Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Research Interests:
Mobile devices location systems for remote objects (vehicle, person, commodity, etc.), such as RTLS (Real Time Location System) in general and AVL (Automatic Vehicle Location) particularly for vehicles and persons, are increasingly used... more
Mobile devices location systems for remote objects (vehicle, person, commodity, etc.), such as RTLS (Real Time Location System) in general and AVL (Automatic Vehicle Location) particularly for vehicles and persons, are increasingly used today by several enterprises. Indeed, this facilitates the management of personal, products, increases productivity, and so on. These systems use positioning devices such as GPS and communication devices to send remote location data. The first constraint of GPS is that it does not provide a precise position at any time. The extensions of GPS such as WAAS systems and A-GPS, that improve the precision, have also other constraints (availability and cost). The second constraint comes when sending remote location data. Often, the communication devices used for this purpose are GSM modules that send data on the GSM network. The use of GSM network is expensive to send data periodically. To overcome these drawbacks (improve precision and send data with minim...
Service-Oriented Software Engineering is a new approach to build software solutions as services and compositions with respect to service orientation and service-oriented architecture (SOA). SOA provides the methodology to form... more
Service-Oriented Software Engineering is a new approach to build software solutions as services and compositions with respect to service orientation and service-oriented architecture (SOA). SOA provides the methodology to form applications (web services) as functional building blocks to build an accessible infrastructure for consumers, which is autonomous and not platform-dependent. Platform independence makes it easier to develop web services, such as operating systems, programming languages, etc. Several methods from both academia and industry have been developed for service-oriented based systems. This work first questions “to what extent a solution provided by a method would conform to service orientation, particularly, how to examine the design decisions based on quality attributes”, and “to what extent the method would align solutions with problems”. Next, it shapes methods with a framework. Then, it proposes SOADM, a method for developing Service-as-a Software (SaaS) in high ...
Web services adoption is a major advance in the development of interoperable information systems. In particular, the composition of services can meet the needs increasingly complex of user, by a combination of web services within a single... more
Web services adoption is a major advance in the development of interoperable information systems. In particular, the composition of services can meet the needs increasingly complex of user, by a combination of web services within a single business process. However, despite this widespread adoption of Web services, many obstacles prevent their reconciliation in the composition, or may occur within a BPEL process in a state change, the context for example. ASWSCC Method (Adaptation of Semantic Web Service Composition to Context) is an implementation of a theoretical model made in our an earlier work. It focuses on composition process adaptation to use context (preferences, user type and its environment as the device used, location, access mode and many others). This context and request service matching should be taken into account while composing new services. Our goal is to develop a model which ensures, on the one hand, web services matching during composition process by using domai...
Hamid Mcheick is currently an associate professor in computer science department at the University of Quebec At Chicoutimi (UQAC), Quebec, Canada. He holds a PhD degree in software engineering and distributed system from Montreal... more
Hamid Mcheick is currently an associate professor in computer science department at the University of Quebec At Chicoutimi (UQAC), Quebec, Canada. He holds a PhD degree in software engineering and distributed system from Montreal University, Canada. He holds a master degree from the University of Quebec at Montreal, Canada in information retrieval system. Professor Mcheick is interested in distributed software architecture, mobiles applications and pervasive computing, as well as in separation of concerns (component, services, aspect, etc.). He works also in ubiquitous computing, service composition of business process. He has given many talks in congresses and conferences as a keynote or invited speaker. He is a chief in editor and guest editor of several international journals. His research is supported by many research grants he has received from the Canadian government, University of Montreal, CRIM (Centre de Recherche informatique de Montreal), University of UQAM, and Universit...
Research Interests:
Design of connector plays an important role in MVC-based architectures, in particular the connectors in distributed system. It is very challenging to software engineers. Many design issues are described in development, such as: i) the... more
Design of connector plays an important role in MVC-based architectures, in particular the connectors in distributed system. It is very challenging to software engineers. Many design issues are described in development, such as: i) the separation of application architecture from underlying messaging infrastructure in distributed MVC; ii) how to combine Controller with the connectors between Model and View. To address these challenges, we propose a design model that uses the Publish-Subscribe pattern for design of connectors in message-based MVC-based distributed systems. A design example of a complicated message-based MVC is then given by following this model.
Context awareness was introduced recently in several fields in quotidian human activities. Among context aware applications, health care systems are the most important ones. Such applications, in order to perceive the context, rely on... more
Context awareness was introduced recently in several fields in quotidian human activities. Among context aware applications, health care systems are the most important ones. Such applications, in order to perceive the context, rely on sensors which may be physical or virtual. However, these applications lack of standardization in handling the context and the perceived sensors data. In this work, we propose a formal context aware application architecture model to deal with the context taking into account the scalability and interoperability as key features towards an abstraction of the context relatively to end user applications. As a proof of concept, we present also a case study and simulation explaining the operational aspect of this architecture in health care systems.
Pervasive computing represents a huge evolution in this century to facilitate and improve the human’s life, by providing continuous and connected services embedded in human’s daily life environment all the time. This environment... more
Pervasive computing represents a huge evolution in this century to facilitate and improve the human’s life, by providing continuous and connected services embedded in human’s daily life environment all the time. This environment consisting of computer devices, services, mobile smart phones, human’s body, locations, activities, temperature, humidity and many more, is an example of interconnected network between these components in order to adapt to the user’s needs by collecting data from this environment, processing it, take decision for the convenient human’s activity and finally send and visualize this decision by patient. This research advocates how health care systems can be improved throughout distant medical assistance. Patients experiencing breathing problems or muscle weakness can be advised to practice physical activities by a specialist to improve stamina and endurance. Our goal is to develop a middleware to help people in deficiency to do activities easily during their da...
The principal aim of this paper is to demonstrate, using an example and proof, that associating design patterns’ graph transformation rules with weights can improve the fuzzy logic calculation used in the detection and recognition of... more
The principal aim of this paper is to demonstrate, using an example and proof, that associating design patterns’ graph transformation rules with weights can improve the fuzzy logic calculation used in the detection and recognition of design Patterns. We also demonstrate that our proposed weight augmentation can be applied to both static and dynamic analysis of a system under examination.
Requests for services and user demands increase continuously and faster than technology development. To keep the service offering time reasonable, we can decrease the servers total elapsed time (STET) instead of waiting for newer... more
Requests for services and user demands increase continuously and faster than technology development. To keep the service offering time reasonable, we can decrease the servers total elapsed time (STET) instead of waiting for newer technologies. This paper focus on division of jobs between computers operating in network to improve the computing speed. Furthermore, we deal with the problem concerning how to arrange services in a way that the STET will be minimised in the best way. Service oriented architecture principals are used to participate jobs between computers. We have focused on time parameter to design software at the software architecture level; we follow the goal to minimise the STET. A mathematical model is proposed to express computing time relations and an LP model is applied to find best combination of services regarding computing speed. A case study is presented to demonstrate the time relations.
Distributed computing systems are of huge importance in a number of recently established and future functions in computer science. For example, they are vital to banking applications, communication of electronic systems, air traffic... more
Distributed computing systems are of huge importance in a number of recently established and future functions in computer science. For example, they are vital to banking applications, communication of electronic systems, air traffic control, manufacturing automation, biomedical operation works, space monitoring systems and robotics information systems. As the nature of computing comes to be increasingly directed towards intelligence and autonomy, intelligent computations will be the key for all future applications. Intelligent distributed computing will become the base for the growth of an innovative generation of intelligent distributed systems. Nowadays, research centres require the development of architectures of intelligent and collaborated systems; these systems must be capable of solving problems by themselves to save processing time and reduce costs. Building an intelligent style of distributed computing that controls the whole distributed system requires communications that ...
SOA and Cloud Computing are making major changes in the way companies build and deploy applications. The challenge is to meet the business expectation of faster delivery of new functionality, while at the same time maintaining control of... more
SOA and Cloud Computing are making major changes in the way companies build and deploy applications. The challenge is to meet the business expectation of faster delivery of new functionality, while at the same time maintaining control of application performance and availability across a growing network of service providers. SOA facilitates the development cycle by providing common features to everyone. However, SOA has some disadvantages such as the lack of information of what a service can provide and how can we discover it. When working with web services, the number of exposed methods or functions becomes a problem for developers. We do not need to deal with whole services if a developer needs to call one function. This article suggests and validates a new selected service model for the SOA. The layout presentation and the communication is described between client and services.
Cloud computing presents an efficient managerial, on-demand and scalable way to integrate computational resources. However, existing Cloud is increasingly transforming the information technology landscape, and organisations and businesses... more
Cloud computing presents an efficient managerial, on-demand and scalable way to integrate computational resources. However, existing Cloud is increasingly transforming the information technology landscape, and organisations and businesses are exhibiting strong interest in Softwareas- a-Service. This enables application service providers to lease data centre capabilities for deploying applications depending on Quality of Service (QoS) requirements. However, it still remains a challenging task to provide QoS assured services to serve customers with best quality, while also guaranteeing the maximisation of the business objectives to service provider and infrastructure provider within certain constraints. In order to address these issues, this chapter proposes building a Data Warehouse of QoS to achieve better service matching and enhance dynamic service composition. The proposed QoS Data Warehouse model supports the following: ensures a deep analysis of the service’s interior structure...
Research Interests:
It’s a big challenge to deal with security in a city. Technology advancements are influencing our life, cities are evolving, and modern cities are referring more and more to digital technologies. Currently, a huge amount of standalone... more
It’s a big challenge to deal with security in a city. Technology advancements are influencing our life, cities are evolving, and modern cities are referring more and more to digital technologies. Currently, a huge amount of standalone independent-systems operate in the city, their goal is to satisfy some business activities, e.g. banking, customs, hospitals, etc. Data collected by these systems represents, if integrated, a key element in any decision making process. This paper presents a, working, smart collaborative platform to integrate multiple systems to serve the surveillance activities in a city or country. It consists of a collaborative surveillance system, called CityPro. The architecture that we propose is a future vision to protect people and monitor public infrastructures, such as bridges, roads, buildings, etc.; it is designed to deal with and/or prevent abnormal activities like terrorist attacks. CityPro is expected to operate in live-mode by using (intended to use) cit...
Network analysis is of great interest to web and cloud companies, largely because of the huge number of web-networks users and services. Analyzing web networks is helpful for organizations that profit from how network nodes (e.g. web... more
Network analysis is of great interest to web and cloud companies, largely because of the huge number of web-networks users and services. Analyzing web networks is helpful for organizations that profit from how network nodes (e.g. web users) interact and communicate with each other. Currently, network analysis methods and tools support single network analysis. One of the Web 3.0 trends, however, namely personalization, is the merging of several user accounts (social, business, and others) in one place. Therefore, the new web requires simultaneous multiple network analysis. Many attempts have been made to devise an analytical approach that works on multiple big data networks simultaneously. This chapter proposes a new model to map web multi-network graphs in a data model. The result is a multidimensional database that offers numerous analytical measures of several networks concurrently. The proposed model also supports real-time analysis and online analytical processing (OLAP) operati...
This paper discusses a model for verifying service composition by building a distributed semi-compiler of service process. In this talk, we introduce a technique that solves the service composition problems such as infinite loops,deadlock... more
This paper discusses a model for verifying service composition by building a distributed semi-compiler of service process. In this talk, we introduce a technique that solves the service composition problems such as infinite loops,deadlock and replicate use of the service. Specifically, the client needs to build a composite service by invoking other services but without knowing the exact design of these loosely coupled services. The proposed Distributed Global Service Compiler, by this article, results dynamically from the business process of each service. As a normal compiler cannot detect loops, we apply a graph theory algorithm, a Depth First Search, on the deduced result taken from business process files.
The programming languages such as C/C++ suffer from memory management and security of code especially when their codes are used in critical systems. Therefore, we need an efficient mechanism to detect memory and type errors. Some... more
The programming languages such as C/C++ suffer from memory management and security of code especially when their codes are used in critical systems. Therefore, we need an efficient mechanism to detect memory and type errors. Some researches have been done and many tools have been developed to detect these errors and to secure C/C++ code. However, theses tools have some drawbacks such as memory management and leak, and type errors in static and dynamic analysis. Generally speaking, this paper proposes a dynamic analysis mechanism to detect type errors in modules of C/C++ code using aspect-oriented programming. We illustrate problems by examples and discuss their solutions.
Research Interests:
ABSTRACT The increase in Internet-connected physical devices offers new possibilities and opportunities. This Internet of Things (IoT) fosters the development of new platforms, services and applications that connect the physical world... more
ABSTRACT The increase in Internet-connected physical devices offers new possibilities and opportunities. This Internet of Things (IoT) fosters the development of new platforms, services and applications that connect the physical world (represented by physical objects) to the virtual world (represented by the Internet). The work presented here proposes a study of role and attribute-based access control models that tackle the security concerns of our already developed data sharing framework. The framework introduced a formal theoretical model, the IOTCollab domain specific language, and an integrated development environment that implements this model. We have extended this framework by completing the formal theoretical model with access control capabilities.
... Hafedh Mili, Hamid Mcheick, and Salah Sadou† Dépt d'Informatique, UQÀM, CP 8888, Succ. ... In this paper, we look at distribution in the context of the separation of concerns, and present an approach to distributing objects that... more
... Hafedh Mili, Hamid Mcheick, and Salah Sadou† Dépt d'Informatique, UQÀM, CP 8888, Succ. ... In this paper, we look at distribution in the context of the separation of concerns, and present an approach to distributing objects that embed different aspects. 1 Introduction ...
C++ applications suffer from the lack of a garbage collector which has been acknowledged as one of their major defects. Therefore, these applications need an automatic memory management lifecycle because their memory management techniques... more
C++ applications suffer from the lack of a garbage collector which has been acknowledged as one of their major defects. Therefore, these applications need an automatic memory management lifecycle because their memory management techniques are developed explicitly and manually. For instance, research effort has been done to improve object memory management technique, such as reference counter, incremental garbage collector, conservative
Abstract Our research centers around exploring methodologies for developing reusable software, and developing methods and toofs for building with reusable software. In this paper, we focus on reusable software component retrieval methods... more
Abstract Our research centers around exploring methodologies for developing reusable software, and developing methods and toofs for building with reusable software. In this paper, we focus on reusable software component retrieval methods that were developed ...
ABSTRACT Recently, Service-Oriented Computing is growing rapidly. With new emergences of technologies, software engineers have been facing more and more challenges in this area. Particularly, quality attributes and design decisions in... more
ABSTRACT Recently, Service-Oriented Computing is growing rapidly. With new emergences of technologies, software engineers have been facing more and more challenges in this area. Particularly, quality attributes and design decisions in Service-Oriented Computing are seldom discussed. According to the problems, our paper focuses on how to examine the design decisions based on quality attributes and how design decisions impact on the architecture of service in SOA-based system. In order to resolve these design issues, we develop an approach to SOA-based system in high level design based on functional requirements and quality attributes. Finally, a case study is shown by using our approach.
Requests for services and user demands increase continuously and faster than technology development. In this way, we often cannot wait for faster hardware and devices (newer technologies); however, division of jobs between computers in... more
Requests for services and user demands increase continuously and faster than technology development. In this way, we often cannot wait for faster hardware and devices (newer technologies); however, division of jobs between computers in network can improve the computing speed. In this article, we have considered computing elapsed time as criteria to design software at the software architecture level and
Researchers and practitioners have noted that a number of software development concerns cannot be handled using the modularization boundaries inherent in object-oriented languages, namely, method → class → package. Generally speaking, we... more
Researchers and practitioners have noted that a number of software development concerns cannot be handled using the modularization boundaries inherent in object-oriented languages, namely, method → class → package. Generally speaking, we can define an aspect as a software artefact that addresses a concern. The so-called aspect-oriented development techniques propose new artefacts (beyond method, class, or package) that can separate
We use software of concerns in software engineering for two reasons: 1) to man- age the complexity of the systems we try to build, and 2) to delay, as far as we can, the binding of the various pieces/concerns of the system to each other,... more
We use software of concerns in software engineering for two reasons: 1) to man- age the complexity of the systems we try to build, and 2) to delay, as far as we can, the binding of the various pieces/concerns of the system to each other, so that they may be developed, tested, and maintained separately. We start by positioning vari-
In wide-enterprise information system, a garbage collector (GC) is a critical memory management process in programming languages such as C++. The programmers need to be aware about memory management and can't be relieved from this... more
In wide-enterprise information system, a garbage collector (GC) is a critical memory management process in programming languages such as C++. The programmers need to be aware about memory management and can't be relieved from this task. They have to implement explicitly this task whatever the size of C++ applications. Consequently, this leads to errors and bugs (i.e. dangling pointers, allocation failures, etc.). Therefore, supporting implicit memory management based of aspect-oriented programming can provide a number of benefits such as freeing the programmer of memory management task. We have tackled this problem using aspect-oriented programming to manage implicitly the allocation and release of memory. In this paper, we describe two prototypes of memory management that implement reference counter and mark and sweep techniques. Then we compare them based on the constraints of Detlefs.

And 29 more