Skip to main content

2018 | Buch

Emerging Technologies for Developing Countries

First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings

insite
SUCHEN

Über dieses Buch

This book constitutes the refereed proceedings of the First International EAI Conference on Emerging Technologies for Developing Countries, AFRICATEK 2017, held in Marrakech, Morocco, in March 2017. The 15 full papers, 5 short papers, 2 invited papers and one poster paper were selected from 41 submissions. The papers are organized thematically in tracks, starting with wireless sensor networks (WSNs), vehicular area networks (VANs) and mobile networks; IoT and cloud computing; big data, data analytics, and knowledge management; processing big data over diverse clouds; Web services and software engineering; security.

Inhaltsverzeichnis

Frontmatter

WSNs, VANs and Mobile Networks

Frontmatter
Seamless WSN Connectivity Using Diverse Wireless Links
Abstract
Data transfer using wireless sensor networks (WSN) is bound by its limited coverage range. In order to communicate data beyond the coverage capability of a WSN link and make it pervasive, the authors here propose a method of information handover using heterogeneous wireless links for sensor-based data transmission. They draw on connectivity, one of the main features of a pervasive network. In the handover method proposed here, the WSN link is part of a wireless module which integrates various heterogeneous wireless links. All these wireless links are combined and coordinated using media independent handover functions (MIH) in accordance with the 802.21 Standard. As wireless modules have multiple wireless links, each module can communicate with the others using any one of the active links. When these wireless modules consisting of multiple links move beyond the communication range of the WSN link to maintain continuous connectivity the MIH in the module triggers the other wireless links to hand over the service with the help of access points in the surrounding area. The concept is discussed here in the context of a smart home application which transfers the sensed information continuously to a remotely located controlling station using the existing wireless infrastructure.
Omar Alfandi, Jagadeesha RB, John Beachboard
Mixed Method: An Aggregated Method for Handover Decision in Heterogeneous Wireless Networks
Abstract
The next generation of wireless networks is marked by a variety of access networks. A mobile user desires to run a service seamlessly regardless of his access network. This makes the continuity of service during handover and QoS relevant issues to deal with. In this context, Media Independent Handover (MIH) standard was developed to facilitate the interworking between IEEE and non-IEEE Access technologies. This paper suggests an aggregated method for the best access network selection. This method combines Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) and VIse Kriterijumska Optimizacija kompromisno Resenja (VIKOR) decision algorithms together with Shannon entropy to assign handover criteria weights. Entropy is an adequate tool to weigh up the handover criteria. Compared with TOPSIS and VIKOR, mixed method performs better in terms of handovers number, packet loss rate, end to end delay, and throughput. Simulations are realized within the scope of MIH using NS3 simulator.
Saida Driouache, Najib Naja, Abdellah Jamali
Analysis of the Impact of Cognitive Vehicular Network Environment on Spectrum Sensing
Abstract
The Cognitive Vehicular Network (CVN) has emerged as a promising solution providing additional resources and allowing spectrum efficiency. However, vehicular networks are highly challenging for spectrum sensing due to speed, mobility and dynamic topology. Furthermore, these parameters depend on the CVNs’ environment such as highway, urban or suburban. Therefore, solutions targeting CVNs should take into consideration these characteristics. As a first step towards an appropriate spectrum sensing solution for CVNs, we first, provide a comprehensive classification of existing spectrum sensing techniques for CVNs. Second, we discuss, for each class, the impact of the vehicular environment effects such as traffic density, speed and fading on the spectrum sensing and data fusion techniques. Finally we derive a set of requirements for CVN’s spectrum sensing that takes into consideration specific characteristics of CVN environments.
Amina Riyahi, Marouane Sebgui, Slimane Bah, Belhaj Elgraini
High Availability of Charging and Billing in Vehicular Ad Hoc Network
Abstract
VANET (Vehicular Ad Hoc Network) is actually an important field for the development of a variety of services. In VANET charging and billing of services could not be enabled in the same way as in 3GPP networks and MANET (Mobile Ad Hoc Network) because of the characteristics of such network namely the high speed of nodes, frequent disconnection between nodes, rapidly changing topology and the large size of the network. The purpose of this work is to propose a flexible high level charging and billing scheme to allow a high availability of the charging and billing process in VANET.
Mohamed Darqaoui, Slimane Bah, Marouane sebgui

IoT and Cloud Computing

Frontmatter
Developing the IoT to Support the Health Sector: A Case Study from Kikwit, DR Congo
Abstract
Effective implementation and evaluation of development projects depends on access to accurate, complete, and timely information about the outcomes of project implementation. We explore the proposition that next-generation ICTs offer solutions for development actors operating in decentralised and extremely low-power environments to improve data collection, monitoring, and project feedback. This paper describes the potential integration of novel distributed monitoring technologies and techniques within the health sector in developing countries, and in particular the use of Internet of Things (IoT) technologies for monitoring widely distributed projects in areas with little or no infrastructure. We discuss the application of an emerging low-power wide area networking technology, LoRa, which is ideally suited to resource-limited contexts due to its low cost, low power usage, and long range. We describe our experiences in implementing a pilot project carried out in Kikwit, DR Congo to develop a LoRa-based wireless network to track the temperature of blood products, ensuring their security and viability through a decentralised, low-power, and low-cost monitoring system.
Piers W. Lawrence, Trisha M. Phippard, Gowri Sankar Ramachandran, Danny Hughes
Designing a Framework for Smart IoT Adaptations
Abstract
The Internet of Things (IoT) is the science of connecting multiple devices that coordinate to provide the service in question. IoT environments are complex, dynamic, rapidly changing and resource constrained. Therefore, proactively adapting devices to align with context fluctuations becomes a concern. To propose suitable configurations, it should be possible to sense information from devices, analyze the data and reconfigure them accordingly. Applied in the service of the environment, a fleet of devices can monitor environment indicators and control it in order to propose best fit solutions or prevent risks like over consumption of resources (e.g., water and energy). This paper describes our methodology in designing a framework for the monitoring and multi-instantiation of fleets of connected objects. First by identifying the particularities of the fleet, then by specifying connected object as a Dynamic Software Product Line (DSPL), capable of readjusting while running.
Asmaa Achtaich, Nissrine Souissi, Raul Mazo, Camille Salinesi, Ounsa Roudies
ABAC Based Online Collaborations in the Cloud
Abstract
Nowadays sharing data among organizations plays an important role for their collaboration. During collaborations, the organizations need to access shared information while respecting the access control constraints. In addition, most organizations rely on cloud based solutions to store their data (e.g. openstack). In such platform, data access is regulated by Access Control Lists (ACLs). ACL defines static access rules. It assumes the knowledge of the whole set of users and possible access requests. This make ACL unusable in collaborative context due to the dynamic nature of collaborative sessions. In this paper, we consider ABAC, a flexible and fine-grained model, as an access control model for cloud-based collaborations to overcome the ACL limitations. We provide an architecture that integrate ABAC in the storage level of a cloud platform.
Mohamed Amine Madani, Mohammed Erradi, Yahya Benkaouz

Smart Energy and Disaster Management

Frontmatter
Evaluating Query Energy Consumption in Document Stores
Abstract
Today’s system users demand fast answers when querying their own databases. Their impatience still high when waiting for the results of a query when they take more than one or two seconds to appear on the screen. However, having fast querying answers it is not the only aspect that determines the quality of a database system we are using, but also the energy consumption involved with. The development of database systems increasingly economic in terms of energy consumption has led to great technological advances in this area. Today, many of the entities that manage large data base systems pay particular attention to this issue, not only for environmental reasons but also for economic reasons, obviously. In this paper we address the issue of queries energy consumption evaluation in database systems, with particular emphasis to those that are executed in a environment of a document store. Based on the information provided by the execution of a query in MongoDB, we designed and developed a process that determines the energy consumption of queries launched in a document store, approaching different alternatives in query designing, implementation and execution.
Duarte Duarte, Orlando Belo
Joint Energy Demand Prediction and Control
Abstract
Joint electricity predictor and controller (JEPAC) is a system that allows energy suppliers to better predict their electricity grid activity and then, optimize their energy production, management and distribution. In fact, the more accurate the prediction is, the lesser its negative impact on the economy and environment. Once the JEPAC system is installed in the energy consumer place, it will collect indoor ambient parameters and energy usage and thus predict the individual future consumption. This prediction will be frequently transmitted to the energy supplier as a formatted commitment then later, the same device will try to respect this commitment by adjusting wisely the user’s appliances and HVAC. As a result, the energy supplier will then crowdsource the global energy demand by aggregating highly detailed individual consumption commitments. This will allow a better prediction and control of the future energy demand.
Mehdi Merai, Jia Yuan Yu

Big Data, Data Analytics, and Knowledge Management

Frontmatter
Trust Assessment-Based Multiple Linear Regression for Processing Big Data Over Diverse Clouds
Abstract
Assessing trust of cloud providers is considered to be a key factor to discriminate between them, especially once dealing with Big Data. In this paper, we apply Multiple Linear Regression (MLR) to develop a trust model for processing Big Data over diverse Clouds. The model relies on MLR to predict trust score of different cloud service providers. Therefore, support selection of the trustworthiness provider. Trust is evaluated not only on evidenced information collected about cloud resources availability, but also on past experiences with the cloud provider, and the reputation collected from other users experienced with the same cloud services. We use cross validation to test the consistency of the estimated regression equation, and we found that the model can perfectly be used to predict the response variable trust. We also, use bootstrap scheme to evaluate the confidence intervals for each pair of variables used in building our trust model.
Hadeel El-Kassabi, Mohamed Adel Serhani, Chafik Bouhaddioui, Rachida Dssouli
Opinions Sandbox: Turning Emotions on Topics into Actionable Analytics
Abstract
The Opinions Sandbox is a running prototype that accesses comments collected from customers of a particular product or service, and calculates the overall sentiment toward that product or service. It performs topic extraction, displays the comments partitioned into topics, and presents a sentiment for each topic. This helps to quickly digest customers’ opinions, particularly negative ones, and sort them by the concerns expressed by the customers. These topics are now considered issues to be addressed. The Opinions Sandbox does two things with this list of issues. First, it simulates the social network of the future, after rectifying each issue. Comments with positive sentiment regarding this rectified issues are synthesized, they are injected into the comment corpus, and the effect on overall sentiment is produced. Second, it helps the user create a plan for addressing the issues identified in the comments. It uses the quantitative improvement of sentiment, calculated by the simulation in the first part, and it uses user-supplied cost estimates of the effort required to rectify each issue. Sets of possible actions are enumerated and analysed showing both the costs and the benefits. By balancing these benefits against these costs, it recommends actions that optimize the cost/benefit tradeoff.
Feras Al-Obeidat, Eleanna Kafeza, Bruce Spencer
E-Healthcare Knowledge Creation Platform Using Action Research
Abstract
There has been a long discussion on knowledge creation in the health care environment. Recently, the action research approach is attracting considerable attention. Action research supports a learning process where collaboratively the healthcare stakeholders are cooperating to produce knowledge that will influence their practice. Usually physicians are involved in case study research where information is produced but it is not used to offer insights back to the community. In this paper we propose a healthcare learning platform (HLP) that enables members of the health multidisciplinary communities to collaborate, share up-to-date information and harvest useful evidence. In this e-health platform knowledge is created based on patient feedback, the dynamic creation of communities that involve the participation of several stakeholders and the creation of an action learning environment where problem identification, investigation and planning, action and reflection is a cycle that enables knowledge and experience to contribute to healthcare knowledge creation.
May Al Taei, Eleanna Kafeza, Omar Alfandi

Web Services and Software Engineering

Frontmatter
Framework for Dynamic Web Services Composition Guided by Live Testing
Abstract
Web services allow businesses to offer their services and consumers to retrieve and use them. Businesses own some services and can reuse services that belong to other businesses to perform new transactional activities. By doing this, they achieve outsourcing, cost, and resources optimization. The advances in design principles, architectures, protocols and languages have helped to solve some of the problems related to the composition of business applications. Web service composition technology emerged as a new approach for efficient automation and integration of business processes based on Service-Oriented Architecture (SOA). SOA provides a set of principles to create distributed computing systems that support the creation of loosely coupled applications in heterogeneous and distributed environment. Service computing or engineering covers the entire lifecycle of services that include: modeling, creation, realization, deployment, publication, discovery, composition, delivery, collaboration, monitoring, adaptation, optimization, and management. In this paper we propose an architecture for dynamic composition of web services that is guided by live testing technique. The main focus is on the framework and composition requirements.
Mounia Elqortobi, Jamal Bentahar, Rachida Dssouli
Modernization of Legacy Software Tests to Model-Driven Testing
Abstract
Software has become ubiquitous in healthcare applications, as is evident from its prevalent use for controlling medical devices, maintaining electronic patient health data, and enabling healthcare information technology (HIT) systems. As the software functionality becomes more intricate, concerns arise regarding quality, safety and testing effort. It thus becomes imperative to adopt an approach or methodology based on best engineering practices to ensure that the testing effort is affordable. Automation in testing software can increase product quality, leading to lower field service, product support and liability cost. It can provide types of testing that simply cannot be performed by people.
Nader Kesserwan, Rachida Dssouli, Jamal Bentahar

Mobile-Based Applications

Frontmatter
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency
Abstract
Pay with a (Group) Selfie (PGS) is a novel payment system developed at Khalifa University in the UAE, and currently under test at the Institut de Mathématiques et Science Physique (IMSP) in Benin. The PGS system uses a group selfie to gather all information items needed to encode a purchase: the seller, the buyer, the service/product and the agreed price. Using Visual Cryptography (VC), the photo is then “digitally ripped” into two shares, one for the buyer and one for the seller. In the current version of PGS, these shares are eventually and independently sent to a Bank that cooperates to offer the digital payment service to population living in rural areas. When the purchases of a buyer at a given seller pass a pre-set threshold, the Bank executes a traditional fund transfer between the two. This way, PGS spreads the Bank’s transfer fee over multiple purchases, decreasing the financial cost of each purchase. This paper discusses the challenges of transparently coupling the PGS payment system with digital wallets holding a crypto currency, bringing the financial cost of each purchase to zero.
Ernesto Damiani, Perpetus Jacques Houngbo, Joël T. Hounsou, Rasool Asal, Stelvio Cimato, Fulvio Frati, Dina Shehada, Chan Yeob Yeun

Security

Frontmatter
Cloud Digital Forensics Evaluation and Crimes Detection
Abstract
Cloud computing is one of the significant topics of today’s era; due to the enhancement it brings to the Information Technology world. This transformation lead to its rapid adoption by different sectors, ranging from enterprise to personal usage. Organizations are constantly looking for ways to increase productivity with optimum cost; which derived the need for Cloud environments and its underlying virtualized infrastructure. With the increase usage of Cloud based infrastructure, criminals utilized its anonymity factor to hide their criminal activities; escaping from legal actions. This paper highlights the obstacles experienced during Cloud virtual layer forensics acquisition and analysis, due to lack of specialized forensics tools. We have developed a framework to aid in assessing the virtual environment readiness for forensics investigation and examine the applicability of existing state-of-the-art forensics tools to Cloud environment. The paper reveals the need for having specialized forensics tools for Cloud infrastructure forensics.
Raja Jabir, Omar Alfandi
Detecting Malware Domains: A Cyber-Threat Alarm System
Abstract
Throughout the years, hackers’ intentions’ varied from curiosity, to financial gains, to political statements. Armed with their botnets, bot masters could crash a server or website. Statistics show that botnet activity accounts for 29% of the Internet traffic. But how can bot masters establish undetected communication with their botnets? The answer lies in the Domain Name System (DNS), using which hackers host their own domain and assign to it changing IP addresses to avoid being detected. In this paper, we propose a multi-factor cyber-threat detection system that relies on DNS traffic analysis for the detection of malicious domains. The proposed system was implemented, and tested, and the results yielded are very promising.
Khalifa AlRoum, Abdulhakim Alolama, Rami Kamel, May El Barachi, Monther Aldwairi
Intrusion Detection Using Unsupervised Approach
Abstract
The process of detecting intrusion on network traffic has always remained a key concern for security researchers. During the previous years, intrusion detection had attracted many researchers to find anomaly on NSL-KDD data set. Hence, most of the approaches applied on NSL KDD data set were supervised approaches. We had conducted statistical analysis on this data set using Dirichlet Mixture model. We have seen initialization using Aitchison distance fits better for proportional data. The feature selection highly affects both the performance and results into an improved evaluation of anomaly detection by an unsupervised approach.
Jai Puneet Singh, Nizar Bouguila

Short Papers

Frontmatter
Cloud Computing and Virtualization in Developing Countries
Abstract
Cloud computing has emerged since almost a decade as a paradigm for hosting and delivering services over networks. A growing number of business owners and organizations worldwide has adopted Cloud computing as it enables users to access a scalable and elastic pool of data storage and computing resources, as and when required. To build cloud based architectures, virtualization should be ensured as well. It plays a key role for providing flexibility and consolidation of the underlying resources. Despite the cloud computing is witnessing a fast and wide spread across the globe, this technology is not as trendy for some other states, especially for developing countries. The purpose of this theoretical study is to explore a new way for developing countries to benefit from cloud computing use cases and to deal with its challenges and obstacles.
Yness Boukhris
Analysis and Effect of Feature Selection Over Smartphone-Based Dataset for Human Activity Recognition
Abstract
The availability of diverse and powerful sensors that are embedded in modern smartphones has created exciting opportunities for developing context-aware services and applications. For example, Human activity recognition (HAR) is an important feature that could be applied to many applications and services, such as those in healthcare and transportation. However, recognizing relevant human activities using smartphones remains a challenging task and requires efficient data mining approaches. In this paper, we present a comparison study for HAR using features selection methods to reduce the training and classification time while maintaining significant performance. In fact, due to the limited resources of Smartphones, reducing the feature set helps reducing computation costs, especially for real-time continuous online applications. We validated our approach on a publicly available dataset to classify six different activities. Results show that Recursive Feature Elimination algorithm works well with Radial Basis Function Support Vector Machine and significantly improves model building time without decreasing recognition performance.
Ilham Amezzane, Youssef Fakhri, Mohammed El Aroussi, Mohamed Bakhouya
Empowering Graduates for Knowledge Economies in Developing Countries
Abstract
Professional, transferable, or 21st century skills such as life-long learning, problem solving and working in a multi-disciplinary team are vitally important for graduates entering knowledge economies. Students in the developing MENA countries have been identified as weak in these skills, which are challenging to both teach and assess. This paper describes the creation and application of the Computing Professional Skills Assessment (CPSA) in the United Arab Emirates (UAE), an IT specific instrument to assess students’ abilities in the professional skills, administered using a Learning Management System (LMS). As part of this research students were surveyed on their perceptions and the results revealed a positive response regarding the benefits of the CPSA. It is suggested as an effective and applicable blended learning method in developing countries to better enable students to learn and apply 21st century skills. The use of this method in regions with limited IT infrastructure is discussed.
Maurice Danaher, Kevin Shoepp, Ashley Ater Kranov, Julie Bauld Wallace
Designing an Electronic Health Security System Framework for Authentication with Wi-Fi, Smartphone and 3D Face Recognition Technology
Abstract
Information technology for development is the tool that has been around for ages and it is now mainly focusing on making people lives easy including of those in a health sector. However, health practitioners and patients are somehow had not fully experienced this benefits due to sensitive information distribution and security concerns around the distribution of electronic health records. There have been various issues and challenges on security breaches, leakage of confidential patient records and computer attacks which have been raised on security and privacy concerns in electronic health records. The unauthorized access, denial of services, lack of standardization of the system increases mistrust on electronic health record system and makes it very difficult for the parties involved in handling and transmission of patients’ record. Therefore the aim of this paper is to propose an efficient and cost-effective face recognition security framework through Wi-Fi to enable the monitoring and access control on patient record in developing countries.
Lesole Kalake, Chika Yoshida
Investigating TOE Factors Affecting the Adoption of a Cloud-Based EMR System in the Free-State, South Africa
Abstract
Paper based medical records face many challenges such as inability of real-time access to patient data, exchange and share medical data, and monitor a patients’ health progress. This negatively affects the ability to improve a patients’ health and carry out medical research. Adopting electronic medical records (EMR) may help address some issues faced with paper records. However, standalone EMR systems may not fully mitigate some issues with paper records due to lack of real-time access to patient data. Cloud Computing presents cost-effective ways of integrating EMR systems together for different health institutions to share selected patient data. However, the extent to which South African health facilities are ready to adopt cloud based EMR, and the nature of patient data that can be shared on the cloud remains unclear. This study investigates the viability of a cloud based EMR for health institutions in the Free State province of South Africa.
Nomabhongo Masana, Gerald Maina Muriithi
Backmatter
Metadaten
Titel
Emerging Technologies for Developing Countries
herausgegeben von
Dr. Fatna Belqasmi
Hamid Harroud
Max Agueh
Rachida Dssouli
Faouzi Kamoun
Copyright-Jahr
2018
Electronic ISBN
978-3-319-67837-5
Print ISBN
978-3-319-67836-8
DOI
https://doi.org/10.1007/978-3-319-67837-5

Premium Partner