Abdelhafid Zitouni

Abdelhafid Zitouni
Université Constantine 2 | UC2 · Département des technologies logiciels et systèmes d'information

Professor

About

35
Publications
11,554
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
126
Citations

Publications

Publications (35)
Article
Full-text available
K-anonymity is the most widely used approach to privacy preserving microdata which is mainly based on generalization. Although generalization-based k-anonymity approaches can achieve the privacy protection objective, they suffer from information loss. Clustering-based approaches have been successfully adapted for k-anonymization as they enhance the...
Preprint
In this paper, we propose our enhanced approach to create a dedicated corpus for Algerian Arabic newspapers comments. The developed approach has to enhance an existing approach by the enrichment of the available corpus and the inclusion of the annotation step by following the Model Annotate Train Test Evaluate Revise (MATTER) approach. A corpus is...
Chapter
Today, it is usual that a consumer seeks for others' feelings about their purchasing experience on the web before a simple decision of buying a product or a service. Sentiment analysis intends to help people in taking profit from the available opinionated texts on the web for their decision making, and business is one of its challenging areas. Cons...
Article
Full-text available
The necessity to improve security in a multi-cloud environment has become very urgent in recent years. Although in this topic, many methods using the message authentication code had been realized but, the results of these methods are unsatisfactory and heavy to apply, which, is why the security problem remains unresolved in this environment. This a...
Article
In this paper, we propose our enhanced approach to create a dedicated corpus for Algerian Arabic newspapers comments. The developed approach has to enhance an existing approach by the enrichment of the available corpus and the inclusion of the annotation step by following the Model Annotate Train Test Evaluate Revise (MATTER) approach. A corpus is...
Preprint
Full-text available
It is very current in today life to seek for tracking the people opinion from their interaction with occurring events. A very common way to do that is comments in articles published in newspapers web sites dealing with contemporary events. Sentiment analysis or opinion mining is an emergent field who is the purpose is finding the behind phenomenon...
Preprint
Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave ba...
Preprint
Nowadays companies are increasingly adopting the technology ofcloud computing. This technology is subject to a lot of research and continuousadvances are made. The use of cloud computing in the companies advantagessuch as: reducing costs, sharing and exchange of information between institutions,but the data in the Cloud computing are susceptible to...
Preprint
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing...
Preprint
Full-text available
To ensure uninterrupted services to the cloud clients from federated cloud providers, it is important to guarantee an efficient allocation of the cloud resources to users to improve the rate of client satisfaction and the quality of the service provisions. It is better to get as more computing and storage resources as possible. In cloud domain seve...
Article
Cloud customers tend always to overestimate their resource requirements and thus, they utilize only a portion of the allocated resource which gives an opportunity for cloud providers to oversubscribe their resources. Oversubscription is a powerful technique that leverages unused resources which improves the profit of cloud providers while minimizin...
Article
Full-text available
It is very current in today life to seek for tracking the people opinion from their interaction with occurring events. A very common way to do that is comments in articles published in newspapers web sites dealing with contemporary events. Sentiment analysis or opinion mining is an emergent field who's the purpose is finding the behind phenomenon m...
Article
The Multi-Robot Task Allocation problem is the situation where some tasks and robots are given, then assignments between them must be found in order to optimize a certain measure (e.g. allocate the maximum number of tasks, etc.). We propose a generic framework to address heavily constrained MRTA problems. Some objective functions are proposed and e...
Article
In the last years, cloud computing has emerged as a new information technology (IT) model. Which provides an easy way for data processing and storage remotely through a network. Nowadays, cloud storage has become an attractive storage scheme for users to store their data. When users store their files remotely in a cloud storage system, they still w...
Conference Paper
Cloud storage is one of the cloud services, it allows users to store and manage their data remotely in the cloud. Nowadays, cloud storage has become an attractive storage scheme foruserstostoretheirdata. Whenusersstore their files remotely in a cloud storage system, they still worried about the security of their files and the guarantee of the confiden...
Article
Full-text available
Efcient resource management in dynamic cloud computing is receiving more and more attentions. Many works are still ongoing, since federated cloud computing is an open environment. We present in this paper a fexible model, new cloud operators can join the federation or leave it. The model integrates interactions between broker agents organizatio...
Conference Paper
The Cloud has become a new Information Technology (IT) model for delivering resources such as computing and storage to customers on demand, it provides both high flexibility and resources use. However, we are gaining these advantages at the cost of high security threats, which presents the major brake for the migration towards Cloud Computing. Clou...
Conference Paper
It is a challenging task to identify sentiment polarity in Arabic journals comments. Algerian daily newspapers interest more and more people in Algeria, and due to this fact they interact with it by comments they post on articles in their websites. In this paper we propose our approach to classify Arabic comments from Algerian Newspapers into posit...
Conference Paper
Elasticity is one of the essential properties in Cloud Computing that meets changeable needs of customers, and improves resource utilization for providers. In this context, oversubscription is a very powerful technique to increase resource utilization level as much as possible, which leads to a maximization of the profit of cloud providers. In this...
Conference Paper
Full-text available
Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users’ computers, to remote servers (datacenters) owned, administered and managed by third parts. This paper is an overview of data security issues in the cloud computing. Its...
Conference Paper
Full-text available
The growth of local data annually implies extra charges for the customers, which makes their business slowing down. Cloud computing paradigm comes with new technologies that offer a very economic and cost-effective solution, but the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of t...
Chapter
Cloud Computing is a new model for delivering resources such as computing and storage on demand through a network. It has many advantages like reducing the cost, however, it remains the problem of security, which is the major brake for the migration towards Cloud Computing.
Conference Paper
Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave ba...
Conference Paper
Nowadays companies are increasingly adopting the technology of cloud computing. This technology is subject to a lot of research and continuous advances are made. The use of cloud computing in the companies advantages such as: reducing costs, sharing and exchange of information between institutions, but the data in the Cloud computing are susceptibl...
Conference Paper
Full-text available
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing...
Article
Full-text available
Current models for software components have made component-based software engineering practical. However, these models are limited in the sense that their support for the characterization/specification of design components primarily deals with syntactic issues. To avoid mismatch and misuse of components, more comprehensive specification of software...
Article
Full-text available
In this paper, we present different modeling and execution frameworks that allow us to efficiently analyze, design and verify complex systems, mainly to cope with the specific concerns of the Real-time and embedded systems (RTE) domain. First we depict a UML /MARTE based methodology for executable RTE systems modeling with a framework and its under...
Article
Full-text available
For component-based software development to be successful in organizations, the software developers must give close attention to the design of components as independent abstractions with well-specified behaviors. Without well-specified behaviors the possibility to distribute and acquire software components will be limited. In this article, we prese...
Conference Paper
Full-text available
In this paper, we present a contract-based language to specify and model the properties of design components and their composition in order to detect and correct composition errors. We show how to represent the instantiation, the evolution and the integration of design components, and how to find design composition errors. One important aspect of m...
Conference Paper
Full-text available
Component-based software development focuses on building large software systems by integrating existing software components to reduce cost, risk and time. However, behavioural and compositional conflicts among components constitute a crucial barrier to successful software composition. In this paper, we present a contract-based approach to analyze a...

Network

Cited By

Projects

Projects (3)
Project
Goal: Our goal is to propose a new approach to ensure information security in cloud computing.
Project
Our goal is to propose a new approach to ensure information security in cloud computing.
Project
mining opinion from arab journal articles