Lagmiri, Souad Najoua
Unknown Affiliation

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

A novel agile method for user stories’ XMI model generation via NLP and MDA Kharmoum, Nassim; Retal, Sara; Hajjaj, Mouna; Lagmiri, Souad Najoua; Rhazali, Yassine
Bulletin of Electrical Engineering and Informatics Vol 13, No 6: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i6.7290

Abstract

Agile software development methodologies have grown in popularity during the past few years. One of the key components of agile development is the use of user stories to describe software requirements. However, creating and managing user stories can be time-consuming and error-prone. In this paper, we present a novel method to generating user stories’ XMI model using natural language processing (NLP) and model-driven architecture (MDA) approach. We devel-oped a method that uses NLP to extract key information from user stories and then applies MDA techniques to generate an XMI model conforming to its pro-posed meta-model. We conducted a case study to illustrate and validate our method, and we analyze and discuss the studied-related work with our proposal. As a result, our method has the potential to make user stories’ models and their meta-models the focus of software development. This will help to streamline the development process by making it easier to construct and transform models in an agile environment with the MDA approach.
Digital afterlife: challenges and technological innovations in pursuit of immortality Ouhnni, Hamid; Ziti, Soumia; El Bouchti, Karim; Meryam, Belhiah; Lagmiri, Souad Najoua
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 2: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i2.pp1387-1406

Abstract

Digital immortality, the idea of endless life and ultimate happiness in a virtual afterlife, has become a subject of human fascination. This article reports the results of a comprehensive research project focused on identifying the challenges and potential options related to digital immortality. Analyzing 39 relevant studies, our research concentrates on two main themes: the barriers to achieve the digital immortality and the tools created to preserve digital memories. Our findings reveal that the challenges associated with digital immortality are deeply rooted in legal, ethical, and social issues. Importantly, our focus is the challenges related to digital content left by the deceased, its collection method, and integrity in digital immortality research, as content forms the basis for achieving this objective. Furthermore, the research highlights the need for more advanced technology, as the number of studies is limited and current progress is primarily future-oriented. However, our analysis demonstrates that the digital content left by the deceased is paramount, as it constitutes the raw material for achieving digital immortality.
Processing queries on encrypted document-based database Belhaj, Abdelilah; Ziti, Soumia; Elbouchti, Karim; Falih, Noureddine; Lagmiri, Souad Najoua
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i2.pp1299-1309

Abstract

Big  data is a set of technologies and strategies for storing and analyzing large volumes of data in order to learn from it and make predictions. Since non-relational databases such as document-based have been applied in various contexts, the privacy protection must be taken into account by strengthening security to prevent the exposure of user data. In this paper, we focus mainly on secret sharing scheme that supports secure query with data interoperability to design a practical model for document-based databases, especially MongoDB. This approach, being based on secure query processing by defining elementary and suitable operators, allows us to perform operational computations and aggregations on encrypted data in the non-relational document database MongoDB. The obtained results, in the present work, could find places in various fields where data privacy and security are primordial such as healthcare, cloud computing, financial services, artificial intelligence and machine learning, in which user data remains secure and confidential during processing.
Enhancing privacy in document-oriented databases using searchable encryption and fully homomorphic encryption Belhaj, Abdelilah; Ziti, Soumia; Lagmiri, Souad Najoua; El Bouchti, Karim
Indonesian Journal of Electrical Engineering and Computer Science Vol 39, No 3: September 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v39.i3.pp1661-1672

Abstract

In cloud-based not only SQL (NoSQL) databases, maintaining data privacy and the integrity are critically challenged by the risks of unauthorized external access and potential threats from malicious insiders. This paper presents a proxy-based solution that provides privacy-preserving by combining searchable encryption and brakerski-fan-vercauteren (BFV) fully homomorphic encryption (FHE) to facilitate secure search and aggregate query execution on encrypted data. Through extensive performance evaluations and security analyses, we show that our approach offers a robust solution for privacy-preserving data operations, with performance overhead introduced by the use of FHE. This solution gives an opportunity for a robust framework for secure data management and querying in NoSQL databases, with promising implications for practical deployment and future research. This work represents a significant advancement in the secure handling of data in NoSQL oriented databases, supplying a practical solution for privacy-conscious organizations.