You are on page 1of 54

Advanced Intelligent Systems for

Sustainable Development AI2SD 2018


Volume 5 Advanced Intelligent Systems
for Computing Sciences Mostafa
Ezziyyani
Visit to download the full and correct content document:
https://textbookfull.com/product/advanced-intelligent-systems-for-sustainable-develop
ment-ai2sd-2018-volume-5-advanced-intelligent-systems-for-computing-sciences-mo
stafa-ezziyyani/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Advanced Intelligent Systems for Sustainable


Development AI2SD 2019 Volume 6 Advanced Intelligent
Systems for Networks and Systems Mostafa Ezziyyani

https://textbookfull.com/product/advanced-intelligent-systems-
for-sustainable-development-ai2sd-2019-volume-6-advanced-
intelligent-systems-for-networks-and-systems-mostafa-ezziyyani/

Advanced Intelligent Systems for Sustainable


Development AI2SD 2018 Vol 2 Advanced Intelligent
Systems Applied to Energy Mostafa Ezziyyani

https://textbookfull.com/product/advanced-intelligent-systems-
for-sustainable-development-ai2sd-2018-vol-2-advanced-
intelligent-systems-applied-to-energy-mostafa-ezziyyani/

Advanced Intelligent Systems for Sustainable


Development AI2SD 2018 Vol 1 Advanced Intelligent
Systems Applied to Agriculture Mostafa Ezziyyani

https://textbookfull.com/product/advanced-intelligent-systems-
for-sustainable-development-ai2sd-2018-vol-1-advanced-
intelligent-systems-applied-to-agriculture-mostafa-ezziyyani/

Advanced Intelligent Systems for Sustainable


Development AI2SD 2018 Vol 3 Advanced Intelligent
Systems Applied to Environment Mostafa Ezziyyani

https://textbookfull.com/product/advanced-intelligent-systems-
for-sustainable-development-ai2sd-2018-vol-3-advanced-
intelligent-systems-applied-to-environment-mostafa-ezziyyani/
Advanced Intelligent Systems for Sustainable
Development AI2SD 2019 Volume 2 Advanced Intelligent
Systems for Sustainable Development Applied to
Agriculture and Health Mostafa Ezziyyani
https://textbookfull.com/product/advanced-intelligent-systems-
for-sustainable-development-ai2sd-2019-volume-2-advanced-
intelligent-systems-for-sustainable-development-applied-to-
agriculture-and-health-mostafa-ezziyyani/

Advanced Computing and Systems for Security Volume


Seven Rituparna Chaki

https://textbookfull.com/product/advanced-computing-and-systems-
for-security-volume-seven-rituparna-chaki/

Advanced Computing and Systems for Security Volume Nine


Rituparna Chaki

https://textbookfull.com/product/advanced-computing-and-systems-
for-security-volume-nine-rituparna-chaki/

Advanced Computing and Systems for Security Volume Ten


Rituparna Chaki

https://textbookfull.com/product/advanced-computing-and-systems-
for-security-volume-ten-rituparna-chaki/

Advanced Computing and Systems for Security Volume


Eleven Rituparna Chaki

https://textbookfull.com/product/advanced-computing-and-systems-
for-security-volume-eleven-rituparna-chaki/
Advances in Intelligent Systems and Computing 915

Mostafa Ezziyyani Editor

Advanced
Intelligent Systems
for Sustainable
Development
(AI2SD’2018)
Volume 5: Advanced Intelligent
Systems for Computing Sciences
Advances in Intelligent Systems and Computing

Volume 915

Series Editors
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland

Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de
Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, Electronic Engineering, University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University, Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso,
EL PASO, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University,
Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology, University of Technology
Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology,
Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de
Janeiro, Brazil
Ngoc Thanh Nguyen, Faculty of Computer Science and Management, Wroclaw University of
Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University
of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications,
and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as
engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce,
environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent
systems and computing such as: computational intelligence, soft computing including neural networks,
fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient
intelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and
systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems,
e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent
control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms,
learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents,
intelligent decision making and support, intelligent network security, trust management, interactive
entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings
of important conferences, symposia and congresses. They cover significant recent developments in the
field, both of a foundational and applicable character. An important characteristic feature of the series is
the short publication time and world-wide distribution. This permits a rapid and broad dissemination of
research results.

** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP,
SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156


Mostafa Ezziyyani
Editor

Advanced Intelligent Systems


for Sustainable Development
(AI2SD’2018)
Volume 5: Advanced Intelligent Systems
for Computing Sciences

123
Editor
Mostafa Ezziyyani
Faculty of Sciences and Techniques
Abdelmalek Essaâdi University
Tangier, Morocco

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-030-11927-0 ISBN 978-3-030-11928-7 (eBook)
https://doi.org/10.1007/978-3-030-11928-7

Library of Congress Control Number: 2018968381

© Springer Nature Switzerland AG 2019


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

Overview

The purpose of this volume is to honour myself and all colleagues around the world
that we have been able to collaborate closely for extensive research contributions
which have enriched the field of Applied Computer Science. Applied Computer
Science presents a appropriate research approach for developing a high-level skill
that will encourage various researchers with relevant topics from a variety of dis-
ciplines, encourage their natural creativity, and prepare them for independent
research projects. We think this volume is a testament to the benefits and future
possibilities of this kind of collaboration, the framework for which has been put in
place.

v
vi Preface

About the Editor

Prof. Dr. Mostafa Ezziyyani, IEEE and ASTF Member, received the “Licence en
Informatique” degree, the “Diplôme de Cycle Supérieur en Informatique” degree
and the PhD “Doctorat (1)” degree in Information System Engineering, respec-
tively, in 1994, 1996 and 1999, from Mohammed V University in Rabat, Morocco.
Also, he received the second PhD degree “Doctorat (2)” in 2006, from Abdelmalek
Essaadi University in Distributed Systems and Web Technologies. In 2008, he
received a Researcher Professor Ability Grade. In 2015, he receives a PES grade
—the highest degree at Morocco University. Now he is a Professor of Computer
Engineering and Information System in Faculty of Science and Technologies of
Abdelmalek Essaadi University since 1996.
His research activities focus on the modelling databases and integration of
heterogeneous and distributed systems (with the various developments to the big
data, data sciences, data analytics, system decision support, knowledge manage-
ment, object DB, active DB, multi-system agents, distributed systems and media-
tion). This research is at the crossroads of databases, artificial intelligence, software
engineering and programming.
Professor at Computer Science Department, Member MA laboratory and
responsible of the research direction Information Systems and Technologies, he
formed a research team that works around this theme and more particularly in the
area of integration of heterogeneous systems and decision support systems using
WSN as technology for communication.
He received the first WSIS prize 2018 for the Category C7: ICT applications:
E-environment, First prize: MtG—ICC in the regional contest IEEE - London UK
Project: “World Talk”, The qualification to the final (Teachers-Researchers
Category): Business Plan Challenger 2015, EVARECH UAE Morocco. Project:
«Lavabo Intégré avec Robinet à Circuit Intelligent pour la préservation de l’eau»,
First prize: Intel Business, Challenge Middle East and North Africa—IBC-MENA.
Project: «Système Intelligent Préventif Pour le Contrôle et le Suivie en temps réel
des Plantes Médicinale En cours de Croissance (PCS: Plants Control System)»,
Best Paper: International Conference on Software Engineering and New
Technologies ICSENT’2012, Hammamat-Tunis. Paper: «Disaster Emergency
System Application Case Study: Flood Disaster».
He has authored three patents: (1) device and learning process of orchestra
conducting (e-Orchestra), (2) built-in washbasin with intelligent circuit tap for
water preservation. (LIRCI) (3) Device and method for assisting the driving of
vehicles for individuals with hearing loss.
He is the editor and coordinator of several projects with Ministry of Higher
Education and Scientific Research and others as international project; he has been
involved in several collaborative research projects in the context of
ERANETMED3/PRIMA/H2020/FP7 framework programmes including project
management activities in the topic modelling of distributed information systems
reseed to environment, Health, energy and agriculture. The first project aims to
Preface vii

propose an adaptive system for flood evacuation. This system gives the best
decisions to be taken in this emergency situation to minimize damages. The second
project aims to develop a research dynamic process of the itinerary in an events
graph for blind and partially signet users. Moreover, he has been the principal
investigator and the project manager for several research projects dealing with
several topics concerned with his research interests mentioned above.
He was an invited professor for several countries in the world (France, Spain
Belgium, Holland, USA and Tunisia). He is member of USA-J1 programme for
TCI Morocco Delegation in 2007. He creates strong collaborations with research
centres in databases and telecommunications for students’ exchange: LIP6,
Valencia, Poitier, Boston, Houston, China.
He is the author of more than 100 papers which appeared in refereed specialized
journals and symposia. He was also the editor of the book “New Trends in
Biomedical Engineering”, AEU Publications, 2004. He was a member of the
Organizing and the Scientific Committees of several symposia and conferences
dealing with topics related to computer sciences, distributed databases and web
technology. He has been actively involved in the research community by serving as
reviewer for technical, and as an organizer/co-organizer of numerous international
and national conferences and workshops. In addition, he served as a programme
committee member for international conferences and workshops.
He was responsible for the formation cycle “Maîtrise de Génie Informatique” in
the Faculty of Sciences and Technologies in Tangier since 2006. He is responsible
too and coordinator of Tow Master “DCESS - Systèmes Informatique pour
Management des Entreprise” and “DCESS - Systèmes Informatique pour
Management des Enterprise”. He is the coordinator of the computer science
modules and responsible for the graduation projects and external relations of the
Engineers Cycle “Statistique et Informatique Décisionnelle” in Mathematics
Department of the Faculty of Sciences and Technologies in Tangier since 2007. He
participates also in the Telecommunications Systems DESA/Masters,
“Bio-Informatique” Masters and “Qualité des logiciels” Masters in the Faculty of
Science in Tetuan since 2002.
He is also the founder and the current chair of the blinds and partially signet
people association. His activity interests focus mainly on the software to help the
blinds and partially signet people to use the ICT, specifically in Arabic countries.
He is the founder of the private centre of training and education in advanced
technologies AC-ETAT, in Tangier since 2000.

Mostafa Ezziyyani
Contents

Intelligent Reservation Systems Based on MAS & Data


Mining Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Oum Elhana Maamra and Mohamed-Khireddine Kholladi
A Lightweight Ciphertext-Policy Attribute-Based Encryption
for Fine-Grained Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Hassan El Gafif, Naima Meddah, and Ahmed Toumanari
Generate a Meta-Model Content for Communication Space
of Learning Management System Compatible with IMS-LD . . . . . . . . 24
Mohammed Ouadoud and Mohamed Yassin Chkouri
Designing an IMS-LD Model for Communication Space
of Learning Management System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Mohammed Ouadoud and Mohamed Yassin Chkouri
A Smart Cascaded H-Bridge Multilevel Inverter with an
Optimized Modulation Techniques Increasing the Quality
and Reducing Harmonics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Babkrani Youssef, Naddami Ahmed, and Hilal Mohamed
Approaches and Algorithms for Resource Management
in OFDMA Access Mode: Application to Mobile Networks
of New Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Sara Riahi and Ali Elhore
A New Efficient Technique to Enhance Quality of Service
in OLSR Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Moulay Hicham Hanin, Youssef Fakhri, and Mohamed Amnai
Performance Assessment of AODV, DSR and DSDV
in an Urban VANET Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Khalid Kandali and Hamid Bennis

ix
x Contents

Exploiting NoSQL Document Oriented Data Using Semantic


Web Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Nassima Soussi and Mohamed Bahaj
Analytical Study of the Performance of Communication Systems
in the Presence of Fading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Sara Riahi and Azzeddine Riahi
Novel Configuration of Radio over Fiber System Using a Hybrid
SAC-OCDMA/OFDM Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
K. S. Alaoui, Y. Zouine, and J. Foshi
A Hybrid Multilingual Sentiment Classification Using Fuzzy
Logic and Semantic Similarity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Youness Madani, Mohammed Erritali, and Jamaa Bengourram
Fuzzy Semantic-Based Similarity and Big Data for Detecting
Multilingual Plagiarism in Arabic Documents . . . . . . . . . . . . . . . . . . . 159
Hanane Ezzikouri, Mohamed Oukessou, Madani Youness,
and Mohamed Erritali
Contribution to the Improvement of the Quality of Service
Over Vehicular Ad-Hoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Ansam Ennaciri, Rania Khadim, Mohammed Erritali,
Mustapha Mabrouki, and Jamaa Bengourram
Sustainable Development: Clustering Moroccan Population Based
on ICT and Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Zineb El Asraoui and Abdelilah Maach
Datamining for Fraud Detecting, State of the Art . . . . . . . . . . . . . . . . 205
Imane Bouazza, El Bachir Ameur, and Farid Ameur
Deep Learning Technology for Identifying a Person of Interest
in Real World . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Hamid Ouanan, Mohammed Ouanan, and Brahim Aksasse
The Discrete Swallow Swarm Optimization for Flow-Shop
Scheduling Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Safaa Bouzidi, Mohammed Essaid Riffi, Morad Bouzidi,
and Mohammed Moucouf
An Overview of Big Data and Machine Learning Paradigms . . . . . . . . 237
Imad Sassi, Samir Anter, and Abdelkrim Bekkhoucha
Improved CSO to Solve the TSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Abdelhamid Bouzidi and Mohammed Essaid Riffi
Contents xi

Fast and Stable Computation of the Tchebichef’s Moments


Using Image Block Representation and Clenshaw’s Formula . . . . . . . . 261
Hicham Karmouni, Tarik Jahid, Mhamed Sayyouri,
Abdeslam Hmimid, Anass El-affar, and Hassan Qjidaa
The Effect of Transmit Power on MANET Routing Protocols
Using AODV, DSDV, DSR and OLSR in NS3 . . . . . . . . . . . . . . . . . . . 274
Abdellah Nabou, My Driss Laanaoui, and Mohammed Ouzzif
Transition Model from Articulatory Domain to Acoustic Domain
of Phoneme Using SVM for Regression: Towards a Silent
Spoken Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
Aouatif Bencheikh and Abdeljabbar Cherkaoui
Code Verification Based on TPM Solutions for Internet
of Things Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Toufik Ghrib, Mohamed Benmohammed, Abdelkader Hadj Seyd,
Mohamed Redouane Kafi, and Abdelkader Guzzi
On the Security Communication and Migration in Mobile
Agent Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Sanae Hanaoui, Yousra Berguig, and Jalal Laassiri
A Temporal Data Warehouse Conceptual Modelling and Its
Transformation into Temporal Object Relational Model . . . . . . . . . . . 314
Soumiya Ain El Hayat and Mohamed Bahaj
Adherent Raindrop Detection Based on Morphological Operations . . . 324
Elhassouni Fouad and Ezzine Abdelhak
Collaborative Filtering Recommender System . . . . . . . . . . . . . . . . . . . 332
Yassine Afoudi, Mohamed Lazaar, and Mohamed Al Achhab
Introducing a Traceability Based Recommendation Approach
Using Chatbot for E-Learning Platforms . . . . . . . . . . . . . . . . . . . . . . . 346
Kamal Souali, Othmane Rahmaoui, and Mohammed Ouzzif
Optimization of Makespan in Job Shop Scheduling Problem
by Hybrid Chicken Swarm Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 358
Soukaina Cherif Bourki Semlali, Mohammed Essaid Riffi,
and Fayçal Chebihi
Arabic Stop Consonant Acoustic Characterization . . . . . . . . . . . . . . . . 370
Mohamed Farchi, Karim Tahiry, Badia Mounir, Ilham Mounir,
and Ahmed Mouhsen
Combined Mixed Finite Element, Nonconforming Finite Volume
Methods for Flow and Transport -Nitrate- in Porous Media . . . . . . . . 383
Omar El Moutea and Hassan El Amri
xii Contents

Artificial Neural Network Optimized by Genetic Algorithm


for Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Mehdi Moukhafi, Khalid El Yassini, Seddik Bri, and Kenza Oufaska
Single-Valued Neutrosophic Techniques for Analysis
of WIFI Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Said Broumi, Prem Kumar Singh, Mohamed Talea, Assia Bakali,
Florentin Smarandache, and V. Venkateswara Rao
Capturing Hadoop Storage Big Data Layer Meta-Concepts . . . . . . . . . 413
Allae Erraissi and Abdessamad Belangour
Audit and Control of Operations in the Insurance Sector
Through the Application of the IT Reference System . . . . . . . . . . . . . . 422
Jamal Zahi and Merieme Samaoui
Performance and Complexity Comparisons of Polar Codes
and Turbo Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Mensouri Mohammed and Aaroud Abdessadek
A Survey on RDF Data Store Based on NoSQL Systems
for the Semantic Web Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Mouad Banane and Abdessamad Belangour
Understanding Driving Behavior: Measurement, Modeling
and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Zouhair Elamrani Abou Elassad and Hajar Mousannif
An Efficient Model of Text Categorization Based on Feature
Selection and Random Forests: Case for Business Documents . . . . . . . 465
Fatima-Ezzahra Lagrari, Houssaine Ziyati, and Youssfi El Kettani
Association Rules Mining Method of Big Data for E-Learning
Recommendation Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Karim Dahdouh, Ahmed Dakkak, Lahcen Oughdir, and Abdelali Ibriz
Optimal Placement of Wind and Solar Generation Units
in Medium and Low Voltage Distribution Systems . . . . . . . . . . . . . . . . 492
Saad Ouali and Abdeljabbar Cherkaoui
Three-Dimensional Micro-Computed Tomographic Study of Porous
Bioceramics Using an Adaptive Method Based on Mathematical
Morphological Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
M. Ezzahmouly, A. ELmoutaouakkil, M. Ed-dhahraouy, H. Khallok,
E. Gourri, K. Karim, and Z. Hatim
Towards an Improvement of the Software Documentation
Using a Traceability Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
Othmane Rahmaoui, Kamal Souali, and Mohammed Ouzzif
Contents xiii

Vanishing Point Detection Under Foggy Weather


with Edge-Based Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526
Salma Alami and Abdelhak Ezzine
Latency Over Software Defined Network . . . . . . . . . . . . . . . . . . . . . . . 537
Souad Faid and Mohamed Moughit
Symmetry Group of Heat Transfer Flow in a Porous Medium . . . . . . 545
Tarik Amtout, Mustapha Er-Riani, and Mustapha el Jarroudi
Using Fractal Dimension to Check Similarity Between
Mandelbrot and Julia Sets in Misiurewicz Points . . . . . . . . . . . . . . . . . 558
Ouahiba Boussoufi, Kaoutar Lamrini Uahabi, and Mohamed Atounti
IoT Data-Based Architecture on OpenStack for Smart City . . . . . . . . . 567
Chaimaa Ait Belahsen, Abdelouahid Lyhyaoui, and Nadia Boufardi
Data Mining Dynamic Hybrid Model for Logistic Supplying Chain:
Assortment Setting in Fast Fashion Retail . . . . . . . . . . . . . . . . . . . . . . 578
Naila Fares, Maria Lebbar, Najiba Sbihi,
and Anas El Boukhari El Mamoun
A Customer Profiling’ Machine Learning Approach,
for In-store Sales in Fast Fashion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586
Naila Fares, Maria Lebbar, and Najiba Sbihi
Topic Hierarchies for Knowledge Capitalization using
Hierarchical Dirichlet Processes in Big Data Context . . . . . . . . . . . . . . 592
Badr Hirchoua, Brahim Ouhbi, and Bouchra Frikh
Urban Parks Spatial Distribution Analysis and Assessment Using
GIS and Citizen Survey in Tangier City, Morocco (2015 Situation) . . . 609
Abdelilah Azyat, Naoufal Raissouni, Nizar Ben Achhab,
Assad Chahboun, Mohamed Lahraoua, Ikram Elmaghnougi,
Boutaina Sebbah, and Imane Alaoui Ismaili
Amazigh POS Tagging Using TreeTagger: A Language
Independant Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 622
Samir Amri and Lahbib Zenkouar
Designing CBR-BDI Agent for Implementing Reverse Logistics
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
Fatima Lhafiane, Abdeltif Elbyed, and Mouhcine Adam
An Effective Parallel Approach to Solve Multiple Traveling
Salesmen Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647
Abdoun Othman, El khatir Haimoudi, Rhafal Mouhssine,
and Mostafa Ezziyyani
xiv Contents

Quadrotor Flight Simulator Modeling . . . . . . . . . . . . . . . . . . . . . . . . . 665


Yasmina Benmoussa, Anass Mansouri, and Ali Ahaitouf
The Immigration Genetic Approach to Improve the Optimization
of Constrained Assignment Problem of Human Resources . . . . . . . . . . 675
Said Tkatek, Otman Abdoun, Jaafar Abouchabaka, and Najat Rafalia
Analysis of Real Transient Multiexponential Signals Using Matrix
Pencil Method in Labview Environment . . . . . . . . . . . . . . . . . . . . . . . . 686
Lina El Alaoui El Abidi, Mounir Hanine, and Brahim Aksasse
Automated Checking of Conformance to SBVR Structured
English Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697
Abdellatif Haj, Youssef Balouki, and Taoufiq Gadi
Image Analysis by Hahn Moments and a Digital Filter . . . . . . . . . . . . 707
Hicham Karmouni, Tarik Jahid, Mhamed Sayyouri, Abdeslam Hmimid,
Anass El-Affar, and Hassan Qjidaa
A New Web Service Architecture for Enhancing the Interoperability
of LMS and Mobile Applications Using the Next Generation
of SCORM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719
Abdellah Bakhouyi, Rachid Dehbi, and Mohamed Talea
Porosity Estimation in Carbonate Rock Based on Voronoi
Diagram and 2D Histogram Segmentation in HSV Color Space . . . . . 727
Safa Jida, Brahim Aksasse, and Mohammed Ouanan
An Extended Data as a Service Description Model
for Ensuring Cloud Platform Portability . . . . . . . . . . . . . . . . . . . . . . . 736
Abdelhak Merizig, Hamza Saouli, Maite Lopez Sanchez, Okba Kazar,
and Aïcha-Nabila Benharkat
Security Analysis in the Internet of Things: State of the Art,
Challenges, and Future Research Topics . . . . . . . . . . . . . . . . . . . . . . . 745
Karim Ennasraoui, Youssef Baddi, Younes El Bouzekri El Idrissi,
and El Mehdi Baa
Steganographic Algorithm Based on Adapting Secret Message
to the Cover Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753
Youssef Taouil and El Bachir Ameur
A Hybrid Machine Learning Approach to Predict Learning Styles
in Adaptive E-Learning System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772
Ouafae El Aissaoui, Yasser El Madani El Alami, Lahcen Oughdir,
and Youssouf El Allioui
Toward Adaptive and Reusable Learning Content Using XML
Dynamic Labeling Schemes and Relational Databases . . . . . . . . . . . . . 787
Zakaria Bousalem, Inssaf El Guabassi, and Ilias Cherti
Contents xv

A Honey Net, Big Data and RNN Architecture for Automatic


Security Monitoring of Information System . . . . . . . . . . . . . . . . . . . . . 800
Alaeddine Boukhalfa, Nabil Hmina, and Habiba Chaoui
A New Langage for Adaptatif System Structured Decision
Network Language (SDNL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 809
Soumaya El Mamoune, Mostafa Ezziyyani, and Maroi Tsouli Fathi
Localization and Tracking System Using Wi-Fi Signal Strength
with Wireless Sensors Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Douae Zbakh, Abdelouahid Lyhyaoui, and Mariam Tanana
A Comparative Study of Standard Part-of-Speech Taggers . . . . . . . . . 830
Imad Zeroual and Abdelhak Lakhouaja
Model-Based Security Implementation on Internet of Things . . . . . . . . 841
Yasmina Andaloussi and Moulay Driss El Ouadghiri
Performance Evaluation of Multicast Routing Protocols in MANET . . . 847
Safaa Laqtib, Khalid El Yassini, and Moulay Lahcen Hasnaoui
Analysis of Speaker’s Voice in Cepstral Domain Using MFCC
Based Feature Extraction and VQ Technique for Speaker
Identification System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857
Mariame Jenhi, Ahmed Roukhe, and Laamari Hlou
A New RFID Middleware and BagTrac Application . . . . . . . . . . . . . . 869
Yassir Rouchdi, Achraf Haibi, Khalid El Yassini,
Mohammed Boulmalf, and Kenza Oufaska
Portfolio Construction Using KPCA and SVM: Application
to Casablanca Stock Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 885
Anass Nahil and Lyhyaoui Abdelouahid
Sorting Decisions in Group Decision Making . . . . . . . . . . . . . . . . . . . . 896
Djamila Bouhalouan, Mohammed Frendi, Abdelkader Ould-Mahraz,
and Abdelkader Adla
Immune Based Genetic Algorithm to Solve a Combinatorial
Optimization Problem: Application to Traveling
Salesman Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906
Ahmed Lahjouji El Idrissi, Chakir Tajani, Imad Krkri,
and Hanane Fakhouri
A Comparative Study of Vehicle Detection Methods . . . . . . . . . . . . . . 916
S. Baghdadi and N. Aboutabit
Connected Car & IoT: A Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 928
Asmaa Berdigh, Kenza Oufaska, and Khalid El Yassini
xvi Contents

An Enhanced Localization Approach for Three-Dimensional


Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 941
A. Hadir, K. Zine-Dine, M. Bakhouya, and J. El Kafi
Neural Networks Architecture for Amazigh POS Tagging . . . . . . . . . . 955
Samir Amri and Lahbib Zenkouar
A Comparative Study of RF MEMS Switch Test Methods . . . . . . . . . . 966
H. Baghdadi, M. Lamhamdi, K. Rhofir, and S. Baghdadi
A Deep Learning Model for Intrusion Detection . . . . . . . . . . . . . . . . . 976
Taha Ait Tchakoucht and Mostafa Ezziyyani
Dynamic Adaptation and Automatic Execution of Services
According to Ubiquitous Computing . . . . . . . . . . . . . . . . . . . . . . . . . . 984
Marwa Zaryouli and Mostafa Ezziyyani
Security and Risks for Cloud Environments . . . . . . . . . . . . . . . . . . . . . 991
Ahmed Ziani and Abdellatif Medouri
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1003
Intelligent Reservation Systems Based on MAS
& Data Mining Method

Oum Elhana Maamra(&) and Mohamed-Khireddine Kholladi(&)

Mathematical Department and Computer Science,


University El-Oeud, El Oued, Algeria
hanaoumelhana@gmail.com, kholladi@yahoo.fr

Abstract. The basic concepts of reservation system and management system


are discussed in this paper. The proposed “intelligent reservation system that is
based on a combination of multi-agents system and data mining techniques
makes intelligent reservation decisions whether to accept or reject a new client’s
request for reservation needed services. In the first step of the proposed model.
These reservation strategies are developed using integer aggregate results
database (ARD) with multi-agent system, it consists of the following agents:
Client Agent, Stock Agent, Agent Station, Aggregation Agent and Agent
Response. We preprogrammed our system to apply data mining methods in a
distributed way to retrieve information requested by client, the result obtained is
a local model of each station the latter sends to the aggregator to obtain the final
model that represents the customer response. The purpose of our proposal is to
reduce response time and resource consumption by storing responses in ARD.

Keywords: Multi-agent  Data mining  Intelligent reservation system

1 Introduction

Data mining is a generic term for a family of analysis tools particularly suited to the
exploitation of large masses of data. Data mining makes it possible, in particular, to
search for structures that are difficult to identify and correlations which are not very
noticeable with more conventional statistical analysis techniques.
The important question in the field of Data Mining is to be able to answer the
question: which tool should we use for which problem?
Depending on the type of problem, there are many competing Data Mining
methods. A general consensus seems to emerge to recognize that no method outper-
forms the others because they have all their specific strengths and weaknesses. It seems
more advantageous to cooperate methods. Data mining is the heart of the EDC process.
This phase uses multiple methods from statistics, machine learning, pattern recognition
or visualization. These methods can be divided into three categories:
• Visualization and description methods;
• Classification and structuring methods;
• And methods of explanation and prediction.

© Springer Nature Switzerland AG 2019


M. Ezziyyani (Ed.): AI2SD 2018, AISC 915, pp. 1–12, 2019.
https://doi.org/10.1007/978-3-030-11928-7_1
2 O. E. Maamra and M.-K. Kholladi

For that we choose the global Distribution System, (GDS) are electronic reserva-
tions management platforms that allow customers to know in real time the stock status
of the various suppliers of tourism products (airlines, rail and sea, hotel chain, car rental
companies, tour operators, etc.) and reserve remotely.
Computer reservation systems (CRS) allow you to reserve a resource or a service in
time for a person or a group. These systems are integrated in real estate (room, con-
ference room, tennis court, conference room), transport (car, train, boat, plane), tools
(saw, crane) under form of provision (rental, loan) from a specified time slot with, as
the case may be, the option of one or more persons.
Our approach based on the multi agent system and data mining to reserve all the
elements born for tourism in complex, useful and dynamic data structures. The client
can access the system through a platform.
In our system customers are divided into two types People and, Travel Agencies:
have privileges for example it can book for several people in various conditions. In
both cases, after the registration, the customer receives the registration confirmation
letter, which includes the cost of the trip from the transfer and residence according to
his request, confirming his registration to pay the fees within twenty-four hours if he
does not pay the fees his application will be canceled.
In this paper, we analyzed related work of reservation system and we proposed
intelligent system for reservation based on multi-agent system, we analyzed different
reservation model, and we discuss the performance of each one. The contribution of the
paper is as:
1. We analyzed reservation system existent in Literature and we proposed model of
reservation system based on MAS.
2. Proposed architecture of reservation system.
3. The rest of the paper is organized as follows, Sect. 2 describes related work about
reservation system, In Sect. 3, all detailed of our contribution. Decision and con-
clusion are in Sects. 4 and 5, respectively.

2 Related Work

The internet has become an integral part of a modern society helping revolutionize how
businesses are conducted and our personal lives, the used of Internet has led to the
emergence of a variety of electronic services, e-services. Electronic ticket, or e-ticket, is
an example of such a class of e-services. E-tickets give evidence to their holders to
have permission to enter a place of entertainment, use a means of transportation, or
have access to some Internet services. Users can get the e-tickets by purchasing them
from a web server, or simply receiving from a vendor, or from another user who
previously acquired them. E-tickets can be stored in desktop computers or personal
digital assistants for future use [1].
For that we study the related works, among them we can quote the works of:
Intelligent Reservation Systems Based on MAS & Data Mining Method 3

2.1 System of Reservation


In 2014 Oloyede propose a bus reservation system in Nigeria was developed using
Extensible Hypertext Markup Language (XHTML), PHP Hypertext Preprocessor
(PHP), Ajax, Cascading Style Sheet (CSS), and JavaScript. The system has a relational
database modeled by Structure Query Language (SQL) [2].
In 2014 Ogirima propose an Online computerized Hotel Management System
(HMS), the system has a relational database modeled by Structure Query Language
(SQL). The author describe his system and presented comparison of Online HMS and
Manual Hotel Management System. The result indicates that users prefer online Hotel
management to conventional Hotel management Services in terms of ease of use,
accessibility and security in the study area [3].
In other work 2010, the author proposed an intelligent agent-based hotel search and
booking system that will undertake the bulk of the search and booking of hotels for
various users. The system provided users with the ability to enter some criteria for the
search and then perform the search base on those criteria and book the most appropriate
hotel base on the user’s confirmation. These are carried out using JADE-LEAP on
user’s mobile device [4].
In 2014, Bemile proposed online Hotel Reservation System that allows customers
to make inquiries online and book for services providing the required details. Of the
system feature make sure that potential guests get the correct information, such as room
rates and hotel location. It adopts the virtual tour feature in the Shangri-La Hotel in
Singapore. The tools developed this system are Apache, MySQL and PHP was used for
the server programming which is basically queries used to link the website to the
database [5].
Other work, Bhagat proposed perceptive car parking booking system with IOT
technology. The system of Bhagat consists of different modules like server, database,
user application and parking slot arrangement. The mechanism of parking slot it is an
Arduino UNO and Ultrasonic sensor. Arduino is used for managing ultrasonic sensor
and entry gate. The ultrasonic sensor is useful for detecting the car position. When user
will scan QR code at the parking slot that time user will be charged or pay for a time
duration which is user already mention at the slot booking time through android
application. A user must first download the android application in his android mobile
phone. After user must goes only one time for registration with specific id (using
AADHAR CARD no. or License no.) using the application. Then registered user
information is sent to the server system and data stored in the database. The parking
slot information is also stored in the database which is always updated, and servers
manages and updates this information and keep sending notification to the user after
parking slot booking. For manage parking locations and user database system, the
authors provide a website for the Admin user [6].
In Table 1, we compare the president’s works of the online reservation system such
that the comparison lines are Search and booking method, multidimensional model and
Domain application
As a general summary, the majority works that deal with the reservation system
used for search and booking the classic method (Query SQL) and used the simple
database. A domain of application of this works is a part of our system.
4 O. E. Maamra and M.-K. Kholladi

Table 1. Comparison between different systems


Works Online reservation system such
Search and booking Multidimensional Domain application
method model
Oloyede [2] Request SQL Non Bus reservation
Ogirima [3] Request SQL Non Online computerized
hotel management
Sankaranarayanan Intelligent agent Non Hotel search and
[4] booking
Bemile [13] Request SQL Non Hotel reservation
Bhagat [6] Arduino UNO and Non Perceptive car parking
Ultrasonic sensor booking

2.2 Data Base


In 2003 Vrdoljak propose a method for building an XML data warehouse from the
Web. They are based on XML schemas that write and validate the source data. The
method involves extracting XML schemas from data sources, building and trans-
forming these schemas into data graphs, identifying the facts, and finally building a
logical XML schema that validates the data in the warehouse. The authors implement a
prototype that takes an XML schema as input and outputs a logical schema of the
warehouse [7].
The method of Rusu in 2005 is based on the XQuery2 language to build an XML
data warehouse. The proposed method covers the processes of extracting, transforming,
aggregating, and integrating XML data into the warehouse. All of these steps are based
on the XQuery language and aim to minimize duplication and errors in the warehouse
data [8].
In 2006 Boussaid define themselves as a warehouse by an XML schema.
The authors implement a prototype, named X-Warehousing, for storing complex data.
The user analysis requirements as well as the source XML documents are represented
by XML schemas. These patterns are transformed into attribute trees. The method then
applies pruning and/or grafting functions on these trees to construct a final attribute tree
that represents the warehouse schema. In this type of a warehouse, each fact, as well as
the corresponding dimensions, is stored in an XML document. The resulting XML
document set constitutes an XML data cube. The authors define this set as a context of
analysis [9].
Park in 2005, offer a platform for online analysis of XML documents named XML-
OLAP. The authors rely on an XML data warehouse where the facts are represented by
a collection of XML documents and each dimension by another collection of XML
documents. Authors represent each fact by an XML document. This representation is
inspired by that adopted by Nassis. In 2005, an XML document of a dimension
collection stores an instance of the hierarchy of a dimension. The authors claim that this
eliminates the join operations between the hierarchical levels of a dimension. To query
the XML data warehouse the authors propose a multidimensional expression language:
XML-MDX [10].
Intelligent Reservation Systems Based on MAS & Data Mining Method 5

In 2009 Zanoun proposed a neural approach that reduces the data cube fragmen-
tation by building a new representation space. It consists of eliminating irrelevant
exogenous variables by minimizing connections and selecting non-applicable indi-
viduals to mitigate the negative effect of sparse by organizing the cells of a data cube
[11].
Bentayeb in 2007 proposes a UML meta model describing complex data in the
form of complex object classes according to the object paradigm. A complex object is
composed of different basic elements according to the type of data to which they
belong (text, image, sound, video, materialized relational view). After instantiation of
the meta model, the obtained UML model can be translated directly into XML logical
schema, whether it is expressed using a DTD or using the XML-Schema language.
Finally, the XML logic model is translated into a physical model as XML documents.
From the logical model and complex data, valid XML documents are generated. These
can be finally stored either in a native XML database or in a relational database via a
mapping process. The relational model obtained at the end of this process defines low-
level links, to define the semantic links between the different documents the authors use
the techniques of the data mining that aid to the multi-dimensional modeling of the
complex data [12].
In the following table we compare the president’s works of the databases such that
the comparison lines are Multidimensional model, Data type and Representation of
facts and dimensions.
As a general summary the work that deals with the storage of XML data varies by
their approach to building the warehouse and cover more or less the various stages of
the storage process: ETL (Extraction, Transformation and Loading), modeling and
analysis. Some propose to process the data directly from their sources, others favor the
loading into a data warehouse modeled by a star schema. Some also offer analysis
operators specific to XML data. This work is summarized in Table 2. The symbol “+”
indicates that an approach deals with a step in the storage process.

Table 2. Comparison between different approaches


Works Databases
Multidimensional model Data type Representation of
facts and dimensions
Vrdoljak [7] – Web –
Rusu [8] + Heterogeneous +
Park [10] + Heterogeneous +
Boussaid [5] + Heterogeneous –
Bentayeb [12] + Heterogeneous +
Zanoun [11] + Cube +
6 O. E. Maamra and M.-K. Kholladi

3 Methodologies

The tourist agencies are the only link between the countries which guarantees the
traveler’s comfort and safety in his journey and travel, the manual use of ticket
reservation is presently very strenuous and also consumes a lot of time.
For example the services in case of a hotel, we generally want to choose the best
hotel in prime sites, with modern facilities, clean environment, and affordable rates.
This can be time-consuming and sometimes costly when doing this on our own
physical or using human agents. The advent of the World Wide Web or internet (as we
know) changed the landscape of communication and the way we conduct business
dramatically, allowing us to reach beyond boundaries once separated by miles of
oceans. Information that one took days and in some cases weeks, can now be received
in a matter of seconds, This technology has grown significantly over the years and has
been interfaced with other technologies such as smart phones, PDAs and other forms of
wired and wireless networking devices, propagating the ability to receive information
and conduct business on the go at the finger tip. With this background in mind we have
proposed a digital tourism agency, the customer is allowed to book travel from any
place and at any time according to him conditions required and in a short time [3, 13].
Our system includes an aggregate results database as requested by the customers
that is when the user enters the booking request status the answer is immediate. The
presence of these collected results helps speed up the customer service. this database
managed by a task manager that connects with workstations which manage distributed
and different databases for hotels, airports, land transport stations as well as tour guides
and on the other hand with clients. Figure 1 shows the architecture of our system.

3.1 Task Manager


The task manager of our study is a multi-agent system intelligent (instead of the human
agent) to perform similar search and booking activities that can improve the speed of
the search and reduce cost significantly, but the question here is why the multi-agent
system, and what is the agent?

Definition of agent. An agent is called a physical or virtual entity has these features [14]:
1. who is able to act in an environment,
2. who can communicate directly with other agents,
3. that is driven by a set of trends (in the form of individual goals or a function of
satisfaction, or even survival, which it seeks to optimize),
4. who has own resources,
5. who is able to perceive (but in a limited way) his environment,
6. which only has a partial representation of this environment (and possibly none),
7. who has skills and offers services,
8. who can possibly reproduce,
9. whose behavior tends to meet its objectives, taking into account the resources and
expertise at its disposal, and in terms of its perception, representations and the
communications it receives.
Intelligent Reservation Systems Based on MAS & Data Mining Method 7

Fig. 1. Architecture of our system

Agents enjoy autonomy. This means that they are not driven by commands from
the user (or another agent), but by a set of trends that can take the form of individual
goals to fulfill.
He has the opportunity to answer yes or no to requests from other agents. It
therefore has a certain freedom of maneuver, which differentiates it from all similar
concepts, which they call “objects”, “software modules” or “processes”. But autonomy
is not only behavioral, it is also about resources. To act, the agent needs a number of
resources: energy, CPU, amount of memory, access to certain sources of information,
etc. These resources are both what makes the agent not only dependent on his envi-
ronment, but also, by being able to handle these [14].

Definition of multi-agent system. A multi-agent system (SMA) is a system composed


of the following elements [14]:
• An environment E, that is to say a space generally having a metric.
• A set of objects O. These objects are located, that is to say that, for any object, it is
possible, at a given moment, to associate a position in E. These objects are passive,
c that is, they can be perceived, created, destroyed and modified by agents.
8 O. E. Maamra and M.-K. Kholladi

• A set of agents, which are particular objects (A  O), which represent the active
entities of the system.
• A set of relations R which unite objects (and thus agents) between them.
• A set of Op operations that allow A’s agents to perceive, produce, consume,
transform, and manipulate O objects.
• Operators to represent the application of these operations and the reaction of the
world to this attempt to change, which will be called the laws of the universe.
Our task manager is multi-agent system composed of the following agents: Client
Agent, Stock Agent, Agent Station, Aggregation Agent and Agent Response.
Communication Between Agents
Communications between our manager’s agents through the exchange of Different
messages, Fig. 2 represents this communication.

Fig. 2. Communication between agents in our task manager

Communication Scenario Between Agents

– Client Agent. Receives the message from clients, and sends this message to the store
and informs the response agent.
– Agent stock. receives the client agent message, then searches the BR, if the result
exists sending the response to the response agent, else sending the message to the
agent station.
– Station Agent. Merges the message to the workstation, and informs the Aggregation
Agent.
– Aggregator agent. Receives and aggregates responses, and sends responses to the
stock agent.
Intelligent Reservation Systems Based on MAS & Data Mining Method 9

– Stock Agent. Sends a copy of the results to the client agent, and stores another copy
in the results database.
– Response Agent. Receives the stock agent message, and sends the response to the
client.

3.2 B. Work Stations


The work stations of our study are warehouses of different and distributed data, we
apply the methods of data mining for extraction of data requested by the customer. The
question asked here for what to use the methods of excavations?
Now a day’s large quantities of data are being accumulated up to millions or
trillions of bytes of data. Data mining, the extraction of hidden predictive information
from large databases, is a powerful new technology with great potential to help
companies focus on the most important information in their data warehouses. The
automated, prospective analyses offered by data mining move beyond the analyses of
past events provided by retrospective tools typical of decision support systems. Data
mining tools can answer business questions that traditionally were too time-consuming
to resolve [15].
For our system we have a four work stations:
• Hotel Work Stations: allows extracting hotel knowledge requested by the customer.
• Airport Work Stations: allows you to extract the knowledge of the aircraft schedule
requested by the customer.
• Tour operator workstations: allows extracting the tour operator knowledge
requested by the customer.
• Railway and marine railway stations: allows you to extract the knowledge of the
railway and maritime requested by the customer.
Figure 3 represents apply of Work stations.

Fig. 3. Apply of work stations


10 O. E. Maamra and M.-K. Kholladi

To extract the knowledge that requested by the customer,


1. Each station applies data mining algorithms in complex data warehouses;
2. The result obtained is a local model of each station;
3. Each station sends this model to the aggregator to obtain the final model.

3.3 Data Warehouses


The data warehouses of our system are complex because they contain heterogeneous
data from various sources to facilitate the use of these warehouses; we seek to propose
a restructuring of these data.

3.4 Customers
In our system customers are divided into two types People and, Travel Agencies: have
privileges for example it can book for several people in various conditions. In both
cases, after the registration, the customer receives the registration confirmation letter,
which includes the cost of the trip from the transfer and residence according to his
request, confirming his registration to pay the fees within twenty-four hours if he does
not pay the fees his application will be canceled.

4 Expected Result

Data mining, or data mining, is the set of methods and techniques intended for the
exploration and analysis of computer databases (often large), automatically or semi-
automatically, in order to detect in these data rules, associations, unknown or hidden
trends, particular structures rendering most of the useful information while reducing the
amount of data [16]. The purpose of this knowledge represent in:
• describe the current behavior of the data and/or,
• Predict the future behavior of the data.
These points make it possible to predict the customer’s requests, which help us to
create the database collected from the various data warehouses.
On the other hand, A multi-agent system consists of a set of computer processes
taking place at the same time, thus of several agents living at the same time, sharing
common resources and communicating with each other. The key point of multi-agent
systems lies in the formalization of the coordination between the agents [17].
Thus, an SMA is a system composed of an environment; a set of objects in the
environment that can be perceived, created, destroyed and modified by agents; a set of
agents able to perceive, produce, consume, transform and manipulate the objects of the
environment; a set of communications uniting agents and finally an administrator
responsible for controlling the activation of agents [9].
This information confirms to us the importance of a multi-agent system in our
project because it achieves the constant mobility of information under the agents’
systems.
Intelligent Reservation Systems Based on MAS & Data Mining Method 11

5 Conclusion

In this paper, we have proposed a new architecture of reservation system. The proposed
architecture is based on MSA & data mining method for finding the optimized the time
to retrieve information from a large, heterogeneous and distributed database to mini-
mize the waste of network resources and maximize interaction with a user. The per-
spective of this work we make a restructuring on data warehouses then we choose the
method of data mining that we will apply on the databases to extract the information.

References
1. Saleem, H., Ali Khan, M.Z., Afzal, S.: Mobile agents: an intelligent multi-agent system for
mobile phones. J. Comput. Eng. IOSRJCE. ISSN: 2278-0661, Sept–Oct 2012
2. Oloyede, M.O., Alaya, S.M., Adewole, K.S.: Development of an online bus ticket
reservation system for a transportation service in Nigeria. J. Comput. Eng. Intell. Syst. 5(12),
ISSN 2222-1719 (2014)
3. Ogirima, S.A.O., Awode, T.R., Adeosun, O.O.: Online computerized hotel management
system. J. Comput. Biosci. Eng., ISSN: 2348-7321, 2 Apr 2014
4. Sankaranarayanan, S.: Intelligent agent based hotel search & booking system. In: 9th
WSEAS International Conference on Telecommunications and Informatics, ISSN: 1790-
5117 (2010)
5. Boussaid, O., Messaoud, R.B., Choquet, R., Anthoard, S.: X-warehousing: an XML-based
approach for warehousing complex data. In: 10th East-European Conference on Advances in
Databases and Information Systems, ADBIS 2006. Lecture Notes in Computer Science, vol.
4152, pp. 39–54. Springer, Thessaloniki, Greece (2006)
6. Bhagat, S.S., Bagul, A.D., Patil, P.N., Dahale, S.A.: Perceptive car parking booking system
with IOT technology. Int. Res. J. Eng. Technol. IRJET, ISSN: 2395-0072, Feb 2018
7. Vrdoljak, B., Banek, M., Rizzi, S.: Designing web warehouses from XML schemas. In: 5th
International Conference on Data Warehousing and Knowledge Discovery, DaWaK 2003.
Lecture Notes in Computer Science, vol. 2737, pp. 89–98. Springer, Prague, Czech Republic
(2003)
8. Rusu, L.I., Rahayu, J.W., Taniar, D.: A methodology for building XML data warehouse. Int.
J. Data Warehous. Min. 1(2), 67–92 (2005)
9. Boussaid, O., Bentayeb, F., Darmont, J., Rabaseda, S: Towards complex data warehousing
structuring, integration and analysis. In: RSTI-ISI. Semistructured databases, vol. 8(0),
pp. 79–107 (2003)
10. Park, B.K., Han, H., Song, I.Y.: XML-OLAP: a multidimensional analysis framework for
XML warehouses. In: 7th International Conference on Data Warehousing and Knowledge
Discovery, DaWaK 2005. Lecture Notes in Computer Science, vol. 3589, pp. 32–42.
Springer (2005)
11. Zanoun, N., Atmani, B., Adellouhab, F.Z.: Towards a reorganization of cubes of data by a
neuronal approach dedicated to visualization. In: 4th Edition of the Conference on Advances
of Decisional Systems, pp. 1–16 (2009)
12. Bentayeb, F., Darmont, J., Udrea, C.: Efficient integration of data mining techniques in
database management systems. In: 8th International Database Engineering and Applications
Symposium, IDEAS 2004. IEEE Computer Society, Coimbra, Portugal, pp. 59–67, July
2004
12 O. E. Maamra and M.-K. Kholladi

13. Bemile1, R., Achampong, A., Danquah, E.: Online hotel reservation system. Int. J. Innov.
Sci. Eng. Technol., ISSN 2348-7968, Nov 2014
14. Ferber, J.: Les Systèmes Multi Agents: Vers Une Intelligence Collective, pp. 26–29. Enter
Edition, 513p (1995)
15. Sangeetha, K.V., Rajeshwari, P.: Data mining and warehousing. J. Comput. Appl. 5
(EICA2012-1), ISSN: 0974-1925 (2012)
16. Kantardzic, M.: Data Mining-Concepts, Models, Methods, and Algorithms. IEEE Press,
Piscataway, NJ, USA (2003)
17. Klusch, M.: Information agent technology for the internet: a survey. In: Fensel, D. (ed.)
J. Data Knowl. Eng. Spec. Issue Intell. Inf. Int. 36(3) (2001)
A Lightweight Ciphertext-Policy
Attribute-Based Encryption for Fine-Grained
Access Control

Hassan El Gafif(&), Naima Meddah, and Ahmed Toumanari

National School of Applied Sciences, Ibn Zohr University, Agadir, Morocco


hassan.elgafif@edu.uiz.ac.ma

Abstract. With the expansion of data, companies start to look for new efficient
and cheap alternatives to store, share and manage their data. In this regard, cloud
storage services appeared to fill this gap by providing a huge amount of com-
puting resources ensuring data availability and efficient data management with
low cost due to the pay-as-you-go payment-model adopted by cloud providers.
However, by outsourcing their sensitive data (financial data, health records …),
companies will no longer be in control of them, so this arises big challenges
related to the confidentiality and data security against attackers (in case of
compromised cloud servers) and even against curious cloud providers. There-
fore, encrypting data before outsourcing them is the only way that gives to the
data owners the control over their data. However, using traditional public key
cryptography in a data-sharing context produces an unnecessary communication
and computation overhead since for each targeted user, the data owner needs to
encrypt a copy of data with the corresponding user’s public key. To fix this
problem, many attribute-based encryption (ABE) schemes were proposed. In the
ABE model, the encryption process is done based on the attributes instead of a
unique public key, and users with matching attributes can decrypt the ciphertext,
so data owners in this model don’t need to generate many copies of the same
data as in the traditional cryptosystems. However, these schemes still require a
huge computational power and communication cost since they are based on
expensive bilinear pairing and modular exponentiation operations. We propose a
lightweight version of the Ciphertext-Policy Attribute-Based Encryption (CP-
ABE) using elliptic curve cryptography and scalar point multiplications, instead
of bilinear pairings and modular exponentiations, to ensure a fine-grained access
control with less computation cost and shorter keys and ciphertexts. The results
show that our scheme improves the execution efficiency and requires a low-cost
communication and storage.

Keywords: Cloud computing  Fine-grained access control  Elliptic curve


cryptography  Attribute-Based encryption

1 Introduction

Cloud Computing, according to NIST, “is a model for enabling convenient, on-demand
network access to a shared pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly provisioned and released
© Springer Nature Switzerland AG 2019
M. Ezziyyani (Ed.): AI2SD 2018, AISC 915, pp. 13–23, 2019.
https://doi.org/10.1007/978-3-030-11928-7_2
Another random document with
no related content on Scribd:
sense of the word that is hardly accessible to our minds)—into
periodic functions, and their passage thence into an infinite number-
realm, in which they become series and not the smallest trace
remains of the Euclidean figure. In all parts of that realm the circle-
number π, like the Napierian base ε, generates relations of all sorts
which obliterate all the old distinctions of geometry, trigonometry and
algebra, which are neither arithmetical nor geometrical in their
nature, and in which no one any longer dreams of actually drawing
circles or working out powers.
IX
At the moment exactly corresponding to that at which (c. 540) the
Classical Soul in the person of Pythagoras discovered its own proper
Apollinian number, the measurable magnitude, the Western soul in
the persons of Descartes and his generation (Pascal, Fermat,
Desargues) discovered a notion of number that was the child of a
passionate Faustian tendency towards the infinite. Number as pure
magnitude inherent in the material presentness of things is paralleled
by numbers as pure relation,[64] and if we may characterize the
Classical “world,” the cosmos, as being based on a deep need of
visible limits and composed accordingly as a sum of material things,
so we may say that our world-picture is an actualizing of an infinite
space in which things visible appear very nearly as realities of a
lower order, limited in the presence of the illimitable. The symbol of
the West is an idea of which no other Culture gives even a hint, the
idea of Function. The function is anything rather than an expansion
of, it is complete emancipation from, any pre-existent idea of
number. With the function, not only the Euclidean geometry (and with
it the common human geometry of children and laymen, based on
everyday experience) but also the Archimedean arithmetic, ceased
to have any value for the really significant mathematic of Western
Europe. Henceforward, this consisted solely in abstract analysis. For
Classical man geometry and arithmetic were self-contained and
complete sciences of the highest rank, both phenomenal and both
concerned with magnitudes that could be drawn or numbered. For
us, on the contrary, those things are only practical auxiliaries of daily
life. Addition and multiplication, the two Classical methods of
reckoning magnitudes, have, like their sister geometrical-drawing,
utterly vanished in the infinity of functional processes. Even the
power, which in the beginning denotes numerically a set of
multiplications (products of equal magnitudes), is, through the
exponential idea (logarithm) and its employment in complex,
negative and fractional forms, dissociated from all connexion with
magnitude and transferred to a transcendent relational world which
the Greeks, knowing only the two positive whole-number powers that
represent areas and volumes, were unable to approach. Think, for
instance, of expressions like ε-x, π√x, α1⁄i.
Every one of the significant creations which succeeded one
another so rapidly from the Renaissance onward—imaginary and
complex numbers, introduced by Cardanus as early as 1550; infinite
series, established theoretically by Newton’s great discovery of the
binomial theorem in 1666; the differential geometry, the definite
integral of Leibniz; the aggregate as a new number-unit, hinted at
even by Descartes; new processes like those of general integrals;
the expansion of functions into series and even into infinite series of
other functions—is a victory over the popular and sensuous number-
feeling in us, a victory which the new mathematic had to win in order
to make the new world-feeling actual.
In all history, so far, there is no second example of one Culture
paying to another Culture long extinguished such reverence and
submission in matters of science as ours has paid to the Classical. It
was very long before we found courage to think our proper thought.
But though the wish to emulate the Classical was constantly present,
every step of the attempt took us in reality further away from the
imagined ideal. The history of Western knowledge is thus one of
progressive emancipation from Classical thought, an emancipation
never willed but enforced in the depths of the unconscious. And so
the development of the new mathematic consists of a long, secret
and finally victorious battle against the notion of magnitude.[65]
X
One result of this Classicizing tendency has been to prevent us
from finding the new notation proper to our Western number as such.
The present-day sign-language of mathematics perverts its real
content. It is principally owing to that tendency that the belief in
numbers as magnitudes still rules to-day even amongst
mathematicians, for is it not the base of all our written notation?
But it is not the separate signs (e.g., χ, π, ς) serving to express the
functions but the function itself as unit, as element, the variable
relation no longer capable of being optically defined, that constitutes
the new number; and this new number should have demanded a
new notation built up with entire disregard of Classical influences.
Consider the difference between two equations (if the same word
can be used of two such dissimilar things) such as 3x + 4x = 5x
and xn + yn = zn (the equation of Fermat’s theorem). The first
consists of several Classical numbers—i.e., magnitudes—but the
second is one number of a different sort, veiled by being written
down according to Euclidean-Archimedean tradition in the identical
form of the first. In the first case, the sign = establishes a rigid
connexion between definite and tangible magnitudes, but in the
second it states that within a domain of variable images there exists
a relation such that from certain alterations certain other alterations
necessarily follow. The first equation has as its aim the specification
by measurement of a concrete magnitude, viz., a “result,” while the
second has, in general, no result but is simply the picture and sign of
a relation which for n>2 (this is the famous Fermat problem[66]) can
probably be shown to exclude integers. A Greek mathematician
would have found it quite impossible to understand the purport of an
operation like this, which was not meant to be “worked out.”
As applied to the letters in Fermat’s equation, the notion of the
unknown is completely misleading. In the first equation x is a
magnitude, defined and measurable, which it is our business to
compute. In the second, the word “defined” has no meaning at all for
x, y, z, n, and consequently we do not attempt to compute their
“values.” Hence they are not numbers at all in the plastic sense but
signs representing a connexion that is destitute of the hallmarks of
magnitude, shape and unique meaning, an infinity of possible
positions of like character, an ensemble unified and so attaining
existence as a number. The whole equation, though written in our
unfortunate notation as a plurality of terms, is actually one single
number, x, y, z being no more numbers than + and = are.
In fact, directly the essentially anti-Hellenic idea of the irrationals is
introduced, the foundations of the idea of number as concrete and
definite collapse. Thenceforward, the series of such numbers is no
longer a visible row of increasing, discrete, numbers capable of
plastic embodiment but a unidimensional continuum in which each
“cut” (in Dedekind’s sense) represents a number. Such a number is
already difficult to reconcile with Classical number, for the Classical
mathematic knows only one number between 1 and 3, whereas for
the Western the totality of such numbers is an infinite aggregate. But
when we introduce further the imaginary (√-1 or i) and finally the
complex numbers (general form a + bi), the linear continuum is
broadened into the highly transcendent form of a number-body, i.e.,
the content of an aggregate of homogeneous elements in which a
“cut” now stands for a number-surface containing an infinite
aggregate of numbers of a lower “potency” (for instance, all the real
numbers), and there remains not a trace of number in the Classical
and popular sense. These number-surfaces, which since Cauchy
and Riemann have played an important part in the theory of
functions, are pure thought-pictures. Even positive irrational number
(e.g., √2) could be conceived in a sort of negative fashion by
Classical minds; they had, in fact, enough idea of it to ban it as
ἄῤῥητος and ἄλογος. But expressions of the form x + yi lie beyond
every possibility of comprehension by Classical thought, whereas it
is on the extension of the mathematical laws over the whole region
of the complex numbers, within which these laws remain operative,
that we have built up the function theory which has at last exhibited
the Western mathematic in all purity and unity. Not until that point
was reached could this mathematic be unreservedly brought to bear
in the parallel sphere of our dynamic Western physics; for the
Classical mathematic was fitted precisely to its own stereometric
world of individual objects and to static mechanics as developed
from Leucippus to Archimedes.
The brilliant period of the Baroque mathematic—the counterpart of
the Ionian—lies substantially in the 18th Century and extends from
the decisive discoveries of Newton and Leibniz through Euler,
Lagrange, Laplace and D’Alembert to Gauss. Once this immense
creation found wings, its rise was miraculous. Men hardly dared
believe their senses. The age of refined scepticism witnessed the
emergence of one seemingly impossible truth after another.[67]
Regarding the theory of the differential coefficient, D’Alembert had to
say: “Go forward, and faith will come to you.” Logic itself seemed to
raise objections and to prove foundations fallacious. But the goal
was reached.
This century was a very carnival of abstract and immaterial
thinking, in which the great masters of analysis and, with them,
Bach, Gluck, Haydn and Mozart—a small group of rare and deep
intellects—revelled in the most refined discoveries and speculations,
from which Goethe and Kant remained aloof; and in point of content
it is exactly paralleled by the ripest century of the Ionic, the century
of Eudoxus and Archytas (440-350) and, we may add, of Phidias,
Polycletus, Alcamenes and the Acropolis buildings—in which the
form-world of Classical mathematic and sculpture displayed the
whole fullness of its possibilities, and so ended.
And now for the first time it is possible to comprehend in full the
elemental opposition of the Classical and the Western souls. In the
whole panorama of history, innumerable and intense as historical
relations are, we find no two things so fundamentally alien to one
another as these. And it is because extremes meet—because it may
be there is some deep common origin behind their divergence—that
we find in the Western Faustian soul this yearning effort towards the
Apollinian ideal, the only alien ideal which we have loved and, for its
power of intensely living in the pure sensuous present, have envied.

XI
We have already observed that, like a child, a primitive mankind
acquires (as part of the inward experience that is the birth of the ego)
an understanding of number and ipso facto possession of an
external world referred to the ego. As soon as the primitive’s
astonished eye perceives the dawning world of ordered extension,
and the significant emerges in great outlines from the welter of mere
impressions, and the irrevocable parting of the outer world from his
proper, his inner, world gives form and direction to his waking life,
there arises in the soul—instantly conscious of its loneliness—the
root-feeling of longing (Sehnsucht). It is this that urges “becoming”
towards its goal, that motives the fulfilment and actualizing of every
inward possibility, that unfolds the idea of individual being. It is the
child’s longing, which will presently come into the consciousness
more and more clearly as a feeling of constant direction and finally
stand before the mature spirit as the enigma of Time—queer,
tempting, insoluble. Suddenly, the words “past” and “future” have
acquired a fateful meaning.
But this longing which wells out of the bliss of the inner life is also,
in the intimate essence of every soul, a dread as well. As all
becoming moves towards a having-become wherein it ends, so the
prime feeling of becoming—the longing—touches the prime feeling
of having-become, the dread. In the present we feel a trickling-away,
the past implies a passing. Here is the root of our eternal dread of
the irrevocable, the attained, the final—our dread of mortality, of the
world itself as a thing-become, where death is set as a frontier like
birth—our dread in the moment when the possible is actualized, the
life is inwardly fulfilled and consciousness stands at its goal. It is the
deep world-fear of the child—which never leaves the higher man, the
believer, the poet, the artist—that makes him so infinitely lonely in
the presence of the alien powers that loom, threatening in the dawn,
behind the screen of sense-phenomena. The element of direction,
too, which is inherent in all “becoming,” is felt owing to its inexorable
irreversibility to be something alien and hostile, and the human will-
to-understanding ever seeks to bind the inscrutable by the spell of a
name. It is something beyond comprehension, this transformation of
future into past, and thus time, in its contrast with space, has always
a queer, baffling, oppressive ambiguity from which no serious man
can wholly protect himself.
This world-fear is assuredly the most creative of all prime feelings.
Man owes to it the ripest and deepest forms and images, not only of
his conscious inward life, but also of the infinitely-varied external
culture which reflects this life. Like a secret melody that not every ear
can perceive, it runs through the form-language of every true art-
work, every inward philosophy, every important deed, and, although
those who can perceive it in that domain are the very few, it lies at
the root of the great problems of mathematics. Only the spiritually
dead man of the autumnal cities—Hammurabi’s Babylon, Ptolemaic
Alexandria, Islamic Baghdad, Paris and Berlin to-day—only the pure
intellectual, the sophist, the sensualist, the Darwinian, loses it or is
able to evade it by setting up a secretless “scientific world-view”
between himself and the alien. As the longing attaches itself to that
impalpable something whose thousand-formed elusive
manifestations are comprised in, rather than denoted by, the word
“time,” so the other prime feeling, dread, finds its expression in the
intellectual, understandable, outlinable symbols of extension; and
thus we find that every Culture is aware (each in its own special way)
of an opposition of time and space, of direction and extension, the
former underlying the latter as becoming precedes having-become. It
is the longing that underlies the dread, becomes the dread, and not
vice versa. The one is not subject to the intellect, the other is its
servant. The rôle of the one is purely to experience, that of the other
purely to know (erleben, erkennen). In the Christian language, the
opposition of the two world-feelings is expressed by: “Fear God and
love Him.”
In the soul of all primitive mankind, just as in that of earliest
childhood, there is something which impels it to find means of
dealing with the alien powers of the extension-world that assert
themselves, inexorable, in and through space. To bind, to bridle, to
placate, to “know” are all, in the last analysis, the same thing. In the
mysticism of all primitive periods, to know God means to conjure
him, to make him favourable, to appropriate him inwardly. This is
achieved, principally, by means of a word, the Name—the “nomen”
which designates and calls up the “numen”—and also by ritual
practices of secret potency; and the subtlest, as well as the most
powerful, form of this defence is causal and systematic knowledge,
delimitation by label and number. In this respect man only becomes
wholly man when he has acquired language. When cognition has
ripened to the point of words, the original chaos of impressions
necessarily transforms itself into a “Nature” that has laws and must
obey them, and the world-in-itself becomes a world-for-us.[68]
The world-fear is stilled when an intellectual form-language
hammers out brazen vessels in which the mysterious is captured
and made comprehensible. This is the idea of “taboo,”[69] which plays
a decisive part in the spiritual life of all primitive men, though the
original content of the word lies so far from us that it is incapable of
translation into any ripe culture-language. Blind terror, religious awe,
deep loneliness, melancholy, hate, obscure impulses to draw near, to
be merged, to escape—all those formed feelings of mature souls are
in the childish condition blurred in a monotonous indecision. The two
senses of the word “conjure” (verschwören), meaning to bind and to
implore at once, may serve to make clear the sense of the mystical
process by which for primitive man the formidable alien becomes
“taboo.” Reverent awe before that which is independent of one’s self,
things ordained and fixed by law, the alien powers of the world, is the
source from which the elementary formative acts, one and all, spring.
In early times this feeling is actualized in ornament, in laborious
ceremonies and rites, and the rigid laws of primitive intercourse. At
the zeniths of the great Cultures those formations, though retaining
inwardly the mark of their origin, the characteristic of binding and
conjuring, have become the complete form-worlds of the various arts
and of religious, scientific and, above all, mathematical thought. The
method common to all—the only way of actualizing itself that the
soul knows—is the symbolizing of extension, of space or of things;
and we find it alike in the conceptions of absolute space that pervade
Newtonian physics, Gothic cathedral-interiors and Moorish mosques,
and the atmospheric infinity of Rembrandt’s paintings and again the
dark tone-worlds of Beethoven’s quartets; in the regular polyhedrons
of Euclid, the Parthenon sculptures and the pyramids of Old Egypt,
the Nirvana of Buddha, the aloofness of court-customs under
Sesostris, Justinian I and Louis XIV, in the God-idea of an Æschylus,
a Plotinus, a Dante; and in the world-embracing spatial energy of
modern technics.
XII
To return to mathematics. In the Classical world the starting-point
of every formative act was, as we have seen, the ordering of the
“become,” in so far as this was present, visible, measurable and
numerable. The Western, Gothic, form-feeling on the contrary is that
of an unrestrained, strong-willed far-ranging soul, and its chosen
badge is pure, imperceptible, unlimited space. But we must not be
led into regarding such symbols as unconditional. On the contrary,
they are strictly conditional, though apt to be taken as having
identical essence and validity. Our universe of infinite space, whose
existence, for us, goes without saying, simply does not exist for
Classical man. It is not even capable of being presented to him. On
the other hand, the Hellenic cosmos, which is (as we might have
discovered long ago) entirely foreign to our way of thinking, was for
the Hellene something self-evident. The fact is that the infinite space
of our physics is a form of very numerous and extremely complicated
elements tacitly assumed, which have come into being only as the
copy and expression of our soul, and are actual, necessary and
natural only for our type of waking life. The simple notions are
always the most difficult. They are simple, in that they comprise a
vast deal that not only is incapable of being exhibited in words but
does not even need to be stated, because for men of the particular
group it is anchored in the intuition; and they are difficult because for
all alien men their real content is ipso facto quite inaccessible. Such
a notion, at once simple and difficult, is our specifically Western
meaning of the word “space.” The whole of our mathematic from
Descartes onward is devoted to the theoretical interpretation of this
great and wholly religious symbol. The aim of all our physics since
Galileo is identical; but in the Classical mathematics and physics the
content of this word is simply not known.
Here, too, Classical names, inherited from the literature of Greece
and retained in use, have veiled the realities. Geometry means the
art of measuring, arithmetic the art of numbering. The mathematic of
the West has long ceased to have anything to do with both these
forms of defining, but it has not managed to find new names for its
own elements—for the word “analysis” is hopelessly inadequate.
The beginning and end of the Classical mathematic is
consideration of the properties of individual bodies and their
boundary-surfaces; thus indirectly taking in conic sections and higher
curves. We, on the other hand, at bottom know only the abstract
space-element of the point, which can neither be seen, nor
measured, nor yet named, but represents simply a centre of
reference. The straight line, for the Greeks a measurable edge, is for
us an infinite continuum of points. Leibniz illustrates his infinitesimal
principle by presenting the straight line as one limiting case and the
point as the other limiting case of a circle having infinitely great or
infinitely little radius. But for the Greek the circle is a plane and the
problem that interested him was that of bringing it into a
commensurable condition. Thus the squaring of the circle became
for the Classical intellect the supreme problem of the finite. The
deepest problem of world-form seemed to it to be to alter surfaces
bounded by curved lines, without change of magnitude, into
rectangles and so to render them measureable. For us, on the other
hand, it has become the usual, and not specially significant, practice
to represent the number π by algebraic means, regardless of any
geometrical image.
The Classical mathematician knows only what he sees and
grasps. Where definite and defining visibility—the domain of his
thought—ceases, his science comes to an end. The Western
mathematician, as soon as he has quite shaken off the trammels of
Classical prejudice, goes off into a wholly abstract region of infinitely
numerous “manifolds” of n (no longer 3) dimensions, in which his so-
called geometry always can and generally must do without every
commonplace aid. When Classical man turns to artistic expressions
of his form-feeling, he tries with marble and bronze to give the
dancing or the wrestling human form that pose and attitude in which
surfaces and contours have all attainable proportion and meaning.
But the true artist of the West shuts his eyes and loses himself in the
realm of bodiless music, in which harmony and polyphony bring him
to images of utter “beyondness” that transcend all possibilities of
visual definition. One need only think of the meanings of the word
“figure” as used respectively by the Greek sculptor and the Northern
contrapuntist, and the opposition of the two worlds, the two
mathematics, is immediately presented. The Greek mathematicians
ever use the word σῶμα for their entities, just as the Greek lawyers
used it for persons as distinct from things (σώματα καὶ πράγματα:
personæ et res).
Classical number, integral and corporeal, therefore inevitably
seeks to relate itself with the birth of bodily man, the σῶμα. The
number 1 is hardly yet conceived of as actual number but rather as
ἀρχή, the prime stuff of the number-series, the origin of all true
numbers and therefore all magnitudes, measures and materiality
(Dinglichkeit). In the group of the Pythagoreans (the date does not
matter) its figured-sign was also the symbol of the mother-womb, the
origin of all life. The digit 2, the first true number, which doubles the
1, was therefore correlated with the male principle and given the sign
of the phallus. And, finally, 3, the “holy number” of the Pythagoreans,
denoted the act of union between man and woman, the act of
propagation—the erotic suggestion in adding and multiplying (the
only two processes of increasing, of propagating, magnitude useful
to Classical man) is easily seen—and its sign was the combination of
the two first. Now, all this throws quite a new light upon the legends
previously alluded to, concerning the sacrilege of disclosing the
irrational. The irrational—in our language the employment of
unending decimal fractions—implied the destruction of an organic
and corporeal and reproductive order that the gods had laid down.
There is no doubt that the Pythagorean reforms of the Classical
religion were themselves based upon the immemorial Demeter-cult.
Demeter, Gæa, is akin to Mother Earth. There is a deep relation
between the honour paid to her and this exalted conception of the
numbers.
Thus, inevitably, the Classical became by degrees the Culture of
the small. The Apollinian soul had tried to tie down the meaning of
things-become by means of the principle of visible limits; its taboo
was focused upon the immediately-present and proximate alien.
What was far away, invisible, was ipso facto “not there.” The Greek
and the Roman alike sacrificed to the gods of the place in which he
happened to stay or reside; all other deities were outside the range
of vision. Just as the Greek tongue—again and again we shall note
the mighty symbolism of such language-phenomena—possessed no
word for space, so the Greek himself was destitute of our feeling of
landscape, horizons, outlooks, distances, clouds, and of the idea of
the far-spread fatherland embracing the great nation. Home, for
Classical man, is what he can see from the citadel of his native town
and no more. All that lay beyond the visual range of this political
atom was alien, and hostile to boot; beyond that narrow range, fear
set in at once, and hence the appalling bitterness with which these
petty towns strove to destroy one another. The Polis is the smallest
of all conceivable state-forms, and its policy is frankly short-range,
therein differing in the extreme from our own cabinet-diplomacy
which is the policy of the unlimited. Similarly, the Classical temple,
which can be taken in in one glance, is the smallest of all first-rate
architectural forms. Classical geometry from Archytas to Euclid—like
the school geometry of to-day which is still dominated by it—
concerned itself with small, manageable figures and bodies, and
therefore remained unaware of the difficulties that arise in
establishing figures of astronomical dimensions, which in many
cases are not amenable to Euclidean geometry.[70] Otherwise the
subtle Attic spirit would almost surely have arrived at some notion of
the problems of non-Euclidean geometry, for its criticism of the well-
known “parallel” axiom,[71] the doubtfulness of which soon aroused
opposition yet could not in any way be elucidated, brought it very
close indeed to the decisive discovery. The Classical mind as
unquestioningly devoted and limited itself to the study of the small
and the near as ours has to that of the infinite and ultra-visual. All the
mathematical ideas that the West found for itself or borrowed from
others were automatically subjected to the form-language of the
Infinitesimal—and that long before the actual Differential Calculus
was discovered. Arabian algebra, Indian trigonometry, Classical
mechanics were incorporated as a matter of course in analysis. Even
the most “self-evident” propositions of elementary arithmetic such as
2 × 2 = 4 become, when considered analytically, problems, and the
solution of these problems was only made possible by deductions
from the Theory of Aggregates, and is in many points still
unaccomplished. Plato and his age would have looked upon this sort
of thing not only as a hallucination but also as evidence of an utterly
nonmathematical mind. In a certain measure, geometry may be
treated algebraically and algebra geometrically, that is, the eye may
be switched off or it may be allowed to govern. We take the first
alternative, the Greeks the second. Archimedes, in his beautiful
management of spirals, touches upon certain general facts that are
also fundamentals in Leibniz’s method of the definite integral; but his
processes, for all their superficial appearance of modernity, are
subordinated to stereometric principles; in like case, an Indian
mathematician would naturally have found some trigonometrical
formulation.[72]
XIII
From this fundamental opposition of Classical and Western
numbers there arises an equally radical difference in the relationship
of element to element in each of these number-worlds. The nexus of
magnitudes is called proportion, that of relations is comprised in the
notion of function. The significance of these two words is not
confined to mathematics proper; they are of high importance also in
the allied arts of sculpture and music. Quite apart from the rôle of
proportion in ordering the parts of the individual statue, the typically
Classical artforms of the statue, the relief, and the fresco, admit
enlargements and reductions of scale—words that in music have no
meaning at all—as we see in the art of the gems, in which the
subjects are essentially reductions from life-sized originals. In the
domain of Function, on the contrary, it is the idea of transformation of
groups that is of decisive importance, and the musician will readily
agree that similar ideas play an essential part in modern
composition-theory. I need only allude to one of the most elegant
orchestral forms of the 18th Century, the Tema con Variazioni.
All proportion assumes the constancy, all transformation the
variability of the constituents. Compare, for instance, the congruence
theorems of Euclid, the proof of which depends in fact on the
assumed ratio 1 : 1, with the modern deduction of the same by
means of angular functions.

XIV

The Alpha and Omega of the Classical mathematic is construction


(which in the broad sense includes elementary arithmetic), that is,
the production of a single visually-present figure. The chisel, in this
second sculptural art, is the compass. On the other hand, in function-
research, where the object is not a result of the magnitude sort but a
discussion of general formal possibilities, the way of working is best
described as a sort of composition-procedure closely analogous to
the musical; and in fact, a great number of the ideas met with in the
theory of music (key, phrasing, chromatics, for instance) can be
directly employed in physics, and it is at least arguable that many
relations would be clarified by so doing.
Every construction affirms, and every operation denies
appearances, in that the one works out that which is optically given
and the other dissolves it. And so we meet with yet another contrast
between the two kinds of mathematic; the Classical mathematic of
small things deals with the concrete individual instance and
produces a once-for-all construction, while the mathematic of the
infinite handles whole classes of formal possibilities, groups of
functions, operations, equations, curves, and does so with an eye,
not to any result they may have, but to their course. And so for the
last two centuries—though present-day mathematicians hardly
realize the fact—there has been growing up the idea of a general
morphology of mathematical operations, which we are justified in
regarding as the real meaning of modern mathematics as a whole.
All this, as we shall perceive more and more clearly, is one of the
manifestations of a general tendency inherent in the Western
intellect, proper to the Faustian spirit and Culture and found in no
other. The great majority of the problems which occupy our
mathematic, and are regarded as “our” problems in the same sense
as the squaring of the circle was the Greeks’,—e.g., the investigation
of convergence in infinite series (Cauchy) and the transformation of
elliptic and algebraic integrals into multiply-periodic functions (Abel,
Gauss)—would probably have seemed to the Ancients, who strove
for simple and definite quantitative results, to be an exhibition of
rather abstruse virtuosity. And so indeed the popular mind regards
them even to-day. There is nothing less “popular” than the modern
mathematic, and it too contains its symbolism of the infinitely far, of
distance. All the great works of the West, from the “Divina
Commedia” to “Parsifal,” are unpopular, whereas everything
Classical from Homer to the Altar of Pergamum was popular in the
highest degree.

XV
Thus, finally, the whole content of Western number-thought
centres itself upon the historic limit-problem of the Faustian
mathematic, the key which opens the way to the Infinite, that
Faustian infinite which is so different from the infinity of Arabian and
Indian world-ideas. Whatever the guise—infinite series, curves or
functions—in which number appears in the particular case, the
essence of it is the theory of the limit.[73] This limit is the absolute
opposite of the limit which (without being so called) figures in the
Classical problem of the quadrature of the circle. Right into the 18th
Century, Euclidean popular prepossessions obscured the real
meaning of the differential principle. The idea of infinitely small
quantities lay, so to say, ready to hand, and however skilfully they
were handled, there was bound to remain a trace of the Classical
constancy, the semblance of magnitude, about them, though Euclid
would never have known them or admitted them as such. Thus, zero
is a constant, a whole number in the linear continuum between +1
and -1; and it was a great hindrance to Euler in his analytical
researches that, like many after him, he treated the differentials as
zero. Only in the 19th Century was this relic of Classical number-
feeling finally removed and the Infinitesimal Calculus made logically
secure by Cauchy’s definitive elucidation of the limit-idea; only the
intellectual step from the “infinitely small quantity” to the “lower limit
of every possible finite magnitude” brought out the conception of a
variable number which oscillates beneath any assignable number
that is not zero. A number of this sort has ceased to possess any
character of magnitude whatever: the limit, as thus finally presented
by theory, is no longer that which is approximated to, but the
approximation, the process, the operation itself. It is not a state, but
a relation. And so in this decisive problem of our mathematic, we are
suddenly made to see how historical is the constitution of the
Western soul.[74]
XVI
The liberation of geometry from the visual, and of algebra from the
notion of magnitude, and the union of both, beyond all elementary
limitations of drawing and counting, in the great structure of function-
theory—this was the grand course of Western number-thought. The
constant number of the Classical mathematic was dissolved into the
variable. Geometry became analytical and dissolved all concrete
forms, replacing the mathematical bodies from which the rigid
geometrical values had been obtained, by abstract spatial relations
which in the end ceased to have any application at all to sense-
present phenomena. It began by substituting for Euclid’s optical
figures geometrical loci referred to a co-ordinate system of arbitrarily
chosen “origin,” and reducing the postulated objectiveness of
existence of the geometrical object to the one condition that during
the operation (which itself was one of equating and not of
measurement) the selected co-ordinate system should not be
changed. But these co-ordinates immediately came to be regarded
as values pure and simple, serving not so much to determine as to
represent and replace the position of points as space-elements.
Number, the boundary of things-become, was represented, not as
before pictorially by a figure, but symbolically by an equation.
“Geometry” altered its meaning; the co-ordinate system as a
picturing disappeared and the point became an entirely abstract
number-group. In architecture, we find this inward transformation of
Renaissance into Baroque through the innovations of Michael
Angelo and Vignola. Visually pure lines became, in palace and
church façades as in mathematics, ineffectual. In place of the clear
co-ordinates that we have in Romano-Florentine colonnading and
storeying, the “infinitesimal” appears in the graceful flow of elements,
the scrollwork, the cartouches. The constructive dissolves in the
wealth of the decorative—in mathematical language, the functional.
Columns and pilasters, assembled in groups and clusters, break up
the façades, gather and disperse again restlessly. The flat surfaces
of wall, roof, storey melt into a wealth of stucco work and ornaments,
vanish and break into a play of light and shade. The light itself, as it
is made to play upon the form-world of mature Baroque—viz., the
period from Bernini (1650) to the Rococo of Dresden, Vienna and
Paris—has become an essentially musical element. The Dresden
Zwinger[75] is a sinfonia. Along with 18th Century mathematics, 18th
Century architecture develops into a form-world of musical
characters.

You might also like