PROGRAMA DE PÓS GRADUAÇÃO EM ENGENHARIA DE ELETRICIDADE - PPGEE
URI Permanente desta comunidadehttps://tedebc-teste.ufma.br/handle/tede/279
Navegar
Navegando PROGRAMA DE PÓS GRADUAÇÃO EM ENGENHARIA DE ELETRICIDADE - PPGEE por Autor "ABDELOUAHAB, Zair"
Agora exibindo 1 - 8 de 8
- Resultados por página
- Opções de Ordenação
Item UMA ABORDAGEM BASEADA EM ENGENHARIA DIRIGIDA POR MODELOS PARA SUPORTAR O TESTE DE SISTEMAS DE SOFTWARE NA PLATAFORMA DE COMPUTAÇÃO EM NUVEM(Universidade Federal do Maranhão, 2012-12-21) OLIVEIRA, Jéssica Bassani de; LOPES, Denivaldo Cícero Pavão; CPF:61364371391; http://lattes.cnpq.br/7611180871627212; ABDELOUAHAB, Zair; CPF:61438154372; http://lattes.cnpq.br/3277510464047127We present an approach to support the creation of test cases for software systems in cloud computing environments. This approach is based on Model Driven Engineering (MDE). A framework, a methodology and metamodels are proposed to support the generation of test cases. Metamodels for cloud computing environments and transformation definitions are proposed. Two illustrative examples help to understand our approach and the steps to apply it. A prototype implementing the proposed framework is presented and it works together with MT4MDE and SAMT4MDE to generate semi-automatically transformation definitions and contribute to the semiautomatic creation of testing model and test code for cloud computing platforms. We present an evaluation of our approach and compare it with other approaches, detaching main differences, including advantages and disavantages.Item COMPOSIÇÃO DINÂMICA DE SERVIÇOS WEB SEMÂNTICOS UTILIZANDO ABORDAGENS DA ENGENHARIA DIRIGIDA POR MODELOS(Universidade Federal do Maranhão, 2011-07-29) BEZERRA, Eduardo Devidson Costa; Lopes, Denivaldo Cícero Pavão; CPF:61364371391; http://lattes.cnpq.br/7611180871627212; ABDELOUAHAB, Zair; CPF:61438154372; http://lattes.cnpq.br/3277510464047127The use of the Internet as a way to publish new applications and deliver new functionalities has consolidated the use of web services technology. Once web services technology enables a high degree of autonomy and interoperability, it provides a basic infrastructure for the development and composition of new services, which has benefited the business process management providing the agility required by enterprises to meet the need of rapidly changing business environment. Recently, new paradigms are being developed to deal with the increasing complexity in the development, maintenance and evolution of software systems. Among the new paradigms, Model Driven Engineering (MDE) and the Ontology stands out as the most promising for handling complex software systems. This work presents an approach to perform the dynamic composition of web services using techniques of match models (metamodels) that represent services. Models representing services must include semantic and structural aspects of the web service achieved through approaches to ontologies. Thus, we conjecture to establish matchings and measure the degree of similarity between models and investing in research about Ontologies and MDE in order to generate a tool that can assist in a Dynamic Composition of Web Services. A case study is presented to illustrate this approach.Item Comunicação Segura e Confiável para Sistemas Multiagentes Adaptando Especificações XML(Universidade Federal do Maranhão, 2006-12-01) OLIVEIRA, Emerson José Santos; ABDELOUAHAB, Zair; CPF:61438154372; http://lattes.cnpq.br/3277510464047127Multi-agent systems are evolving to enterprise applications and they are more used in open environments, such as the Internet. Many issues should be considered with this evolution, like security and reliability of communication. In this work, we propose a solution for secure communication and a solution for a reliable communication; both solutions are for multi-agent systems. These solutions adapt XML technologies and consist of several XML Specifications and RDF standard. For secure communication, we adapt the XML-DSig specification to provide integrity and digital signature; the XMLEnc specification is used to provide confidentiality through encryption, and the XKMS specification is used to provide PKI support. For reliable communication, we adapt the WS-RM specification that guarantees the message delivery. The RDF standard enables agents for exchanging messages using XML syntax. In this work, the tests with prototypes of the proposed solutions and comparisons with other solutions are also presented.Item DEFINIÇÃO DE UMA ARQUITETURA P2P BASEADA EM REPUTAÇÃO E ORIENTADA A SERVIÇOS(Universidade Federal do Maranhão, 2009-05-04) RAMOS, Flávio Marcílio Paiva; ABDELOUAHAB, Zair; CPF:61438154372; http://lattes.cnpq.br/3277510464047127Nowadays, peer-to-peer networks are very popular mainly, when we wish to search or share a considerable amount of information and resources among various participants. One of the main difficulties of this technology is how to avoid that those participants maintain, at the same time, a considerable number of shared resources and to guarantee that those resources are not corrupted or polluted content. Another problem commonly found in P2P networks is the lack of interoperability among existing P2P solutions especially because the inconsistencies of metadata and operation interfaces used in node communication. This work describes P2PWSRep, a reputation management protocol that identifies non-cooperative nodes or that can hinder network performance by sharing corrupted, infected or non-existent files. P2PWSRep infrastructure was based on web services in order to tackle interoperability problems and to facilitate its extensibility, making it feasible to be accessed by several other P2P applications. The P2PWSRep protocol employs a distributed reputation computation using an exponentially weighted average that takes into account the current and previous node reputation and which is tuned by an adjustment parameter in order to obtain the final reputation, thus considering the node s behavior. The P2PWSRep protocol is validated by means of simulation and our results show that it is able to point out the more trustable nodes in the network as well as to insulate those which are not reliable or cooperative. Besides, the protocol does not unnecessarily impacts on the network load P2PWS.Item Estudo da Utilização de Mecanismos de QoS em Redes com Enlaces de Banda Estreita(Universidade Federal do Maranhão, 2005-03-14) MELO, José Coelho de; ABDELOUAHAB, Zair; CPF:61438154372; http://lattes.cnpq.br/3277510464047127This work presents several ways of using mechanisms of Quality of Service (QoS) in networks hardwired for links of short band. It is demonstrated that the use of mechanisms of QoS brings profits of performance for priority applications and rationality in the use of band resources. The work is developed in a test platform of Previdência Social. Implementations of the PHBs EF, Afs and BE are tested. The work has evaluated the capacities to offer guaranteed band, traffic priority, conditioning of traffic and the impact of the competition between traffic classes. The experiments are mounted using the architecture of differentiated services (DiffServ) of platform Cisco, that is the standard in the network of the Previdência Social and are manipulated the mechanisms of classification, control of congestion, policing and conformation of traffic. The results give subsidy for implementation of some models of QoS in IP networks, mainly for those that serve short band.Item UM MÉTODO PARA ELICITAÇÃO E MODELAGEM DE REQUISITOS BASEADO EM OBJETIVOS(Universidade Federal do Maranhão, 2002-03-27) CARVALHO, Márcia Cristina Ferro; ABDELOUAHAB, Zair; CPF:61438154372; http://lattes.cnpq.br/3277510464047127This work proposes an integration of the approach CREWS L ecritoire based on scenarios with the approach of use cases described by Regnell & al and the Method GBRAM. In this case, the work of Regnell is extended with the notion of Requirement Chunk (RC), strategies for discovering objectives through the relationships AND, OR, and refinement between RCs, as well as extending the model with a physical level where the internal actions of the system are described. On the other side, the approach CREWS L ecritoire is extended with coupling of objective and use case where the scenarios are obtained by applying a strategy of refining use cases, and also with an integration of normal and exceptional scenarios in one synthetic model of use with one unique vision for each actor. The Method GBRAM is extended with the alternative contract dependency, composicional contract dependency, inclusive and exclusive contract dependency, as well it introduzed the use case technique, described by Regnell et al and extended with the notion of scenarios for caracterize exceptionals, variationals and normal situations. With the integration of threes methods, the new method which benefit from the advantages of the approaches of CREWS-L ecritoire, use cases.and goals. The new method proposes a coupling between objective and Use Cases in a top-down decomposition of different levels of abstraction. The method combines the two concepts into a Requirement Chunk (RC). An RC is a pair of related with AND, OR and refinement. These three types of relations between RCs lead to a hierarchic organisation of RCs in three levels of abstractions: functional, behaviour, and physical.Item MODELO DE AUTENTICAÇÃO PARA SISTEMAS DE COMPUTAÇÃO EM NUVEM(Universidade Federal do Maranhão, 2013-11-29) MELO, Mauro Jose Araujo de; ABDELOUAHAB, Zair; CPF:61438154372; http://lattes.cnpq.br/3277510464047127; Labidi, Sofiane; CPF:61878782300; http://lattes.cnpq.br/3474810859116416The world today is moving the use of traditional systems to a computer model to offer its resources very dynamic and remotely, which is known as cloud computing. In compensation challenges arise related to security issue, which makes it clear that innovations require resources. Being an environment where there is sharing of computing resources by several organizations, it is necessary to define access to data and services, so that you keep the privacy of user identification of the environment. The first security mechanism on any computer system is the identity management through authentication. A user who has registered their identifiable information in a system will have guaranteed access to the system, if your authentication is proven. The objective of this work is to propose a model where the authentication given identity can be moved from one cloud to another to allow a registered user to access a domain to another domain. This authentication is performed through single sign that is sent encrypted via script.Item PROPOST: UMA FERRAMENTA BASEADA EM CONHECIMENTO PARA GESTÃO DE PORTIFÓLIO DE PROJETOS.(Universidade Federal do Maranhão, 2007-02-12) VIEIRA, Eduardo Newton Oliveira; GIRARDI, Rosario; 590.437.170-53; http://lattes.cnpq.br/5317074159250496; GIRARDI GUTIÉRREZ, Maria Del Rosario; http://lattes.cnpq.br/5317074159250496; ABDELOUAHAB, Zair; COSTA, Evandro de Barros; http://lattes.cnpq.br/5760364940162939This work introduces PROPOST (Project Portfolio Support Tool), a knowledgebased software tool for supporting Project Portfolio Management – an increasing management model nowadays. This tool focuses on a project definition process, and was modeled using the MAAEM methodology and the ONTORMAS ontology-driven tool, as well as by reusing the ONTOINFO and ONTOWUM ontologies, which describe software product families for the development of Information Retrieval and Filtering applications, respectively. PROPOST looks for providing resource optimization by supporting reuse of existing information systems as well as avoiding duplicity on project definition for the composition on the organization’s software portfolio. The tool was created not only as a contribution for solving a current problem related to redundancy on portfolio definition, as well as support for several activities related to portfolio management (select, prioritization and evaluation). The development of PROPOST provides references on how ontology-based development can help in the software development process. It also contributes as a case study for evaluating the MAAEM methodology and the ONTORMAS ontology used in modeling process, having provided several hints for their improvement.