Leila Ben Ayed | Université de la Manouba, Tunis (original) (raw)
Papers by Leila Ben Ayed
Algorithms for intelligent systems, 2023
Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has... more Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has proliferated, and many modern systems have been breached, therefore building information security solutions to identify new attacks has become critical. To address these concerns, this paper proposes a novel behavioral system for the detection of modern and distributed intrusions based on artificial intelligence techniques named Behavior IDS-AI. To evaluate our approach, we have used auto-encoder for feature reduction method and two models for evaluating dataset CNN and DNN. The experimental analysis of the dataset demonstrates the suggested model's capability to produce reliable results. Actually, our model achieves 99.67%, 99.66% accuracy on UNSW-NB15 dataset for DNN and CNN, respectively.
Springer eBooks, Oct 26, 2021
Smart innovation, systems and technologies, 2023
2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017
Cloud computing is a new model for deploying and executing flexible workflow composed of cloud se... more Cloud computing is a new model for deploying and executing flexible workflow composed of cloud services. One of the expected facilities of Cloud environments is flexibility at different levels. In this paper, we propose a Model-Driven Approach (MDA) for the specification and the execution of cloud service flexible workflow applications. We define two flexibility patterns based on BPMN(Business Process Model and Notation) that deals with changes of resource requirements for workflow. The workflows are built on an abstract level, using a BPMN model for the specification of the cloud service workflow structure based on flexibility patterns, and the state-chart diagram for the specification of the cloud service workflow behavior. The execution process is supervised by a control system which is responsible for making decisions on the execution of the workflow based on the behavior of the engine defined by the state-chart diagram.
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019
In this paper we introduce a description mechanism for specifying the refinement approach for Bus... more In this paper we introduce a description mechanism for specifying the refinement approach for Business Process Modeling and Notations(BPMN). We present at each level of abstraction the syntax of this BPMN models by a context-free grammar. After that, for each refined BPMN, we analyze, automatically the change impact using NuSMV model checker. The change impact concerns the semantic preservation of BPMN models during the refinement process.
2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021
In this paper, we present a reactive system for running flexible business process. We define two ... more In this paper, we present a reactive system for running flexible business process. We define two flexibility patterns based on BPMN (Business Process Model Notation) that deals with changes of resource requirements for business process. The business processes are built on an abstract level, using a BPMN model for the specification of the cloud service business process structure based on flexibility patterns, and the state-chart diagram for the specification of the cloud service business process behaviour. In fact, our approach is based on model driven engineering to facilitate the business process design for developers and free them from the lower cloud details during the running time of such applications. Moreover, the use of flexibility actions ensures the capacity of making a compromise between adapting rapidly and easily business process when running errors occur and keeping the effectiveness of these updated application models. This update is controlled by the real time system which is based on a machine learning algorithm to depict the appropriate cloud service to involve in the business process model using the right flexibility action. Finally, we present some results of our system.
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing - AUPC '08, 2008
Semi automatic and semantic composition of workflows from Web and Grid services is an important c... more Semi automatic and semantic composition of workflows from Web and Grid services is an important challenge in today's distributed applications. This paper focuses on how to model and compose workflow applications of Grid services without considering lower level description of the Grid environment. To reach this objective, we propose a Model-Driven Approach (MDA) for developing workflow applications from existing Grid services. The workflows are built on an abstract level with semantic and syntactic descriptions of services available on the Grid. To built workflow abstract models, the proposed approach uses UML activity diagram language. As there are particular needs for modelling composed workflows of Grid services which are not fully captured by traditional workflow modelling, we propose to extend the UML activity diagram notation. These extensions deals with additional information allowing a systematic composition of workflows and containing appropriate data to describe a Grid service. These data are useful for the execution of the resulting.
2008 IEEE International Conference on Industrial Engineering and Engineering Management, 2008
In this paper, we propose a model-driven approach (MDA) for developing workflow applications from... more In this paper, we propose a model-driven approach (MDA) for developing workflow applications from existing grid services. We focus on how to model and compose workflow applications of grid services without considering lower level description of the grid environment. The workflows are built on an abstract level using UML activity diagram language with semantic and syntactic descriptions of services available on the grid. Also, we define a Domain Specific Language using the extension of the UML activity diagram notation. This extension deals with additional information allowing an automatic composition of workflows and containing appropriate data to describe a grid service. These data are useful for the execution of the resulting.
Journal on Multimodal User Interfaces, 2018
For an effective and a useful solution for the accessibility of user interfaces (UIs), it is reco... more For an effective and a useful solution for the accessibility of user interfaces (UIs), it is recommended to propose a generic approach as we notify the existence of different disability categories, various employed devices for UIs based on heterogeneous ubiquitous environments. This paper presents a generic approach for the adaptation of UIs to the accessibility context based on meta-model transformations. The proposed accessibility context is defined through five basic concepts: (1) type of disability, (2) used platform, (3) user identity, (4) user situation and (5) surrounded environment. The approach is also based on an adaptation process which takes as input the accessibility context of a given user and the UI model to adapt and provides as output the adapted UI model. This process is defined as a parametrized meta-model transformations. The meta-model transformations are based on mapping and adaptation rules implemented with Kermeta language. In this paper, we illustrate our approach using the case of visually impaired users. In addition, the paper presents an empirical study to evaluate the usability of our approach.
2022 3rd Information Technology To Enhance e-learning and Other Application (IT-ELA)
the scientific community has recently become more interested in post-quantum cryptography as a re... more the scientific community has recently become more interested in post-quantum cryptography as a result of the terrible effects that effective quantum computers. All widely used public-key systems are no longer secure Because the quantum method can break the polynomial's RSA and ECC discrete logarithms. A novel parallel image cryptosystem based on a combination of Learning with Errors (LWE) post-quantum cryptography and a Hyperchaotic System is designed in this paper. The proposed cryptosystem consists of Hyperchaotic key generation and quantum image encryption/ decryption algorithms. In the proposed algorithm, the LWE algorithm was used to encrypt eight bits (pixel) at a time in parallel instead of one bit at a time in traditional LWE. In addition, all the image pixels are encrypted parallel at the same time. The input image in different sizes is initially permuted using a Hyperchaotic system then the result is substituted using LWE. Investigations have been done into the suggested system's effectiveness by ensuring its resistance to various types of attacks such as Bruteforce, statistical, and Differential attacks. The results prove that the suggested method is very secure and efficient for imperceptible image communication and better image quality on the receiver side.
2006 2nd International Conference on Information & Communication Technologies
In this paper, we present a specification technique borrowing features from two classes of specif... more In this paper, we present a specification technique borrowing features from two classes of specification methods, formal and semi-formal ones. The proposed technique uses STATEMATE as semi formal method and the Event B as formal one. The design is initially expressed graphically with STATEMATE, then translated to Event B and verified using powerful support tools of the B method. This paper presents a scheme for the translation of statecharts and communication between activity-charts to Event B method. We propose a solution to specify time in the event based B method and a derivation of temporal expressions (timeout in statecharts) to Event B. By an example of a real time system, we illustrate our technique
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019
The BPMN2 language suffers from the absence of a precise formal semantics of the various notation... more The BPMN2 language suffers from the absence of a precise formal semantics of the various notations used, which often leads to ambiguities. In addition, this language does not have a proof system that validates a BPMN2 specification. Consequently, the use of a formal method, such as Event B, is a solution for dealing with the shortcomings found in the BPMN2 language. We propose in this paper a model-driven approach based on meta-model and meta-model transformation implemented in KerMeta to specify and formally verify workflows.
Recent decades have seen rapid advancement in the fields of networks and technology. Developing i... more Recent decades have seen rapid advancement in the fields of networks and technology. Developing information security tools to detect novel threats has become crucial as a result of the proliferation of piracy and the compromise of several current systems. This work suggests a unique behavioral system called Behavior IDS-AI, which is built on artificial intelligence approaches, to solve these concerns. It can identify contemporary and dispersed intrusions. To assess our approach, we used an auto-encoder for feature reduction and two models for CNN and SVM evaluation. The experimental study on the dataset demonstrates that the suggested model can produce reliable results. On the UNSW-NB15 dataset, our model gets 99.58% and 99.66% accuracy for SVM and CNN, respectively.
Recent decades have seen rapid advancement in the fields of networks and technology. Developing i... more Recent decades have seen rapid advancement in the fields of networks and technology. Developing information security tools to detect novel threats has become crucial as a result of the proliferation of piracy and the compromise of several current systems. This work suggests a unique behavioral system called Behavior IDS-AI, which is built on artificial intelligence approaches, to solve these concerns. It can identify contemporary and dispersed intrusions. To assess our approach, we used an auto-encoder for feature reduction and two models for CNN and SVM evaluation. The experimental study on the dataset demonstrates that the suggested model can produce reliable results. On the UNSW-NB15 dataset, our model gets 99.58% and 99.66% accuracy for SVM and CNN, respectively.
les deux variables nombre sont distinctes. En fait, lors d'un appel de fonction, vous spécifiez d... more les deux variables nombre sont distinctes. En fait, lors d'un appel de fonction, vous spécifiez des arguments à la fonction appelée. Ces arguments ne sont rien d'autre que des expressions dont les résultats seront ensuite affectés aux différents paramètres de la fonction. I.1. Définir et Utiliser une Fonction 11 Les étiquettes et l'instruction goto Une étiquette et goto n'est utilisable qu'au sein d'une fonction. Autrement dit, il n'est pas possible de sauter d'une fonction à une autre à l'aide de l'instruction goto. I.1. Définir et Utiliser une Fonction 12 Les prototypes Nous avons toujours défini notre fonction avant la fonction main(). (nous définissons la fonction avant de l'utiliser), Si nous déplaçons la définition après la fonction main(), le compilateur se retrouve dans une situation délicate : il est face à un appel de fonction dont il ne sait rien (nombre d'arguments, type des arguments et type de retour). Que faire ? Pour résoudre ce problème, il est possible de déclarer une fonction à l'aide d'un prototype. Celui-ci permet de spécifier le type de retour de la fonction, son nombre d'arguments et leur type, mais ne comporte pas le corps de cette fonction. La syntaxe d'un prototype : type nom(paramètres); Étant donné qu'un prototype ne comprend pas le corps de la fonction qu'il déclare, il n'est pas obligatoire de préciser le nom des paramètres de celle-ci. Le prototype suivant est correct. int ppcd(int, int); I.2. Variables globales et classes de stockage Les variables globales Il arrive parfois que l'utilisation de paramètres ne soit pas adaptée et que des fonctions soient amenées à travailler sur des données qui doivent leur être communes. Prenons un exemple simple : vous souhaitez compter le nombre d'appels de fonction réalisé durant l'exécution de votre programme. Ceci est impossible à réaliser, sauf à définir une variable dans la fonction main(), la passer en argument de chaque fonction et de faire en sorte que chaque fonction retourne sa valeur augmentée de un, ce qui est très peu pratique. À la place, il est possible de définir une variable dite « globale » qui sera utilisable par toutes les fonctions. Pour définir une variable globale, il vous suffit de définir une variable en dehors de tout bloc, autrement dit en dehors de toute fonction.
Proceedings of International Joint Conference on Advances in Computational Intelligence. IJCACI 2022. Algorithms for Intelligent Systems. Springer, Singapore., 2022
Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has... more Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has proliferated, and many modern systems have been breached, therefore building information security solutions to identify new attacks has become critical. To address these concerns, this paper proposes a novel behavioral system for the detection of modern and distributed intrusions based on artificial intelligence techniques named Behavior IDS-AI. To evaluate our approach, we have used auto-encoder for feature reduction method and two models for evaluating dataset CNN and DNN. The experimental analysis of the dataset demonstrates the suggested model's capability to produce reliable results. Actually, our model achieves 99.67%, 99.66% accuracy on UNSW-NB15 dataset for DNN and CNN, respectively.
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), 2017
This paper presents a meta-model transformation based approach to reasoning about sequence diagra... more This paper presents a meta-model transformation based approach to reasoning about sequence diagrams using B event. We present an approach for the specification and the verification of flexible Workflow applications of cloud services. Our approach is based on the semiformal notation of UML sequence diagrams, and the formal method B event. We have developed a tool called SD2EventB supporting the proposed approach. This tool allows the specification of flexible Cloud service Workflow application models using predefined flexibility patterns generated automatically by this tool. Once the model is specified, it is transformed to an event B model to be verified. In order to ensure this verification, we have used the platform Rodin supporting the event B method. This platform has been integrated into our tool. The transformation, as well, has been developed as a function of our tool using the meta-model transformation environment KerMeta.
Cloud environments are being increasingly used for deploying and executing workflow composed from... more Cloud environments are being increasingly used for deploying and executing workflow composed from cloud services. In this paper, we propose a meta-model transformation for the specification and the execution of cloud service flexible workflows. To built workflow abstract models, the proposed approach uses a BPMN model for the specification of the cloud service workflow structure and the state-chart diagram for the specification of the cloud service workflow behavior. In addition, workflow models should be translated into BPEL4WS language which will be executed by the BPEL4WS engine, the latter is driven by the behavior described by the state-chart diagram. To fulfill, we define a set of meta-model transformations from the platform independent model (BPMN) to the platform specific model (BPEL4WS).
Algorithms for intelligent systems, 2023
Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has... more Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has proliferated, and many modern systems have been breached, therefore building information security solutions to identify new attacks has become critical. To address these concerns, this paper proposes a novel behavioral system for the detection of modern and distributed intrusions based on artificial intelligence techniques named Behavior IDS-AI. To evaluate our approach, we have used auto-encoder for feature reduction method and two models for evaluating dataset CNN and DNN. The experimental analysis of the dataset demonstrates the suggested model's capability to produce reliable results. Actually, our model achieves 99.67%, 99.66% accuracy on UNSW-NB15 dataset for DNN and CNN, respectively.
Springer eBooks, Oct 26, 2021
Smart innovation, systems and technologies, 2023
2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017
Cloud computing is a new model for deploying and executing flexible workflow composed of cloud se... more Cloud computing is a new model for deploying and executing flexible workflow composed of cloud services. One of the expected facilities of Cloud environments is flexibility at different levels. In this paper, we propose a Model-Driven Approach (MDA) for the specification and the execution of cloud service flexible workflow applications. We define two flexibility patterns based on BPMN(Business Process Model and Notation) that deals with changes of resource requirements for workflow. The workflows are built on an abstract level, using a BPMN model for the specification of the cloud service workflow structure based on flexibility patterns, and the state-chart diagram for the specification of the cloud service workflow behavior. The execution process is supervised by a control system which is responsible for making decisions on the execution of the workflow based on the behavior of the engine defined by the state-chart diagram.
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019
In this paper we introduce a description mechanism for specifying the refinement approach for Bus... more In this paper we introduce a description mechanism for specifying the refinement approach for Business Process Modeling and Notations(BPMN). We present at each level of abstraction the syntax of this BPMN models by a context-free grammar. After that, for each refined BPMN, we analyze, automatically the change impact using NuSMV model checker. The change impact concerns the semantic preservation of BPMN models during the refinement process.
2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), 2021
In this paper, we present a reactive system for running flexible business process. We define two ... more In this paper, we present a reactive system for running flexible business process. We define two flexibility patterns based on BPMN (Business Process Model Notation) that deals with changes of resource requirements for business process. The business processes are built on an abstract level, using a BPMN model for the specification of the cloud service business process structure based on flexibility patterns, and the state-chart diagram for the specification of the cloud service business process behaviour. In fact, our approach is based on model driven engineering to facilitate the business process design for developers and free them from the lower cloud details during the running time of such applications. Moreover, the use of flexibility actions ensures the capacity of making a compromise between adapting rapidly and easily business process when running errors occur and keeping the effectiveness of these updated application models. This update is controlled by the real time system which is based on a machine learning algorithm to depict the appropriate cloud service to involve in the business process model using the right flexibility action. Finally, we present some results of our system.
Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing - AUPC '08, 2008
Semi automatic and semantic composition of workflows from Web and Grid services is an important c... more Semi automatic and semantic composition of workflows from Web and Grid services is an important challenge in today's distributed applications. This paper focuses on how to model and compose workflow applications of Grid services without considering lower level description of the Grid environment. To reach this objective, we propose a Model-Driven Approach (MDA) for developing workflow applications from existing Grid services. The workflows are built on an abstract level with semantic and syntactic descriptions of services available on the Grid. To built workflow abstract models, the proposed approach uses UML activity diagram language. As there are particular needs for modelling composed workflows of Grid services which are not fully captured by traditional workflow modelling, we propose to extend the UML activity diagram notation. These extensions deals with additional information allowing a systematic composition of workflows and containing appropriate data to describe a Grid service. These data are useful for the execution of the resulting.
2008 IEEE International Conference on Industrial Engineering and Engineering Management, 2008
In this paper, we propose a model-driven approach (MDA) for developing workflow applications from... more In this paper, we propose a model-driven approach (MDA) for developing workflow applications from existing grid services. We focus on how to model and compose workflow applications of grid services without considering lower level description of the grid environment. The workflows are built on an abstract level using UML activity diagram language with semantic and syntactic descriptions of services available on the grid. Also, we define a Domain Specific Language using the extension of the UML activity diagram notation. This extension deals with additional information allowing an automatic composition of workflows and containing appropriate data to describe a grid service. These data are useful for the execution of the resulting.
Journal on Multimodal User Interfaces, 2018
For an effective and a useful solution for the accessibility of user interfaces (UIs), it is reco... more For an effective and a useful solution for the accessibility of user interfaces (UIs), it is recommended to propose a generic approach as we notify the existence of different disability categories, various employed devices for UIs based on heterogeneous ubiquitous environments. This paper presents a generic approach for the adaptation of UIs to the accessibility context based on meta-model transformations. The proposed accessibility context is defined through five basic concepts: (1) type of disability, (2) used platform, (3) user identity, (4) user situation and (5) surrounded environment. The approach is also based on an adaptation process which takes as input the accessibility context of a given user and the UI model to adapt and provides as output the adapted UI model. This process is defined as a parametrized meta-model transformations. The meta-model transformations are based on mapping and adaptation rules implemented with Kermeta language. In this paper, we illustrate our approach using the case of visually impaired users. In addition, the paper presents an empirical study to evaluate the usability of our approach.
2022 3rd Information Technology To Enhance e-learning and Other Application (IT-ELA)
the scientific community has recently become more interested in post-quantum cryptography as a re... more the scientific community has recently become more interested in post-quantum cryptography as a result of the terrible effects that effective quantum computers. All widely used public-key systems are no longer secure Because the quantum method can break the polynomial's RSA and ECC discrete logarithms. A novel parallel image cryptosystem based on a combination of Learning with Errors (LWE) post-quantum cryptography and a Hyperchaotic System is designed in this paper. The proposed cryptosystem consists of Hyperchaotic key generation and quantum image encryption/ decryption algorithms. In the proposed algorithm, the LWE algorithm was used to encrypt eight bits (pixel) at a time in parallel instead of one bit at a time in traditional LWE. In addition, all the image pixels are encrypted parallel at the same time. The input image in different sizes is initially permuted using a Hyperchaotic system then the result is substituted using LWE. Investigations have been done into the suggested system's effectiveness by ensuring its resistance to various types of attacks such as Bruteforce, statistical, and Differential attacks. The results prove that the suggested method is very secure and efficient for imperceptible image communication and better image quality on the receiver side.
2006 2nd International Conference on Information & Communication Technologies
In this paper, we present a specification technique borrowing features from two classes of specif... more In this paper, we present a specification technique borrowing features from two classes of specification methods, formal and semi-formal ones. The proposed technique uses STATEMATE as semi formal method and the Event B as formal one. The design is initially expressed graphically with STATEMATE, then translated to Event B and verified using powerful support tools of the B method. This paper presents a scheme for the translation of statecharts and communication between activity-charts to Event B method. We propose a solution to specify time in the event based B method and a derivation of temporal expressions (timeout in statecharts) to Event B. By an example of a real time system, we illustrate our technique
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019
The BPMN2 language suffers from the absence of a precise formal semantics of the various notation... more The BPMN2 language suffers from the absence of a precise formal semantics of the various notations used, which often leads to ambiguities. In addition, this language does not have a proof system that validates a BPMN2 specification. Consequently, the use of a formal method, such as Event B, is a solution for dealing with the shortcomings found in the BPMN2 language. We propose in this paper a model-driven approach based on meta-model and meta-model transformation implemented in KerMeta to specify and formally verify workflows.
Recent decades have seen rapid advancement in the fields of networks and technology. Developing i... more Recent decades have seen rapid advancement in the fields of networks and technology. Developing information security tools to detect novel threats has become crucial as a result of the proliferation of piracy and the compromise of several current systems. This work suggests a unique behavioral system called Behavior IDS-AI, which is built on artificial intelligence approaches, to solve these concerns. It can identify contemporary and dispersed intrusions. To assess our approach, we used an auto-encoder for feature reduction and two models for CNN and SVM evaluation. The experimental study on the dataset demonstrates that the suggested model can produce reliable results. On the UNSW-NB15 dataset, our model gets 99.58% and 99.66% accuracy for SVM and CNN, respectively.
Recent decades have seen rapid advancement in the fields of networks and technology. Developing i... more Recent decades have seen rapid advancement in the fields of networks and technology. Developing information security tools to detect novel threats has become crucial as a result of the proliferation of piracy and the compromise of several current systems. This work suggests a unique behavioral system called Behavior IDS-AI, which is built on artificial intelligence approaches, to solve these concerns. It can identify contemporary and dispersed intrusions. To assess our approach, we used an auto-encoder for feature reduction and two models for CNN and SVM evaluation. The experimental study on the dataset demonstrates that the suggested model can produce reliable results. On the UNSW-NB15 dataset, our model gets 99.58% and 99.66% accuracy for SVM and CNN, respectively.
les deux variables nombre sont distinctes. En fait, lors d'un appel de fonction, vous spécifiez d... more les deux variables nombre sont distinctes. En fait, lors d'un appel de fonction, vous spécifiez des arguments à la fonction appelée. Ces arguments ne sont rien d'autre que des expressions dont les résultats seront ensuite affectés aux différents paramètres de la fonction. I.1. Définir et Utiliser une Fonction 11 Les étiquettes et l'instruction goto Une étiquette et goto n'est utilisable qu'au sein d'une fonction. Autrement dit, il n'est pas possible de sauter d'une fonction à une autre à l'aide de l'instruction goto. I.1. Définir et Utiliser une Fonction 12 Les prototypes Nous avons toujours défini notre fonction avant la fonction main(). (nous définissons la fonction avant de l'utiliser), Si nous déplaçons la définition après la fonction main(), le compilateur se retrouve dans une situation délicate : il est face à un appel de fonction dont il ne sait rien (nombre d'arguments, type des arguments et type de retour). Que faire ? Pour résoudre ce problème, il est possible de déclarer une fonction à l'aide d'un prototype. Celui-ci permet de spécifier le type de retour de la fonction, son nombre d'arguments et leur type, mais ne comporte pas le corps de cette fonction. La syntaxe d'un prototype : type nom(paramètres); Étant donné qu'un prototype ne comprend pas le corps de la fonction qu'il déclare, il n'est pas obligatoire de préciser le nom des paramètres de celle-ci. Le prototype suivant est correct. int ppcd(int, int); I.2. Variables globales et classes de stockage Les variables globales Il arrive parfois que l'utilisation de paramètres ne soit pas adaptée et que des fonctions soient amenées à travailler sur des données qui doivent leur être communes. Prenons un exemple simple : vous souhaitez compter le nombre d'appels de fonction réalisé durant l'exécution de votre programme. Ceci est impossible à réaliser, sauf à définir une variable dans la fonction main(), la passer en argument de chaque fonction et de faire en sorte que chaque fonction retourne sa valeur augmentée de un, ce qui est très peu pratique. À la place, il est possible de définir une variable dite « globale » qui sera utilisable par toutes les fonctions. Pour définir une variable globale, il vous suffit de définir une variable en dehors de tout bloc, autrement dit en dehors de toute fonction.
Proceedings of International Joint Conference on Advances in Computational Intelligence. IJCACI 2022. Algorithms for Intelligent Systems. Springer, Singapore., 2022
Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has... more Rapid progress in the world of technology and networks has occurred in recent decades. Piracy has proliferated, and many modern systems have been breached, therefore building information security solutions to identify new attacks has become critical. To address these concerns, this paper proposes a novel behavioral system for the detection of modern and distributed intrusions based on artificial intelligence techniques named Behavior IDS-AI. To evaluate our approach, we have used auto-encoder for feature reduction method and two models for evaluating dataset CNN and DNN. The experimental analysis of the dataset demonstrates the suggested model's capability to produce reliable results. Actually, our model achieves 99.67%, 99.66% accuracy on UNSW-NB15 dataset for DNN and CNN, respectively.
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), 2017
This paper presents a meta-model transformation based approach to reasoning about sequence diagra... more This paper presents a meta-model transformation based approach to reasoning about sequence diagrams using B event. We present an approach for the specification and the verification of flexible Workflow applications of cloud services. Our approach is based on the semiformal notation of UML sequence diagrams, and the formal method B event. We have developed a tool called SD2EventB supporting the proposed approach. This tool allows the specification of flexible Cloud service Workflow application models using predefined flexibility patterns generated automatically by this tool. Once the model is specified, it is transformed to an event B model to be verified. In order to ensure this verification, we have used the platform Rodin supporting the event B method. This platform has been integrated into our tool. The transformation, as well, has been developed as a function of our tool using the meta-model transformation environment KerMeta.
Cloud environments are being increasingly used for deploying and executing workflow composed from... more Cloud environments are being increasingly used for deploying and executing workflow composed from cloud services. In this paper, we propose a meta-model transformation for the specification and the execution of cloud service flexible workflows. To built workflow abstract models, the proposed approach uses a BPMN model for the specification of the cloud service workflow structure and the state-chart diagram for the specification of the cloud service workflow behavior. In addition, workflow models should be translated into BPEL4WS language which will be executed by the BPEL4WS engine, the latter is driven by the behavior described by the state-chart diagram. To fulfill, we define a set of meta-model transformations from the platform independent model (BPMN) to the platform specific model (BPEL4WS).
This document presents a code for a lexical and syntax analyzer
Logiques temporelles PLTL et CTL
Compîlers , 2023
Compilation
Lesson Compilation Techniques
Leila Ben Ayed
L'objectif de ce cours est d'étendre les connaissances en théorie des langages et des automates à... more L'objectif de ce cours est d'étendre les connaissances en théorie des langages et des automates à la description des langages de programmation et leur analyse syntaxique en vue de leur compilation. Ce cours décrit les concepts fondamentaux des langages de programmation en commençant, dans une première partie, par donner la syntaxe et la sémantique, en insistant davantage sur la syntaxe. La traduction en code intermédiaire et l'environnement d'exécution font l'objet de la deuxième partie.
Leila Ben Ayed, 2022
Objectif. Ce cours présente la théorie des langages en traitant trois aspects : L'aspect reconnai... more Objectif. Ce cours présente la théorie des langages en traitant trois aspects : L'aspect reconnaissance par les automates finis, les automates à pile et les machines de turing, L'aspect génération par les grammaires régulières, non contextuelles et contextuelles, et L'aspect représentation par propriétés mesurables, définitions récursives et expressions régulières. L'objectif est d'introduire des connaissances en théorie des langages et des automates afin de pouvoir les étendre à la description des langages de programmation et leur analyse syntaxique en vue de leur compilation. Un mini compilateur fera l'objet d'un projet de ce module.
KES, 2021
Information retrieval (IR) systems are concerned of the processing of the textual content of the ... more Information retrieval (IR) systems are concerned of the processing of the textual content of the document, the query, and issues of system effectiveness. IR models are means to integrate many sources of evidence on documents to achieve an effective retrieval system. Unlike traditional parameters such as word frequency in documents, semantic information retrieval is an environment that requires the application of semantic techniques. These techniques calculate a degree of query-document relevance to assign the highest rankings to the documents which are semantically closer to the query. To meet the user's information needs and to optimize the performance of IR system, an innovative model was proposed to calculate the relevance of query-document pairs. The proposed model is a hybrid one that based on a query likelihood language model and a conceptual weighting model. It exploits the semantic similarity between document and query concepts and some document/collection statistics. The conducted experiments on the proposed model show improvement of the standard performance measures over the benchmark competitors. A statistical significance test is conducted to exclude the performance random variation of the compared models. Paired t-tests show that the proposed model is highly significant improves the most important measures.
Compsac, 2021
The aim of information retrieval (IR) process is to respond effectively to user queries by retrie... more The aim of information retrieval (IR) process is to respond effectively to user queries by retrieving information that are better meets their expectations. A gap could exist between user information needs and his/her defined context as the level of the user's expertise in the search domain is directly influencing the query richness. The information retrieval system (IRS) must be intelligent enough to identify information needs and respond effectively to meet the expected needs, regardless the level of user's expertise level. This process is difficult and it remains a major and open challenge in the domain of IR. IR models integrate many sources to achieve an effective retrieval system. Semantic IR is an environment in which semantic techniques were applied to sort the documents according to their degree of relevance to the query. The present work proposes a hybrid model to rank documents. The proposed model is based on a query likelihood language model and the semantic similarity between concepts to assess the relevance between querydocument pairs. Concepts were extracted by projection on WordNet ontology then word sense disambiguation was conducted. A semantic index was built to validate the proposed model. The conducted empirical experiments show that the proposed model is outperformed the compared benchmarks in the measured IR metrics.