté des sciences, Université Ibn Zohr, Agadir, Maroc 3 Laboratoire Ondes et Milieux Complexes, LOMC UMR CNRS 6294, Normandie Université, 75 rue Bellot, CS 80 540, 76058 Le Havre [email protected]

1,2

Abstract: The Analysis and the characterization of a tube can be done through the cut-off frequencies of the symmetric and the anti-symmetric circumferential waves (Si and Ai, i=1, 2) propagating around the tube of various radius ratio b/a (a: outer radius and b: inner radius). In this work a fuzzy logic system and the artificial neural networks are developed to show that acoustic resonances of a cylindrical shell are related to its physical and geometrical properties. Conversely, starting from the resonances of circumferential waves, Fuzzy Logic (FL) and artificial neural Network (ANN) can characterize material constituting a cylindrical shell the geometry of which is known. These models of Fuzzy logic system (FL) and neural network (ANN) are used to predict the thickness of a tube immersed in water for various cut-frequency of anti-symmetric circumferential wave A1. The useful data to train and to test the performances of these models are determinated from calculated trajectories of natural modes of resonances. During the development of these networks, several configurations are evaluated. The optimal models selected are based on comparison of different error MAE, MRE and SE between the values of thickness of immersed tube predicted by FL and ANN and those desired.

Keywords:

Fuzzy logic; ANFIS; Artificial neural network; Acoustic response; Submerged elastic shell; Scattering waves; Circumferential waves.

ID 10

Session: Modeling and Control Systems 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

166

2014 Second World Conference on Complex Systems (WCCS)

Indirect Adaptive Fuzzy Control Based on the Inverse Identification applied to the asynchronous machine M .Fodil, S. Barkat1 and B. D.Boukhetala2 Faculty of technology, University of M‟sila, Algeria, Email: malikafodil, [email protected] 2 Process Control Laboratory, National Polytechnic, El-Harach, Algeria, [email protected]

1

Abstract: The asynchronous machine currently holds a very important and evergrowing market thanks to its simplicity, robustness and low manufacturing cost. Despite these advantages, his command remains a more complex in comparison to the direct current machine, the use of fuzzy control is an interest having regard to its ability to treat the imprecision and uncertainty. If the variable dynamic systems impose the adjustment of the parameters of the controller and if the base of rules of order is difficult to build, the introduced of the adaptive techniques of control is necessary. Consequently, the combination of the study of adaptivity and uncertainty made it possible to derive the adaptive fuzzy controllers. In this context, several schemas of adaptive fuzzy controller have been proposed, among them the indirect adaptive fuzzy control In the indirect approach, the fuzzy systems are used to estimate the system dynamics and control law is obtained from the estimated. With through the obtained results, indirect adaptive fuzzy control based on the inverse identification has proved a great effectiveness and a strong robustness in the presence of parameter variations and disturbances.

Keywords:

Asynchronous machine, Fuzzy systems, Adaptive control, Fuzzy

adaptive law.

ID 254

Session: Modeling and Control Systems

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

167

2014 Second World Conference on Complex Systems (WCCS)

Complex Systems Overview Nawfal NACIRI and Mohamed TKIOUAT Islamic Financial Engineering Laboratory (IFELab) Studies and Research Laboratory in Applied Mathematics (LERMA) Mohammed V University-Mohammadia School of Engineering Rabat, BP Ibn Sina Avenue, Agdal Maroc [email protected]

Abstract: Complex systems is a relatively young subject area and one that is evolving rapidly, it have many origins in many disciplines. Systems are complex when they are composed of a certain amount of entities (elements or agents) interacting together, generating a self-organization and emergence characteristics of their global behaviors. Under the study of complex systems, a sub domain is detached under the name of ―Complex adaptive system: CAS" that is a set of agents with a certain freedom to adapt or to learn. In this work we presented a survey of complex systems and complex adaptive systems, which describes its histories, its definitions, Characteristics and theories. We cited the different scientific currents that are related to the complexity science between 1940 and 2010 and we presented sciences dealing with complex systems emerging in new areas from 2010 until 2014. We give an annotated bibliography of resources for those that deepen in complex systems.

Keywords: Complex systems theories, complex adaptive systems, self-organization, emergence

ID 343

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

168

2014 Second World Conference on Complex Systems (WCCS)

Systemic Competitiveness EL MADI Lahcen1 and QMICHCHOU Mohammed 2 1

UIZ, FSJES, Agadir [email protected] 2 UIT, FSJES, Kénitra [email protected]

Abstract: Deep, rapid and complex mutations have marked the international economic environment and have modified the modes of production, distribution, commerce and organization of all industries in all countries. In this context, competitiveness has become one of the most dominant issues of the modern economy. It is almost constant in political discourse. In the academic arena, it represents one of the major problems for researchers. It also is one of the most strongly concerns present in the debates of the managers. Competitiveness is not just popular, it is also a controversial concept of economy and there is no consensus on its definition. It is a polysemous concept that can be viewed from different angles, applied to various entities and also the fact that it is a transversal and multidisciplinary notion. It is characterized by its complexity and its dynamic nature. This paper aims to contribute in many ways. The first is to show the structural dimension of the competitiveness. In the second time, it will use a systems approach and a multitude of disciplines to understand its complexity. Finally, to discuss its multi-level and multi-dimensional character.

Keywords: Competitiveness, Systemic, Complexity, Structural approach

ID 349

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

169

2014 Second World Conference on Complex Systems (WCCS)

Khettaras and sustainable development in the oasis of Skoura

Abdeltif Kich and Mohamed Elfaïz Faculty of Arts and Social Sciences – Marrakech [email protected] Abstract: Khettaras are drainage tunnels that carry water from the water table to the soil surface by means of gravity. This traditional irrigation system is adopted for centuries in some Moroccan regions, in particular those established at the edge of the Sahara. This is the case of the Skoura oasis, located 40 kms east of the city of Ouarzazate. The ingenuity of khettaras is that they are adapted to the arid climate and the hostility of the environment. However, several natural and anthropogenic factors have caused the decline and even disappearance of this ancient water heritage, which has led to structural socio-economic changes: bursting of the traditional habitat, renunciation of the spirit of mutual assistance and communion to the benefit of individualism and personal benefit, abandonment of agriculture and the emergence of new behaviors and values. In this work, we try to show how sustainable development of oasis society, like the one studied, is dependent on the sustainability of its adapted hydraulic system. Keywords: Oasis, khettara, aridity, values, sustainable development

ID 346

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

170

2014 Second World Conference on Complex Systems (WCCS)

The critical thought and the complexity of mass media’s discourse

Taoufiq MOUEDDENE Ibn Zohr University, Polydisciplinary Faculty of Ouarzazate [email protected] Abstract: Generally, when we look at the issue of mass media, we are

immediately confronted to a variety of critical texts that gradually become the expression of the good conscience of society. These texts are crossed by a nomenclature that reflects an absolute discomfort and distrust towards any communication in the public space. Manipulation, influence, propaganda and simulacrum. Those words express an ethical concern which aims to free discourse and image from ideological and political impacts and any other sham. Deeply rooted in the sources of the moral life which are not necessarily homogeneous, that concern is not sufficient to approach this complex phenomenon, sprawling, shifting, whose protean discourse overwhelms us daily as a wave that feeds from vulnerability and uncertainties of individuals, more and more isolated. Keywords: consumer society, mass media, complexity, ethic, critical thought.

ID 351

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

171

2014 Second World Conference on Complex Systems (WCCS)

MAPLE: a Modeling contrAct-Aware Product LinE Profile

Maryem Rhanoui and Bouchra El Asri IMS Team, SIME Laboratory ENSIAS, Mohammed V Souissi University Rabat, Morocco Email: [email protected]

Abstract: Software Product Line is a promising paradigm that allows designing and implementing a family of closely related systems taking full advantage of the reuse potential of common requirements. These systems share a set of commonalities and define specific variabilities of each system. However, despite a number of research works, there is still no consensus or standard for modeling contract-aware product lines. As Model-Driven Engineering helps taming the complexity of large-scale and critical systems, the proposed contractual approach is based on the Model Driven Engineering to define a software product line with a high level of abstraction and quality. In this paper, we introduce MAPLE, a novel UML Profile for modeling contract-aware software product lines.

Keywords: Software Product Line; Contract; UML Profile; Model Driven Engineering

ID 111

Session: Software Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

172

2014 Second World Conference on Complex Systems (WCCS)

The DB2EAV API of mapping database to EAV model as solution of data interoperability between Content Management Systems (CMS) Abdelkader RHOUATI, El Hassane ETTIFOURI, Mohammed Ghaouth BELKASMI and Toumi BOUCHENTOUF Systèmes Informatique et Qualité logiciel, ENSAO, Université Mohammed Ist Oujda, Morocc, {[email protected]}

Abstract: Content Management Systems, recognized by the acronym CMS, have evolved lots with development of the internet in the 2000s. Several new versions and systems are created annually. Interoperability between these systems has become a necessity for enterprise using a variety of CMS. It concerns data in general. The solution most used is Web Services. The disadvantage is that we have to develop two components a client and a server. Furthermore those elements are not compatible with another system, and in case version of system or all system change we must redevelop all components. In this paper we present an innovative solution to the problem of data interoperability between CMS. It is an alternative to Web Services with more performance, and a lower cost of maintenance, and compatibility with variety of systems. Our solution is called DB2EAV. DB2EAV is an API of mapping database to Entity-Attribute-Value model. The idea is inspired by the fact that most of the CMS uses the Entity-Attribute-Value model as a conception of their databases. The API DB2EAV provides also the ability to recover data directly from the database of CMS. DB2EAV API is compatible with any type or version of CMS that it implements the Entity-Attribute-Value model.

Keywords: Interoperability; CMS; EAV; Web-Services; DB2EAV; web application; database mapping.

ID 126

Session: Software Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

173

2014 Second World Conference on Complex Systems (WCCS)

Technical calculating pagerank H. Barboucha and M. Nasri LABO MATSI, ESTO, B.P 473, University Mohammed I OUJDA, MAROC. [email protected]

Abstract: Choosing the right keywords is relatively easy, by cons have a high PageRank[1] is more complicated index. Google PageRank is what defines the position in the result pages of search engines (Google of course, but the other engines are now using more or less the same kind of algorithm). It is therefore very important to understand how this type of algorithm to hope appear on the first page of results (only played in 95 % of cases) or at least be among the first . We propose in this paper to clarify the operation of this algorithm by a matrix method and a program enabling JavaScript to experience this type of analysis. It is of course a simplified version, but it can add value to the website and achieve a high ranking in the search results and reach a larger customer base. The interest is to disclose an algorithm to calculate the relevance of each page. This is in fact a mathematical algorithm based on a web graph. This graph is formed of all the web pages that modeled by nodes, and hyperlinks by arcs.

Keywords: algorithm, SEO web, social networks, reputation, SEO, SMO, page rank,backlink, in page, off page. googlebot

ID 215

Session: Software Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

174

2014 Second World Conference on Complex Systems (WCCS)

An Agile Mashup based Composition of Large Scale Product Lines Ikram Dehmouch and Bouchra El Asri IMS Team, SIME Laboratory ENSIAS, Mohammed V Souissi University [email protected]

Abstract: Agility is an emergent trend in current software development. It is more and more required within the end users community. Thus, software techniques need to be as simple and intuitive as possible in order to meet this increasing requirement. This fact has led to the advent of the Mashup concept. In fact, Mashup goes beyond its original motivation which is the web service composition to cover other composition issues such as model composition in Model Driven Engineering. This paper presents an approach that suggests bringing agility to large scale composition of product lines relevant to different domains using the Mashup technique. It aims at composing the feature models throughout the composition of their corresponding DSL at the implementation phase of the composition process.

Keywords: — Dynamic Product Line Engineering; Feature Model; Agile Software Development; Service Oriented Computing; Mashup

ID 241

Session: Software Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

175

2014 Second World Conference on Complex Systems (WCCS)

Combining Model Driven Architecture with eXtreme Programming and Scrum Methodologies Case of mobile learning Karima AISSAOUI and Mostafa AZIZI MATSI LAB, ESTO Mohammed First University Oujda, Maroc {aissaoui.karima, mos.azizi}@gmail.com

Abstract: Agile development is one of the keys of a successful project. It was created in order to make a stronger relationship between customers and developers to increase the success rate of a project and to decrease risks. Other methodologies were proposed for the same goal. Another technology that adds a great value for modeling systems is the Model Driven Architecture (MDA). The application of these methodologies is required in different fields in order to obtain best results. One of these fields is mobile learning which became more interesting with the current revolution of the world of telecommunication. In this paper we suggest merging the practices of eXtreme Programming and Scrum methodologies to different models of MDA in order to benefit from the advantages of these three important approaches while developing a mobile learning system.

Keywords: MDA; XP; Scrum; Mobile learning; Agile; CIM; PIM; PSM.

ID 249

Session: Software Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

176

2014 Second World Conference on Complex Systems (WCCS)

Design Concept and Proposal of Improvement for Predicting a Suitable Software Failure Prediction Model J. Krini and J. Börcsök Department of Computer Architecture and System Programming University of Kassel, Wilhelmshöher Allee 71 – 73, 34121 Kassel, GERMAN

Abstract: These days software reliability plays an enormous role. Year by year the systems become more complex. Consequently, the software becomes more complex and software errors may occur. Therefore it is important to continually improve models of software reliability. Currently, there are more than 100 that exist. Many of them are further developed versions of basic models. These models are normally used project-specific and therefore it cannot be decided beforehand which model is most suitable. This paper tries to develop a con-cept that is able to choose the optimal model. Furthermore, the weight of a non-discovered error that occurs over time is taken into consideration. The longer an error remains undiscovered, the more dangerous it seems to be.

ID 330

Session: Software Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

177

2014 Second World Conference on Complex Systems (WCCS)

Transformation CIM to PIM using different methods for modeling business process: an MDA approach SFA Fatima-Ezahra, Mohamed NEMICHE and Fathellah Ghadi Faculty of Science, Ibn Zohr University Agadir, Morocco

Abstract: The MDA approach "Model Driven Architecture" recommends 3 levels of abstraction and includes a series of transformation from the level to another. In this review, we are interested in passing the CIM level to PIM level, by presenting the three main methods.

Keywords: Model Driven Architecture MDA, CIM, PIM, Intelligence Territorial.

ID 347

Session: Software Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

178

2014 Second World Conference on Complex Systems (WCCS)

Efficiency of Local Parallel Index for Databases System and implementation in Flash Memory

Mohamed CHAKRAOUI, Abderrafiaa EL KALAY and Naoual MOUHNI Laboratory of applied Mathematics and Computer Science, Faculty of Sciences and Techniques Gueliz Cadi Ayyad University, B.P 549, Av.Abdelkarim Elkhattabi, Guéliz Marrakech, Morocco. [email protected]

Abstract: In this paper we propose a model of partitioning a b+tree index in multiprocessor machines for parallel database systems and collaboration between the processors and their implementation in Flash Memory. We distinguish two types of indexing: btree and bitmap, btree itself is divided into several types like b*tree and b+tree. Since the advent of multicore computers (multi processors) parallelism becomes an indispensable part in the optimization. Our work will focus on partitioning a table on 3 parts following indexing key partitioning; each processor will host a partition of the index, and the first processor that will finish its work will immediately take the first partition of the index pending according to the priority. In this paper we also propose a new alterative to optimize the communication between b*tree or b+tree with flash memory software.

Keywords: component- indexing, tuning, flash memory, optimization, b*tree, b+tree, NAND, partitioning, parallel database systems, setting, parallelization.

ID 348

Session: Software Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

179

2014 Second World Conference on Complex Systems (WCCS)

Semantic web service discovery, selection and composition, non-functional properties based approach Ahmed ESSAYAH, Mohamed YOUSSFI, Elhossein ILLOUSSAMEN, Khalifa MANSOURI and Mohammed QBADOU Laboratoire : Signaux, Systèmes Distribués et Intelligence Artificielle (SSDIA), École Normale Supérieure de l‟Enseignement Technique, Université Hassan II, Mohammedia Casablanca, Bd Hassan II, Mohammedia, Maroc. [email protected]

Abstract: This paper suggest an engineering oriented vision of services composition where the composition has its own life cycle and can be reused and adapted to operating contexts. We will present a generic model that summarizes the life cycle of a request for service discovery, selection, composition and execution. This model allows the enrichment of ontology of services by non-functional properties corresponding to the quality of service, user profiles, preferences and security protocols of access to information corresponding to user profiles.

Keywords:

Semantic Web, Web Services, Ontology, web service composition, functional and non-functional properties, Distributed information systems.

ID 94

Session: Software Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

180

2014 Second World Conference on Complex Systems (WCCS)

The Design and Evaluation of a Hierarchical SDN Control Plane Architecture Safae Zerrik1, Driss El Ouadghiri2, Rachid Atay3, Mohamed Bakhouya2 and Jaafar Gaber5 12,3

Faculty of Science of Meknes,Morocco International University of Rabat,Morocco 5 University of Technology Belfort Montbeliard,Belfort, France [email protected] 3

Abstract: Software-defined networking (SDN) is a new networking paradigm which aims to decouple forwarding hardware from control decisions. However, existing SDN architectures are centralized and then cannot meet the requirements of both scalability and adaptability simultaneously. Issues are that SDN architectures must be able to scale, able to adapt to dynamic conditions, must be highly available, secure and should require minimal human configuration and management. Therefore, in order to cope with a dynamically changing environment, new architectures are required and need to be highly flexible. In this paper, a hierarchical SDN control plane architecture is introduced. Design concepts are presented to highlight its operation modes. Simulations have been conducted using Mininet and preliminary results are reported to show the efficiency of this architecture.

Keywords: Software defined networking; Openflow; Scalability and adaptability of SDN architectures; SDN Control Plane.

ID 285 Session: Information and Communication Technologies for Services modeling, Services composition and Services management

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

181

2014 Second World Conference on Complex Systems (WCCS)

Topological navigation for mobile robot in indoor environment using global visual features Nabila Zrira, Younès Raoui, El-Houssine Bouyakhf and Wassima Aitfares LIMIARF, FSR, Mohammed V Agdal University, B.P.1014 RP Rabat, Morocco [email protected]

Abstract: Mapping is essential in the navigation task of autonomous mobile robots. The purpose of this paper is to present a new method for an autonomous exploration of the robot in an indoor environment, as well as the building of topological maps based on global visual attributes. This method takes advantage of the small size of the GIST descriptors, and the ease of their calculation.We use omnidirectional images to build a single global visual descriptor showing an entire room. In order to handle the problem of a loop closure detection, we propose a formula that determines automatically the threshold of a loop closure in an unknown environment.

Keywords: GIST descriptor, topological map, loop closure, omnidirectional images.

ID 292 Session: Information and Communication Technologies for Services modeling, Services composition and Services management

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

182

2014 Second World Conference on Complex Systems (WCCS)

Autonomous Navigation and Visual Tracking for Quadrotor AR.Drone in an Indoor Environment K. Boudjit1 and C. Larbes2 1

Department of Electrical Engineering. University of Science and Technology Houari Boumedienne (U.S.T.H.B). BP N°32 EL ALIA, Algiers, Algeria. 2 National Polytechnic ENP, Algiers. 10Avenue hassen Badi BP182; EL-Harrach Alger 16200 [email protected]

Abstract: This paper presents a new solution for autonomous tracking, which is implemented in a type of low-cost off-the-shedd quadrotor AR.Drone. the autonomous tracking scheme is realized by using the monocular camera onboard with ground control station for off-board image processing. A functional prototype system was developed using a low cost, a laptop base offthe- shelf, four propeller UAV, the AR Drone 2 made by Parrot, controlled from station Robotics Operating System (ROS) connected to the UAV via WiFi. Next to a working system, the main contribution of this paper is a novel, closed-form solution to estimate the absolute scale of the generated visual map from inertial and altitude measurements. In an extensive set of experiments, we demonstrate that our system is able to navigate in previously unknown environments at absolute scale without requiring artificial makers or external sensors.

Keywords: Quadrotor, AR.Drone, UAV, Visualisation, ROS.

ID 4

Session: Information and Communication Technologies for Services modeling, Services composition and Services management

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

183

2014 Second World Conference on Complex Systems (WCCS)

Mechanisms of vertical handover in UMTS and WLAN networks Wafa BENAATOU and Adnane LATIF Cadi Ayyad University National School of Applied Sciences Marrakech, Morocco [email protected]

Abstract: The goal of Vertical Handover is to carry out several accesses in real time in the heterogeneous networks. This makes it possible to a user to use several networks (such as WLAN UMTS, GPRS, IPv4) in parallel, and the system to commutate automatically at another base station, without disconnecting itself, as if there were no cut and with little loss of data as possible. We studied in detail the handover mechanism, before studying the handover initiation techniques in UMTS and WLAN networks, the whole buckled by simulations putting forward the performances of the handover in these two networks.

Keywords: component; UMTS; WLAN; Vertical Handover.

ID 78

Session: Wireless Network, Communications and security 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

184

2014 Second World Conference on Complex Systems (WCCS)

Tongueprint Verification Based on Energy of Bidimensional Intrinsic Mode Functions Salim Lahmiri1 and Mounir Boukadoum2 1

Department of Computer Science. University of Quebec at Montreal, Montreal, Canada [email protected] 2 Department of Computer Science. University of Quebec at Montreal, Montreal, Canada [email protected] Abstract: We present a methodology for tongueprint verification that uses the energies of the first two bidimensional intrinsic mode functions (BIMFs) as discriminative features. The obtained results by a k nearest-neighbour (k-NN), backprropagation neural network (BPNN) trained with Levenberg-Marquardt (LM) algorithm, and support vector machine (SVM) with second order polynomial kernel on a set of twelve tongueprint images indicate accuracies of 100%, 99.23%±0.03 and 99.31%±0.02, respectively. These results outperform previous works cited in the literature. The image processing time was 1.34 s on a midrange PC desktop computer. These features and the relative simplicity of implementation make the described approach an advantageous alternative for biometrics applications. Keywords: Biometrics; tongueprint; bidimensional empirical mode decomposition; kNN; BPNN; SVM; verification

ID 269

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

185

2014 Second World Conference on Complex Systems (WCCS)

Digital Images Watermarking Based on Streerable Pyramid and Optimal Block Mohamed RADOUANE1, Rochdi MESSOUSSI2, Raja TOUAHNI3 and Tarik BOUJIHA4 1,2,3

LASTID Laboratory, Department of physics Faculty of Science, Ibn Tofail University Kenitra, Morocco [email protected] 4 LASTID Laboratory, Department of physics National School of Applied Science Kenitra, Morocco Abstract: Over the last few years, signal processing‘s impact on development of digital media technologies have become a hot topic. The increased of computer network and the growth of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. This problem of intellectual properties is solved by introducing a concept of signal processing that is watermarking. With this new concept, the watermark is not just hiding in a document but it‘s marked indelibly. The document can be of various types: text, image, sound, and video. In this paper we present a robust method of digital images watermarking based on steerable pyramid using optimal block. The proposed method is achieved by searching the optimal block that can be used to insert the watermark in original image with different scales and orientation of steerable pyramid. The experimental results show that this imperceptible method ensures robustness against most attacks.

Keywords: component; Watermarking; steerable pyramid; SVD; Entropy

ID 225

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

186

2014 Second World Conference on Complex Systems (WCCS)

Image sequence segmentation by cooperative agents Abdelkader FEKIR1, Nacera BENAMRANE2 and Hayet Meddeber3 1 Department of informatics, Faculty of Science Univ. of USTOMB, B.P 1505 El „mnaouer 31000 Oran, Algeria [email protected] [email protected] 2,3 Department of informatics, Faculty of Science Univ. of USTOMB, B.P 1505 El mnaouer 31000 Oran, Algeria

Abstract: In this paper, we propose image sequence segmentation based on active contour model and multi-resolution notion. The proposed approach uses three cooperative agents for fast object tracking in image sequence. The first agent decomposes the sequence images into multiple resolutions by a Gaussian pyramid algorithm. The second agent detects the object in the higher levels of the pyramids using active contour model. The last agent projects snake points of low-resolution images into the high-resolution images. It refines the object boundaries in original images of pyramids lower levels. Our approach was tested using two sequence types: echo image and biological image.

Keywords: Object tracking; image sequence; agents; multi-resolution; active contour

ID 271

Session: Image, Signal Processing and Biomedical Engineering 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

187

2014 Second World Conference on Complex Systems (WCCS)

Investigation of the Meteorites Porosity by X-ray Tomography and 3D Image Processing Rabia Riad1, Abderrahman Ibhi2, Hassan Douzi3, Mohamed Elhajji, Olivier Rozenbaum5, Rachid Harba6 and Rachid Jennane7 1,3,4

IRF-SIC Laboratory, 2LPMM Laboratory Ibn Zohr University B.P. 8106, Agadir, Morocco 5 ISTO, 6,7PRISME, Polytech‟Orléans University of Orleans B.P. 6744, Orleans, France

Abstract: In recent years an interest has emerged in the fields of meteoritic sciences such as X-ray Computed Tomography (CT), which is a nondestructive method that produces three-dimensional (3D) images of the internal features of rock specimens. To analyze the characteristics of meteorites, it is critical that the elements constituting can be distinguished. The use of X-ray CT and various 3D image processing techniques can isolate the porosity from the meteorite materials. The porosity is an essential element for the characterization of meteorites. Two samples of achondrite meteorites (Aubrite and Brachinite) with variable alteration and shock histories were examined. The 3D images were acquired with a high resolution CT scanner (Nanotom Phoenix). The isotropic voxel size is 3.6 m. We found that the size and structure of porosity varies with the degree of alteration and shock loading experienced by the materials.

Keywords: 3D images, X-ray CT, Porosity, Meteorites, Shock history.

ID 321

Session: Image, Signal Processing and Biomedical Engineering

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

188

2014 Second World Conference on Complex Systems (WCCS)

An Enhanced Swarm Intelligence Based Training Algorithm for RBF Neural Networks in Function Approximation Mohammed Salem1, Meriem Amina Zingla2 and Mohamed Fayçal Khelfi3 1

Faculty of sciences and technology University of Mascara Mascara, Algeria [email protected] 2 LISI research Laboratory University of Carthage, INSAT Tunis, Tunisia [email protected] 3 Faculty of applied and exact sciences University of Oran Oran, Algeria [email protected]

Abstract: This paper is dedicated to the presentation of enhanced swarm intelligence based training algorithm for Radial basis functions neural networks. The proposed training algorithm (ABC-PP) is hybridization between the Artificial Bees Colony (ABC) and a predator and prey behavior to improve the diversification mechanism of the ABC. Statistical analysis is carried out with nonparametric tests to evaluate the proposed training algorithm comparing it with ABC, GA and PSO based RBF training algorithms in function approximation. The proposed algorithm is applied to identify a real inverted pendulum model giving acceptable results.

Keywords: component; Artificial Bees Colony; predator and prey; RBF neural networks; Training algorithm; Nonparametric tests; Function approximation; Inverted pendulum.

ID 210

Session: Computational Intelligence and Applications 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

189

2014 Second World Conference on Complex Systems (WCCS)

Robust emerged artificial intelligence speed controller for PMSM drive H. RAYD, A. El Janati El Idrissi, N. Zahid and M. Jedra Conception and System laboratory, Department of Physics University Mohamed V Agdal, FSR, Rabat, Morocco [email protected]

Abstract: Artificial intelligence based fusion (AIF) is a new soft optimization method that is based on the emerged science of soft computing (expert system, fuzzy logic, neural Network and genetic algorithm…) with optimal mathematical state equation (Extended Kalman filter…). In this paper we propose two optimized soft to constraint the new controller for PMSM. First, we propose a recurrent neural network controller trained with extended kalman filter results show that is better than backpropagation. Second, we employ GA to solve EKF covariance optimization problems. The approach that we use does not require any additional mathematical model of the dynamical system beyond those that are required for classical automation problems. The constrained hybrid artificial controller algorithm is compared with solutions based on a conventional controller, classical recurrent neural network controller (RNNC) and genetic algorithm (GAC) the simulated results demonstrate that constrained HAIC is more suitable for modern automation.

Keywords: Artificial intelligence; genetic algorithm; neural network; extended kalman filter; permanent magnet synchronous motor.

ID 281

Session: Computational Intelligence and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

190

2014 Second World Conference on Complex Systems (WCCS)

Toward a new multi-agents model for urban traffic management Asmaâ ROUDANE, Sallami CHOUGDALI, Mohamed YOUSSFI, Khalifa MANSOURI and Mohammed QBADOU Lab. SSDIA, ENSET, University Hassan II Mohammedia Casablanca, Bd. HassanII, Mohammedia, 28820 Morocco [email protected]

Abstract: In this paper, we present some existing urban traffic management models, mainly those based on multi-agents systems. These systems are either autonomous systems, which analyze the situation and take appropriate decisions in their own context, or systems that exploit the collective intelligence in order to analyze the traffic to provide necessary information for decision makers so as to pilot the system. After a comparative study of the performance of these models, we propose a new intelligent model of urban traffic control system based on multi-agents systems. We model, thereafter, all the components of the traffic by distributed mobile agents in order to automate the management and the control of signaling systems. This model will contribute to the design of new embedded solutions for real-time control of road traffic, with a view to automate the signaling system allowing users to be directed to the most appropriate and optimal path toward their destinations.

Keywords:

Urban traffic, urban traffic systems, intelligent systems, complex systems, multi-agents systems, decision support systems, autonomous systems, real time.

ID 86

Session: Multi-Agent Systems and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

191

2014 Second World Conference on Complex Systems (WCCS)

A Robust Crew Pairing based on Multi-Agent Markov Decision Processes Oussama AOUN and Abdellatif EL AFIA Operations Research and Logistics Team ENSIAS Mohammed V- Souissi University Rabat, Morocco [email protected]

Abstract: Airline scheduling is a real challenge in the context of the airline industry; this includes a lot of planning and operational decision problems and deals with a large number of interdependent resources. A prominent problem in airline scheduling is crew scheduling, specially pairings or Tour-of-Duty planning problem. The objective is to ensure optimal allocation of crews to flights by specifying the set of pairings that minimize the planned cost. The widely used algorithms assume no disruptions. However, airline operations often undergo stochastic disturbances that have to be taken into account in order to minimize the real operating cost. Recently, great interest has been given to robust crew scheduling with consideration of the stochastic nature of disturbances like technical breakdowns or bad weather conditions. In this paper, we develop a stochastic model of crew pairing problem based on Multiagent Markov Decision Processes (MMDP); thus, the problem will be treated as finding the optimal policy to adopt in stochastic cases of disturbances. Also, a computational study is conducted to ensure validity of our proposed model.

Keywords: Multi-Agent Markov Decision Processes; Crew pairing problem; Stochastic Programming; Flight Disturbances.

ID 257

Session: Multi-Agent Systems and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

192

2014 Second World Conference on Complex Systems (WCCS)

An intelligent MAS-based Architecture for Crisis management Applied to Flood Management Naoual Attou, Dalila Chiadmi and Laila Benhlima Computer Sciences Department, Mohammadia Engineering School, BP 765Mohammed V University Agdal, Rabat, Morocco [email protected],{chiadmi, benhlima}@emi.ac.ma

Abstract: Due to its strategic and critical aspects, crisis management in general and flood management in particular should be based on constantly enhanced and modernized technologies in order to meet its requirements in terms of openness and adaptability to changing circumstances. In this perspective, the current paper presents a work that combines artificial intelligence and personalization to propose a MultiAgent architecture capable of improving communication and collaboration within the crisis cell in charge of proposing an appropriate crisis action plan, perpetuating the expertise accumulated during several crises, adapting the action plan according to new integrated information acquired through sensors, personalizing alarm broadcast, facilitating the participation and involvement of local officials and citizens.

Keywords: intelligent MAS; adaptation; collaboration; m-gov; crisis; flood; citizen; mobility

ID 260

Session: Multi-Agent Systems and Applications

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

193

2014 Second World Conference on Complex Systems (WCCS)

Optimization of an efficient indexing technique for moving objects based on R tree Optimization of 2-level index Sana Chakri Said Raghay and Salah el hadaj Department of Applied Mathematics and Computer Sciences Faculty of Sciences and Technologies, Cadi Ayyad University Marrakech, Morocco [email protected]

Abstract: Technical Indexing of spatial database is discussed in this paper. Several methods of indexing moving objects will be presented taking into account the faults and strengths of each one, the two main types of applications that manage moving objects will be discussed. ―2-level index‖ is one of the recent variant indexing relied on R-tree, thereafter this variant will be presented and located between types of applications, its principle performance will be explained, the main defect which is redundancy of nodes after each update will be shown, and finally our contribution to optimize it will be presented.

Keywords: Moving Objects; spatio-temporal Database; R-tree; 2-level index; indexing Model.

ID 66

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

194

2014 Second World Conference on Complex Systems (WCCS)

A Computational model based on Cooperative Mobile Agents for Big Data image Segmentation Fatéma Zahra Benchara1, Mohamed Youssfi2, Omar Bouattane3, Hassan Ouajji5 and Mohammed Ouadi Bensalah6 1,2,3,4

Laboratory SSDIA, ENSET University Hassan II Mohammedia Casablanca Mohammedia, Morocco [email protected] 5 FSR, University Mohammed V AGDAL Rabat, Morocco [email protected]

Abstract: The aim of this paper is to present interesting results obtained by implementing big data classification algorithm using a cooperative mobile agents model. In this work we focused on the application of this classification for Magnetic Resonance Images (MRI) segmentation which is presented based on parallel fine grained c-means algorithm. This algorithm is converged to distributed classification cmeans algorithm in order to be implemented on a parallel and distributed virtual machine based on mobile agents. The big data MRI image of size (m x n) to be processed is split into small elementary images by the host agent. The obtained list of item images is distributed to mobile agents deployed on each node of the distributed system. Each agent is asked to perform the execution of the c-means algorithm using its assigned image item and return its elementary results to the host agent which computes the current global class centers and newly distributes them. This process is repeated until the convergence of the distributed algorithm. The experimental results show that the distributed classification method can improve the big data segmentation.

Keywords: Image Segmentation, c-means algorithm, mobile agent, distributed classification, multi agent system, Cardiac MRI image.

ID 98

Session: Data mining 978-1-4799-4647-1/14/$31.00 ©2014 IEEE

195

2014 Second World Conference on Complex Systems (WCCS)

An SVM Intelligent System for Pre-anesthetic Examination Mohammed EL Amine LAZOUNI1, Nesma SETTOUTI2, Mostafa El HABIB DAHO3 and Ibrahim KORSO FECIANE4 1,2,3

Biomedical Engineering Laboratory Tlemcen University Algeria 4 Tlemcen University Algeria [email protected]

Abstract: Anesthesia is a branch of medical science generally applied to patients who need surgery or painful acts. Research in this field has brought many changes by decreasing the mortality rate that is why in this work, we propose a computer aided diagnosis system based on Support Vector Machines (SVM) aiming to help doctors in the pre-anesthetic examination. For that, a new database has been obtained with the help of the Doctors Specialized in Anesthesia (DSA). The 1275 patients in this database were selected from different private clinics and hospitals of western Algeria to evaluate our classifier. The medical records collected from patients suffering from a variety of diseases ensure the generalization of the performance of the decision system.The proposed method includes four steps, each of which corresponding to a specific classification based framework. The first one is devoted to an automatic detection of ASA (American Society of Anesthesiologists) scores. In the second step, a decision making process is applied in order to accept or refuse the patient for surgery. The aim of the third step is to choose the best anesthetic technique for the patient, either general or local anesthesia. The final stage examines if the patient's tracheal intubation is easy or hard.We used a majority voting method between the three SVMproposed classifiers for each step in order to insure the best possible results.The classification results obtained by using our system prove the reliability and the coherence of the proposed approach for our database.

Keywords: Doctors Specialized in Anesthesia, Data base, Support Vector Machines, ASA scores, Majority Voting.

ID 191

Session: Data mining

978-1-4799-4647-1/14/$31.00 ©2014 IEEE

196

2014 Second World Conference on Complex Systems (WCCS)

Intelligent System Based Support Vector Regression for Supply Chain Demand Forecasting

Malek Sarhani and Abdellatif El Afia ENSIAS Mohammed V-Souissi University Rabat, Morocco [email protected] Abstract: Supply chain management (SCM) is an emerging field that has commanded attention from different communities. On the one hand, the optimization of supply chain which is an important issue, requires a reliable prediction of future demand. On the other hand, It has been shown that intelligent systems and machine learning techniques are useful for forecasting in several applied domains. In this paper, we introduce the machine learning technique of time series forecasting Support Vector Regression (SVR) which is nowadays frequently used. Furthermore, we use the Particle Swarm Optimization (PSO) algorithm to optimize the SVR parameters. We investigate the accuracy of this approach for supply chain demand forecasting by trying to apply it to a case study. Keywords: Forecasting, Support Vector Regression, Particle Swarm Optimization, Machine Learning.

ID 258

Session: Data mining

978-1-4799-4647-1/14/$31.00 ©2014 IEEE