Henda Ben Ghezala
Manouba University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Henda Ben Ghezala.
international conference on service oriented computing | 2010
Maha Driss; Naouel Moha; Yassine Jamoussi; Jean Marc Jézéquel; Henda Ben Ghezala
Service-Oriented Computing (SOC) has gained considerable popularity for implementing Service-Based Applications (SBAs) in a flexible and effective manner. The basic idea of SOC is to understand users’ requirements for SBAs first, and then discover and select relevant services (i.e., that fit closely functional requirements) and offer a high Quality of Service (QoS). Understanding users’ requirements is already achieved by existing requirement engineering approaches (e.g., TROPOS, KAOS, and MAP) which model SBAs in a requirement-driven manner. However, discovering and selecting relevant and high QoS services are still challenging tasks that require time and effort due to the increasing number of available Web services. In this paper, we propose a requirement-centric approach which allows: (i) modeling users’ requirements for SBAs with the MAP formalism and specifying required services using an Intentional Service Model (ISM); (ii) discovering services by querying the Web service search engine Service-Finder and using keywords extracted from the specifications provided by the ISM; and(iii) selecting automatically relevant and high QoS services by applying Formal Concept Analysis (FCA). We validate our approach by performing experiments on an e-books application. The experimental results show that our approach allows the selection of relevant and high QoS services with a high accuracy (the average precision is 89.41%) and efficiency (the average recall is 95.43%).
international conference on wireless communications and mobile computing | 2011
Jihen Drira Rekik; Leïla Baccouche; Henda Ben Ghezala
Choosing the shortest path for real-time flows is insufficient. Respecting the deadline cannot be insured nor guaranteed neither with exhausted energy resource nor with overloaded intermediate mobile nodes. The main problem is to choose the reliable, efficient and correct routing protocol to route real-time flows with respect to their deadlines within MANET constraints. This paper introduces the Energy Delay aware based on Dynamic Source Routing, ED-DSR. ED-DSR efficiently utilizes the network resources such as the intermediate node energy and load in order to balance traffic load. It ensures both timeliness and energy efficiency by avoiding low-power and busy intermediate node. Simulation results, using NS simulator, improve that the protocol increases the volume of delivered packets in-time (around 50% for the data flows with strict deadline and around 63% with non-strict deadline), prolongs the network lifetime (up to 66%) and shortens the end-to-end delay.
international conference on advanced learning technologies | 2010
Jihen Malek; Mona Laroussi; Alain Derycke; Henda Ben Ghezala
This paper presents the results of our innovative approach for the realization of a model driven development framework for modeling context-aware adaptive learning activities within Context-aware and adaptive learning environments. Its core element consists of a domain specific visual modeling language called CAAML (Context-aware Adaptive Activities Modeling Language). After, we present the developed authoring tool based on CAAML language and that aims to support pedagogical designers to model context-aware adaptive learning activities and transform them into executable models represented in IMS-LD.
acs ieee international conference on computer systems and applications | 2001
Hajer Bâazaoui Zghal; Sami Faïz; Henda Ben Ghezala
Data warehouses have appeared in answer to the new requirements of database technologies. With them appeared some automated techniques like knowledge discovery in databases (KDD), data mining (DM) and online analytical processing (OLAP), which have registered a great demand in relational, transactional and finally in geographical databases. We give a survey of the state of the art of this research field. We mention the principles of data warehouses defining the context of geographical information, and present models used to build the data warehouse. Then, the tools permitting exploration of data warehouses and considered as tools for decision making are introduced. An evaluation of the technique of generalization is carried out using incendiary data. On the other hand, we expose a suggestion to manage incendiary data by cubic representation.
mediterranean electrotechnical conference | 2012
Jihen Drira Rekik; Leïla Baccouche; Henda Ben Ghezala
The real-time applications deployed in MANETs are affected by the mobile nodes power constraints and the real-time database service providers system stability. In this paper, we aim to handle the time-constrained requests within their deadline despite of the mobile nodes limited energy. We propose a cross layer service selection protocol which ensures both timelines and energy efficiency. The proposed solution discards low-power route, overhead route and overloaded service provider. We evaluate the performance of our proposed protocol using the NS2. Simulation results show that the protocol decreases the deadline packets miss ratio and reduces the energy consumption.
Ingénierie Des Systèmes D'information | 2013
Nesrine Ben Yahia; Narjès Bellamine; Henda Ben Ghezala
This paper presents an intelligent framework that combines case-based reasoning (CBR), fuzzy logic and particle swarm optimization (PSO) to build an intelligent decision support model. CBR is a useful technique to support decision making (DM) by learning from past experiences. It solves a new problem by retrieving, reusing, and adapting past solutions to old problems that are closely similar to the current problem. In this paper, we combine fuzzy logic with case-based reasoning to identify useful cases that can support the DM. At the beginning, a fuzzy CBR based on both problems and actors’ similarities is advanced to measure usefulness of past cases. Then, we rely on a meta-heuristic optimization technique i.e. Particle Swarm Optimization to adjust optimally the parameters of the inputs and outputs fuzzy membership functions.
Intelligent Decision Technologies | 2008
Maha Driss; Yassine Jamoussi; Henda Ben Ghezala
Web services (WSs) are becoming increasingly popular because of their potential in several application domains including e-Enterprise, e-Business, e-Government, and e-Science. Based on open XML standards, WS technology allows the construction of massively distributed and loosely coupled applications. A service composition mechanism should satisfy not only functional properties but also non-functional quality of service (QoS) ones. In this paper, we introduce a discrete-events modeling approach for service-based applications (SBAs). This approach is oriented towards QoS evaluation through simulation.
International Journal of Secure Software Engineering | 2014
Mehrez Essafi; Henda Ben Ghezala
This work suggests a multilevel support to software developers, who often lack knowledge and skills on how to proceed to develop secure software. In fact, developing software with such quality is a hard and complex task that involves many additional security-dedicated activities which are usually omitted in traditional software development lifecycles or integrated but not efficiently and appropriately deployed in some others. To federate all these software security-assurance activities in a structured way and provide the required guidelines for choosing and using them in a flexible development process, authors used meta-modeling techniques and dynamic process execution that consider developers affinities and products states. The proposed approach formalizes existing secure software development processes, allows integration of new ones, prevents ad-hoc executions and is supported by a tool to facilitate its deployment. A case study is given here to exemplify the proposed approach application and to illustrate some of its advantages.
Computers & Security | 2017
Firas Saidi; Zouheir Trabelsi; Khaled Salah; Henda Ben Ghezala
Cyber terrorism has become a major threat to world peace and global economic prosperity. The exponential growth of cyber terrorist communities has given rise to the need for the development of effective approaches, techniques, and tools to gain in-depth understanding of the ecosystem of these communities (specifically, in terms of inner structure, working strategies, and operation tactics). In the literature, numerous research works on the detection and analysis of cyber terrorist communities have been conducted. More notably, Social Networks Analysis (SNA) has emerged to be a key research field that attempts to analyze such cyber terrorist communities. In this paper, we survey, study, and classify the main approaches related to the analysis of cyber terrorist communities. We also discuss their characteristics, strengths and limitations. The approaches have been categorized into two main categories, namely, SNA based approaches and hybrid approaches. Furthermore, we identify areas that entail further research works with the aim of devising and developing more effective approaches that aid in analyzing cyber terrorist communities.
Archive | 2011
Jihen Drira Rekik; Leïla Baccouche; Henda Ben Ghezala
A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes which are free to move randomly thus forming a temporary network. Typical applications of MANET are in disaster recovery operations which have to respect time constraint needs. However, it is very difficult to guarantee any quality of service to a real-time flow in such network because it must take into account the specificities of these networks. This paper introduces the Energy Delay aware based on Dynamic Source Routing, ED-DSR. ED-DSR efficiently utilizes the network resources such as the node energy and the node load in order to balance traffic load. It ensures both timeliness and energy efficiency by avoiding low-power node and busy node. Simulation results, using NS-2 simulator, show that the protocol prolongs the network lifetime (up to 66%), increases the volume of packets delivered while meeting the data flows real-time constraints and shortens the end-to-end delay.