Pub Date : 2015-12-01DOI: 10.1109/WICT.2015.7489650
Ruxiang Zhai, Kun Zhang, Mingjun Liu
Data publishing has become an import way for information sharing. However, data privacy is still a challenge issue. When publishing data frequently, certain sensitive accurate trend may leak. Some significant sensitive overall information may be got from these published time-dependent data sets. It may result in serious consequences and heavy loss. For this issue, this paper proposes a group privacy preservation mechanism for dynamic data-sets. The sensitive accurate overall information of data-sets could be confused by some faked but rational value. In order to guarantee the rationality of the fake data, cloud model is used to generate the fake data. Analysis and experiments shows the effectiveness of this mechanism.
{"title":"A dynamic group privacy protection mechanism based on cloud model","authors":"Ruxiang Zhai, Kun Zhang, Mingjun Liu","doi":"10.1109/WICT.2015.7489650","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489650","url":null,"abstract":"Data publishing has become an import way for information sharing. However, data privacy is still a challenge issue. When publishing data frequently, certain sensitive accurate trend may leak. Some significant sensitive overall information may be got from these published time-dependent data sets. It may result in serious consequences and heavy loss. For this issue, this paper proposes a group privacy preservation mechanism for dynamic data-sets. The sensitive accurate overall information of data-sets could be confused by some faked but rational value. In order to guarantee the rationality of the fake data, cloud model is used to generate the fake data. Analysis and experiments shows the effectiveness of this mechanism.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/WICT.2015.7489644
M. Nabil, A. Hajami, Abdlakrim Haqiq
Vehicular Ad Hoc Network (VANET) is an instance of MANETs that establishes wireless connections between vehicles. Recently, it was shown for the case of highway traffic that position-based routing protocols can very well deal with the high mobility of network vehicles. In VANETs, these routing protocols must be adapted to vehicular-specific capabilities and requirements. As many previous works have shown, routing performance is greatly dependent on the availability and stability of wireless links. This work proposes a small extension to the Location Aided Routing (LAR) protocol specific to highway scenarios. We seek to improve the stability of path between sources and destinations by removing from the paths the nodes that move in opposite direction of the source movement. The performance metrics such as average delay of stability path between source and destination, packet delivery ratio (PDR), throughput, and normalized routing load (NRL) are measured using ns2. The Intelligent Driver Model with Lane Changing (IDM_LC) based on VanetMobiSim tool is used to generate realistic mobility traces in highway.
{"title":"Improvement of location aided routing protocol in Vehicular Ad Hoc Networks on highway","authors":"M. Nabil, A. Hajami, Abdlakrim Haqiq","doi":"10.1109/WICT.2015.7489644","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489644","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) is an instance of MANETs that establishes wireless connections between vehicles. Recently, it was shown for the case of highway traffic that position-based routing protocols can very well deal with the high mobility of network vehicles. In VANETs, these routing protocols must be adapted to vehicular-specific capabilities and requirements. As many previous works have shown, routing performance is greatly dependent on the availability and stability of wireless links. This work proposes a small extension to the Location Aided Routing (LAR) protocol specific to highway scenarios. We seek to improve the stability of path between sources and destinations by removing from the paths the nodes that move in opposite direction of the source movement. The performance metrics such as average delay of stability path between source and destination, packet delivery ratio (PDR), throughput, and normalized routing load (NRL) are measured using ns2. The Intelligent Driver Model with Lane Changing (IDM_LC) based on VanetMobiSim tool is used to generate realistic mobility traces in highway.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/WICT.2015.7489659
Ettaoufik Abdelaziz, Ouzzif Mohamed
Our everyday massive data processing activities and making correct decisions require a specific work environment. The cloud computing provides a flexible environment for customers to host and process their information through an outsourced infrastructure. This information was habitually located on local servers. Many applications dealing with massive data is routed to the cloud. Data Warehouse (DW) also benefit from this new paradigm to provide analytical data online and in real time. DW in the Cloud benefited of its advantages such flexibility, availability, adaptability, scalability, virtualization, etc. Improving the DW performance in the cloud requires the optimization of data processing time. The classical optimization techniques (indexing, materialized views and fragmentation) are still essential for DW in the cloud. The DW is partitioned before being distributed across multiple servers (nodes) in the Cloud. When queries containing multiple joins or ask voluminous data stored on multiple nodes, inter-node communication increases and consequently the DW performance degrades. In this paper, we propose an approach for improving the performance of DW in the cloud. Our approach is based on a classification technique of requests received by the nodes. For this purpose we use an algorithm based on the MapReduce programming model, this algorithm allows to identify the list of requests sent to the DW hosted in the cloud, and classify queries by the publication frequency. From the list of search queries we propose a partitioning scheme of DW on different nodes in order to reduce the inter-node communication and therefore minimize the queries processing time.
{"title":"Optimisation of the queries execution plan in cloud data warehouses","authors":"Ettaoufik Abdelaziz, Ouzzif Mohamed","doi":"10.1109/WICT.2015.7489659","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489659","url":null,"abstract":"Our everyday massive data processing activities and making correct decisions require a specific work environment. The cloud computing provides a flexible environment for customers to host and process their information through an outsourced infrastructure. This information was habitually located on local servers. Many applications dealing with massive data is routed to the cloud. Data Warehouse (DW) also benefit from this new paradigm to provide analytical data online and in real time. DW in the Cloud benefited of its advantages such flexibility, availability, adaptability, scalability, virtualization, etc. Improving the DW performance in the cloud requires the optimization of data processing time. The classical optimization techniques (indexing, materialized views and fragmentation) are still essential for DW in the cloud. The DW is partitioned before being distributed across multiple servers (nodes) in the Cloud. When queries containing multiple joins or ask voluminous data stored on multiple nodes, inter-node communication increases and consequently the DW performance degrades. In this paper, we propose an approach for improving the performance of DW in the cloud. Our approach is based on a classification technique of requests received by the nodes. For this purpose we use an algorithm based on the MapReduce programming model, this algorithm allows to identify the list of requests sent to the DW hosted in the cloud, and classify queries by the publication frequency. From the list of search queries we propose a partitioning scheme of DW on different nodes in order to reduce the inter-node communication and therefore minimize the queries processing time.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"94 S87","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/WICT.2015.7489657
Nawal Ait Aali, A. Baina, L. Echabbi
In last decades, the notion of collaborative systems is presented as the new concept in Critical Infrastructures. It regroups different organizations collaborating in order to ensure the continuity of these infrastructures. However, some malicious behavior can arise causing perturbations on the information systems of the organizations. To avoid this behavior, building trust between collaborating organizations is necessary; it allows cooperating and sharing resources in a secure way. In this paper, we present Tr-OrBAC: a new trust model applicable in collaborative systems; it is based on the OrBAC (Organization Based Access Control) access control model and trust evaluation. In this paper, we will focus on explaining and detailing the proposed trust model.
在过去的几十年里,协作系统的概念在关键基础设施中作为一个新概念被提出。它重新组合不同的组织协作,以确保这些基础设施的连续性。然而,一些恶意行为可能会对组织的信息系统造成干扰。为了避免这种行为,在合作组织之间建立信任是必要的;它允许以一种安全的方式合作和共享资源。本文提出了一种适用于协作系统的新型信任模型Tr-OrBAC;它基于OrBAC (Organization based Access Control)访问控制模型和信任评估。在本文中,我们将重点解释和详细介绍提议的信任模型。
{"title":"Tr-OrBAC: A trust model for collaborative systems within critical infrastructures","authors":"Nawal Ait Aali, A. Baina, L. Echabbi","doi":"10.1109/WICT.2015.7489657","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489657","url":null,"abstract":"In last decades, the notion of collaborative systems is presented as the new concept in Critical Infrastructures. It regroups different organizations collaborating in order to ensure the continuity of these infrastructures. However, some malicious behavior can arise causing perturbations on the information systems of the organizations. To avoid this behavior, building trust between collaborating organizations is necessary; it allows cooperating and sharing resources in a secure way. In this paper, we present Tr-OrBAC: a new trust model applicable in collaborative systems; it is based on the OrBAC (Organization Based Access Control) access control model and trust evaluation. In this paper, we will focus on explaining and detailing the proposed trust model.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128366906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/WICT.2015.7489637
Houssam El Ismaili, H. Houmani, Hicham Madroumi
Electronic payment is the very important step of the electronic business system, and its security must be ensured. The Secure Electronic protocol (SEP) [1] was proposed to protect online payment transactions against the fraud without involving the third party such as Visa or MasterCard. SEP protocol avoids the complexities relating to the implementation unlike SET and 3D-secure, integration and utilization are also easier than before. Then it's crucial to ensure that this protocol respect security properties such as confidentiality, authentication and integrity. In this paper, we analyze the SEP protocol with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method [2, 3]. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily life protocols such us SEP.
{"title":"Formal analysis of SEP protocol using the interpretation function-based method","authors":"Houssam El Ismaili, H. Houmani, Hicham Madroumi","doi":"10.1109/WICT.2015.7489637","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489637","url":null,"abstract":"Electronic payment is the very important step of the electronic business system, and its security must be ensured. The Secure Electronic protocol (SEP) [1] was proposed to protect online payment transactions against the fraud without involving the third party such as Visa or MasterCard. SEP protocol avoids the complexities relating to the implementation unlike SET and 3D-secure, integration and utilization are also easier than before. Then it's crucial to ensure that this protocol respect security properties such as confidentiality, authentication and integrity. In this paper, we analyze the SEP protocol with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method [2, 3]. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily life protocols such us SEP.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131267200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/WICT.2015.7489655
Lahma Karim, H. Mohamed, Belhaddaoui Hicham
The technology of the wireless sensor networks (WSN) is increasingly invading our daily life, taking into account a plenty of existing applications to nowadays (measurements, supervision ...). In many applications of this type of network, the credibility of the information shared by its devices is essentially depending on the criticality of the application. Our goal is to treat the problem of reliability of information exchanged by WSN to make sense of the credibility of this information. The result of this approach is to be able at any moment to give a confidence level to that information exchanged by the WSN. We are implementing a set of mathematical theories to generate an algorithm to characterize the notion of credibility. To validate this study, we conducted a simulation platform.
{"title":"Study of the credibility of the information shared by a wireless sensor network","authors":"Lahma Karim, H. Mohamed, Belhaddaoui Hicham","doi":"10.1109/WICT.2015.7489655","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489655","url":null,"abstract":"The technology of the wireless sensor networks (WSN) is increasingly invading our daily life, taking into account a plenty of existing applications to nowadays (measurements, supervision ...). In many applications of this type of network, the credibility of the information shared by its devices is essentially depending on the criticality of the application. Our goal is to treat the problem of reliability of information exchanged by WSN to make sense of the credibility of this information. The result of this approach is to be able at any moment to give a confidence level to that information exchanged by the WSN. We are implementing a set of mathematical theories to generate an algorithm to characterize the notion of credibility. To validate this study, we conducted a simulation platform.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114613593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/WICT.2015.7489662
Ian Pratt, Shiyun Zhong
Implementation of RFID technology within the library sector has taken great strides forward over the last decade. ISO 28560 is a recent standard aimed at providing a common platform to an industry that has initially evolved with a number of implementers formulating their own RFID data storage models. Although RFID standards such as ISO 14223, 14443 & 15693, relating to air interface protocols largely predate their implementation, standards such as ISO 28560 which pertain to standardisation of tag data models have been introduced at a stage when implementations have reached a certain level of maturity. This paper provides a critique of the applicability of ISO 28560 through direct experience in applying it to the UK library market.
{"title":"Perspectives on the implementation of standardization within the UK library RFID market","authors":"Ian Pratt, Shiyun Zhong","doi":"10.1109/WICT.2015.7489662","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489662","url":null,"abstract":"Implementation of RFID technology within the library sector has taken great strides forward over the last decade. ISO 28560 is a recent standard aimed at providing a common platform to an industry that has initially evolved with a number of implementers formulating their own RFID data storage models. Although RFID standards such as ISO 14223, 14443 & 15693, relating to air interface protocols largely predate their implementation, standards such as ISO 28560 which pertain to standardisation of tag data models have been introduced at a stage when implementations have reached a certain level of maturity. This paper provides a critique of the applicability of ISO 28560 through direct experience in applying it to the UK library market.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134638079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/WICT.2015.7489638
Shuwei Yao, Kun Ma, Zhe Yang, A. Abraham
College students often collaborate in some projects or contests with other students from different majors, but current team seeking system has some limitations on finding teammates. In this paper, we design a multi-tenant college sustained team seeking system, aiming at establishing a sustained team among college students who have similar interest. We present the architecture, core modules, and some emerging techniques to design such a system. The evaluation of query efficiency and page loading speed are present at last.
{"title":"Toward a multi-tenant college sustained team seeking system","authors":"Shuwei Yao, Kun Ma, Zhe Yang, A. Abraham","doi":"10.1109/WICT.2015.7489638","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489638","url":null,"abstract":"College students often collaborate in some projects or contests with other students from different majors, but current team seeking system has some limitations on finding teammates. In this paper, we design a multi-tenant college sustained team seeking system, aiming at establishing a sustained team among college students who have similar interest. We present the architecture, core modules, and some emerging techniques to design such a system. The evaluation of query efficiency and page loading speed are present at last.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123245843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/WICT.2015.7489640
Elhozmari Majda, Ettalbi Ahmed
During the last years, because of the evolution of Cloud applications and the attractive advantages given to consumers, many companies outsource their data and Information Technology (IT) system to the Cloud based technology. With the growth in the number of Cloud Service Providers, many enterprises and organizations can use and associate services from multiple providers. There may be many Internet protocols for service access standards that are used to ensure interoperability between users browser and Web server, such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP). Each service has its specific characteristics such as authentication and security requirements. Hence, Cloud providers attempt to lock customers into proprietary interfaces so consumers can find themselves at not expects inevitable vendor lock-in. Therefore, the focus of our paper is to propose a solution to this problem by using Cloud intermediate between Cloud providers and consumer in heterogeneous Cloud environments interfaces. This is to achieve benefits such as standardization and interoperability, minimizing lock-in of Cloud providers. To reach such benefits, we propose a Cloud SaaS based on two interfaces and an internet component. These interfaces are used in Cloud Consumer and Provider sides and therefore guarantee communication between Cloud Consumer and Provider using different Internet protocols for Web service access such as REST and SOAP. Our approach guarantees interoperability and standardization in heterogeneous Cloud based environments because in this case Cloud Consumer and Provider using REST interface can communicate easily with Cloud Provider and Consumer using SOAP interface.
在过去几年中,由于云应用程序的发展和给消费者带来的诱人优势,许多公司将其数据和信息技术(IT)系统外包给基于云的技术。随着云服务提供商数量的增长,许多企业和组织可以使用和关联来自多个提供商的服务。服务访问标准可能有许多Internet协议,用于确保用户浏览器和Web服务器之间的互操作性,例如具象状态传输(Representational State Transfer, REST)和简单对象访问协议(Simple Object access Protocol, SOAP)。每个服务都有其特定的特征,例如身份验证和安全需求。因此,云提供商试图将客户锁定在专有接口中,这样消费者就会发现自己不会被不可避免的供应商锁定。因此,本文的重点是通过在异构云环境接口中使用云提供商和消费者之间的云中介来提出解决这个问题的方案。这是为了实现标准化和互操作性等好处,最大限度地减少云提供商的锁定。为了实现这些好处,我们提出了一个基于两个接口和一个互联网组件的云SaaS。这些接口在云消费者和提供者端使用,因此保证云消费者和提供者之间使用不同的互联网协议进行Web服务访问,如REST和SOAP。我们的方法保证了异构云环境中的互操作性和标准化,因为在这种情况下,使用REST接口的云消费者和提供者可以轻松地与使用SOAP接口的云提供者和消费者进行通信。
{"title":"Using cloud SaaS to ensure interoperability and standardization in heterogeneous Cloud based environment","authors":"Elhozmari Majda, Ettalbi Ahmed","doi":"10.1109/WICT.2015.7489640","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489640","url":null,"abstract":"During the last years, because of the evolution of Cloud applications and the attractive advantages given to consumers, many companies outsource their data and Information Technology (IT) system to the Cloud based technology. With the growth in the number of Cloud Service Providers, many enterprises and organizations can use and associate services from multiple providers. There may be many Internet protocols for service access standards that are used to ensure interoperability between users browser and Web server, such as Representational State Transfer (REST) and Simple Object Access Protocol (SOAP). Each service has its specific characteristics such as authentication and security requirements. Hence, Cloud providers attempt to lock customers into proprietary interfaces so consumers can find themselves at not expects inevitable vendor lock-in. Therefore, the focus of our paper is to propose a solution to this problem by using Cloud intermediate between Cloud providers and consumer in heterogeneous Cloud environments interfaces. This is to achieve benefits such as standardization and interoperability, minimizing lock-in of Cloud providers. To reach such benefits, we propose a Cloud SaaS based on two interfaces and an internet component. These interfaces are used in Cloud Consumer and Provider sides and therefore guarantee communication between Cloud Consumer and Provider using different Internet protocols for Web service access such as REST and SOAP. Our approach guarantees interoperability and standardization in heterogeneous Cloud based environments because in this case Cloud Consumer and Provider using REST interface can communicate easily with Cloud Provider and Consumer using SOAP interface.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123256123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-01DOI: 10.1109/WICT.2015.7489648
R. Esbai, M. Erramdani
The continuing evolution of business needs and technology makes Web applications more demanding in terms of development, usability and interactivity of their user interfaces. The complexity and diversity of these applications emerges the need of flexibility and combining operations with existing models to create other new, more complex models. As more complex models are used, the importance of transformations between models grows. This paper presents the application of the MDA (Model Driven Architecture) to generate, from the UML model, the code following the MVP (Model-View-Presenter), DI (Dependency Injection) and DAO (Data Access Object) patterns for a RIA (Rich Internet Application) using the standard MOF 2.0 QVT (Meta-Object Facility 2.0 Query-View-Transformation) as a transformation language. We adopt GWT (Google web Toolkit), Spring and Hibernate as a Frameworks for creating a target meta-model to generate an entire GWT-based N-tiers web application. That is why we have developed two meta-models handling UML class diagrams and N-tiers Web applications, then we have to set up transformation rules. The transformation rules defined in this paper can generate, from the class diagram, an XML file containing the Presentation, the Business, and the Data Access package. This file can be used to generate the necessary code of a RIA N-tiers web application.
业务需求和技术的不断发展使得Web应用程序在用户界面的开发、可用性和交互性方面要求更高。这些应用程序的复杂性和多样性产生了灵活性的需求,并需要将操作与现有模型结合起来,以创建其他新的、更复杂的模型。随着越来越复杂的模型被使用,模型之间转换的重要性也在增长。本文介绍了使用标准的MOF 2.0 QVT(元对象设施2.0查询-视图-转换)作为转换语言,从UML模型生成遵循MVP(模型-视图-呈现器)、DI(依赖注入)和DAO(数据访问对象)模式的RIA(富互联网应用程序)代码的MDA(模型驱动体系结构)的应用。我们采用GWT (Google web Toolkit)、Spring和Hibernate作为框架来创建目标元模型,从而生成一个完整的基于GWT的n层web应用程序。这就是为什么我们开发了两个处理UML类图和n层Web应用程序的元模型,然后我们必须设置转换规则。本文中定义的转换规则可以从类图中生成一个包含表示、业务和数据访问包的XML文件。该文件可用于生成RIA n层web应用程序所需的代码。
{"title":"Model-to-model transformation in approach by modeling: From UML model to Model-View-Presenter and Dependency Injection patterns","authors":"R. Esbai, M. Erramdani","doi":"10.1109/WICT.2015.7489648","DOIUrl":"https://doi.org/10.1109/WICT.2015.7489648","url":null,"abstract":"The continuing evolution of business needs and technology makes Web applications more demanding in terms of development, usability and interactivity of their user interfaces. The complexity and diversity of these applications emerges the need of flexibility and combining operations with existing models to create other new, more complex models. As more complex models are used, the importance of transformations between models grows. This paper presents the application of the MDA (Model Driven Architecture) to generate, from the UML model, the code following the MVP (Model-View-Presenter), DI (Dependency Injection) and DAO (Data Access Object) patterns for a RIA (Rich Internet Application) using the standard MOF 2.0 QVT (Meta-Object Facility 2.0 Query-View-Transformation) as a transformation language. We adopt GWT (Google web Toolkit), Spring and Hibernate as a Frameworks for creating a target meta-model to generate an entire GWT-based N-tiers web application. That is why we have developed two meta-models handling UML class diagrams and N-tiers Web applications, then we have to set up transformation rules. The transformation rules defined in this paper can generate, from the class diagram, an XML file containing the Presentation, the Business, and the Data Access package. This file can be used to generate the necessary code of a RIA N-tiers web application.","PeriodicalId":246557,"journal":{"name":"2015 5th World Congress on Information and Communication Technologies (WICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}