Publications by Type: Conference Paper

Amina H, Maissa K. Maximization of the Stability Radius of an Infinite Dimensional System Subjected to Stochastic Unbounded Structured Multi-perturbations With Unbounded Input Operator, in International Conference on Recent Advances in Mathematics and Informatics (ICRAMI), 21-22 Sept. Tebessa, Algeria ; 2021 :1-5. Publisher's VersionAbstract

In this paper we consider infinite dimensional systems subjected to stochastic structured multiperturbations. We address the problem of robustness optimization with respect to state feedback but allow both unbounded input and perturbations. Conditions are derived for the existence of a stabilizing controller ensuring that the norm of the closed loop operator below a prespecified bound. Such controllers will be called suboptimal controllers. The suboptimality conditions are obtained in terms of a Riccati equation which satisfies an operator inequality. Finally, we give a lower bound for the supremal achievable stability radius via the Riccati equation.

Amira K, MAISSSA KADA. Robust Stabilization of Infinite Dimensional Systems Subjected to Stochastic and Deterministic Perturbations, in 2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI). Tebessa, Algeria ; 2021 :1-4. Publisher's VersionAbstract

This paper deals with the robust stabilization of infinite dimensional systems subjected to stochastic and deterministic perturbations. First, we give conditions providing the stability of the parameterized system. Then, we investigate the maximization of the stability radius by state feedback. We establish conditions for the existence of suboptimal controllers. Using these conditions we characterize the supreme achievable stability radius via an infinite dimensional Riccati equation.

Boussaad L, BOUCETTA ALDJIA. Stacked Auto-Encoders Based Biometrics Recognition, in International Conference on Recent Advances in Mathematics and Informatics (ICRAMI). Tebessa, Algeria ; 2021 :1-6. Publisher's VersionAbstract

Recently deep learning has shown significant achievement in the performance of many tasks, like natural language processing, image and speech recognition. Also, this improvement concerns multiple biometrics recognition systems. In this work, we focus on biometrics recognition, we present a stacked auto-encoder-based approach for various biometrics recognition, including Iris, Ear, palm-print, and face recognition. The proposed method allows training a neural network that includes two hidden layers for biometrics tasks. It runs in two steps, in the first one, each layer is trained individually in an unsupervised manner by auto-encoders, then the layers are stacked and trained in a supervised way. Experimental results on images, obtained from publicly available biometrics databases clearly demonstrate the benefit of using stacked auto-encoders as feature extraction and dimension reduction tools for biometrics recognition, as significant high accuracy rates are obtained over the four databases.

Mekaoussi A, Titaouine M. Simulation Of The Structure FSS Using The WCIP Method For Dual Polarization Applications, in International Conference on Recent Advances in Mathematics and Informatics (ICRAMI). Tebessa, Algeria ; 2021 :1-6. Publisher's VersionAbstract

In this work, we studied an L-shaped frequency selective surface (FSS) by a method called Wave Concept Iterative Procedure (WCIP), this method developed from the Modal Fast Transformation (FMT) is based on the cross- formulation. wave and the solution obtained by an iterative procedure does not use the matrix to ensure convergence and the procedure is stopped when it arrives at convergence, for this geometry the results of a single resonance obtained by the WCIP method have a resonant frequency of 5.35 GHz with a band bandwidth of 2.3 GHz, when the structure is excited in the X direction, a frequency at 10.35 GHz with a bandwidth of 0.44 GHz when the structure is excited in the Y direction. The simulation of the results obtained by the WCIP method is compared with the results of the software HFSS 13.0 (High Frequency Structure Simulator), we find a good agreement.

Roubache T, Chaouch S, Said MSN. Comparative Study of Different Fault-Tolerant Control Strategies for Three-Phase Induction Motor, in 9th (Online) International Conference on Applied Analysis and Mathematical Modeling (ICAAMM21) June 11-13, 2021, Istanbul-Turkey. ; 2021 :30. Publisher's VersionAbstract
: In this paper, we have studied a different fault tolerant control (FTC) strategies for a three-phase induction motor (3p-IM). Further we introduce Backstepping controller (BC) and Input-output linearization controller (IOLC). To provide a direct comparison between these FTCs approaches, the performances are evaluated using the control of 3p-IM under failures, variable speed, and variable parameters. A comparison between the two control strategies is proposed to prove the most robust one. The simulation results show the robustness and good performance of the fault tolerant control with Input-output linearization controller compared to one with Backstepping controller. The FTC with IOLC is more stable and robust against failures, load torque perturbation and speed reversion
Aouadj W, Abdessemed MR, Seghir R. Discrete Large-scale Multi-Objective Teaching-Learning-Based Optimization Algorithm, in Proceedings of the 4th International Conference on Networking, Information Systems & Security. ; 2021 :1-6. Publisher's VersionAbstract
This paper presents a teaching-learning-based optimization algorithm for discrete large-scale multi-objective problems (DLM-TLBO). Unlike the previous variants, the learning strategy used by each individual and the acquired knowledge are defined based on its level. The proposed approach is used to solve a bi-objective object clustering task (B-OCT) in a swarm robotic system, as a case study. The simple robots have as mission the gathering of a number of objects distributed randomly, while respecting two objectives: maximizing the clustering quality, and minimizing the energy consumed by these robots. The simulation results of the proposed algorithm are compared to those obtained by the well-known algorithm NSGA-II. The results show the superiority of the proposed DLM-TLBO in terms of the quality of the obtained Pareto front approximation and convergence speed.
Benlouanas K, Serir L. Food’s Conservation into 03 Dimension’s Models of Cold Stores Operated by 03 Refrigeration Systems in Biskra Region (Classic, Absorption, Adsorption), in Defect and Diffusion Forum. Vol 406. Trans Tech Publ ; 2021 :182-191.Abstract
As renewable energy elucidation, the solar refrigeration of fruits such as date palm is a storage alternate to preserve food in healthy parameters of conditioning. This statistical and numeric study investigates the energy gain cost case around the diverse dimensions’ models of positive cold stores (02, 04, and 06 cold rooms), concerning energetic disparity and numerous financial fluctuations of the applied systems. The results of computation and analysis regarding panels of construction, equipment, consumption, and maintenance for classic, absorption, and adsorption refrigeration systems that conserve dates palm into these three cold stores. In the end, the comparison of technical and economic elements in tables and figures by enumerating their advantages and inconveniences. Classic Bitzer, Absorption WFC SC 5, and Adsorption AG ACS 15 and 08 are models in which their evaluation is relating to their costs. In Biskra, these results mean that adsorption chiller termed AG ACS (15 plus 08) is illustrious by its parameters of simplicity, lifespan, safety, and security, valued to 1147.5 €/m² and median cost up ten years of using is 92972 €
Douha D, Mokhtari A, Guessoum Z. Towards a non monotonic agent testing, reasoning about messages and behavior, in 8th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2021. ; 2021. Publisher's Version
Zerrouki H, Estrada-Lugo HD, SMADI H, Patelli E. Applications of Bayesian networks in Chemical and Process Industries: A review, in Proceedings of the 29th European Safety and Reliability Conference, ESREL 2019. ; 2020 :3122-3129. Publisher's VersionAbstract
Despite technological advancements, chemical and process industries are still prone to accidents due to their complexity and hazardous installations. These accidents lead to significant losses that represent economic losses and most importantly human losses. Risk management is one of the appropriate tools to guarantee the safe operations of these plants. Risk analysis is an important part of risk management, it consists of different methods such as Fault tree, Bow-tie, and Bayesian network. The latter has been widely applied for risk analysis purposes due to its flexible and dynamic structure. Bayesian networks approaches have shown a significant increase in their application as shown by in the publication in this field. This paper summarizes the result of a literature review performed on Bayesian network approaches adopted to conduct risk assessments, safety and risk analyses. Different application domains are analysed (i.e. accident modelling, maintenance area, fault diagnosis) in chemical and process industries from the year 2006 to 2018. Furthermore, the advantages of different types of Bayesian networks are presented.
Kadri S, Aouag S, HEDJAZI D. Multi-level approach for controlling architecture quality with Alloy, in 2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS). Vol 1. Skikda, Algeria ; 2019 :1-8. Publisher's VersionAbstract

The software evolution process means the continuous control of functional and non -functional software characteristics by the change of its code without changing the properties of its quality neither the quality of its architecture. Therefore, the most important problem to be treated is how to limit the progressive shifting between the planned and the implemented architecture during the software evolution process. This phenomenon called the erosion of software architecture, often appears unexpectedly and must be controlled. In this paper, we have proposed an approach to detect erosion problems by representing tactical, strategic, and operational architectural constraints at different abstraction levels. These constraints are specified by the use of the Alloy constraint language in order to restore the deviations that may affect the description of the software architecture during the development steps. Our goal is to control architecture quality by limiting the occurrence and impact of erosion, which means the control of architecture conformance during system development and maintenance activities.

Fayçal DJEFFAL. ANFIS-based Approach to Predict the Degradation-related Ageing ofJunctionless GAA MOSFET, in 14th International Conference on Nanosciences & Nanotechnologies (NN17), 4-7 July 2017. Vol 5. Materials Today: Proceedings ; 2018 :15949-15958. Publisher's VersionAbstract

The estimation of average lifetime has been considered as a serious reliability concern for VLSI components. However, with the tremendous downscaling of MOSFET devices, it becomes very difficult to predict such measure with satisfactory precision due to the amplified parasitic effects at the deep scale level. The present work aims at investigating the efficiency of adaptive neuro-fuzzy inference system approach as a predictor of junctionless gate all around MOSFET device lifetime. Our predictions are compared versus the numerical results obtained by ATLAS simulator, where a good agreement is obtained.

    Djaiz F, Defaflia N, Lamouri B, Boushaba A, I C. Quaternary fluviatile terraces of the Oued El Gourzi (Batna, NE Algeria): sedimentology and characteristics of the depositional environment, in CAJG 2018: Paleobiodiversity and Tectono-Sedimentary Records in the Mediterranean Tethys and Related Eastern Areas . ; 2018 :331–334. Publisher's VersionAbstract

    Field observations and sedimentological analyses of alluvial terraces of the O. Gourzi (Batna, NE Algeria) lead us to consider sediments as dominated by clayey and silty-sandy fractions overlain by gravel and calcareous coarser fractions. Moderate CaO3 contents would have resulted from the dissolution of the nearby carbonate relieves. They are mainly composed of Maastrichtian limestones. The distribution of the mineral fraction led us to identify 07 levels including horizons of coarse fractions alternating with layers rich in sand and silt with a roughly constant clay fraction through the stratigraphic column. Kurtosis values, frequency histograms of a prokurtic type, rarily mesokurtic, mark a constant power mode for the transport agent. Classification indices indicate poorly- to moderately sorted material, indicating a turbiditic depositional environment. Quartz grain nature and morphoscopy refer to Miocene sandstones as a potential origin. The ferruginous coating is due to the initiating pedogenesis.

    Benamar S, Benmehidi M, Bouziane F, Boukhalfa A. Qu’en est-il de la résistance des Entérobactéries aux C3G en ville et à l’hôpital ?, in 18es Journées nationales d’infectiologie / Médecine et maladies infectieuses . Vol 47. 4th ed. ; 2017 :S29-S30. Publisher's Version
    SAHRAOUI S, Bilami A. Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things, in Modelling and Implementation of Complex Systems. Constantine, Algérie ; 2016. Publisher's VersionAbstract

    The Internet of Things (IoT) vision is a groundbreaking networking evolution that connects all things that were not meant to be connected to the Internet. Thus, identification technologies and Internet-enabled wireless sensor nodes will be incorporated in homes, cities, vehicles, watches, etc. making them uniquely identified and able to process and communicate information via Internet. Hence, the emergence of the Internet of Things paradigm will bring a lot of smartness to our daily life and will improve the way people monitor their goods, expenses, environment and health status. The smart connected things in the IoT interact with each other and/or with the regular Internet hosts according to two communications styles: Thing-to-Thing(s) (T2T) and Human-to-Thing (H2T). Enabling security for such communications is a real issue especially in H2T interactions. This is mainly due to scarce resources of the connected objects and the asymmetric nature of the communications between those smart things and the ordinary Internet hosts. In this paper we address this problematic and we propose an asymmetric security model that mitigates H2T communication heterogeneities and provides reasonable security costs.

    Dib A, Hassam A, Srairi K, Saidi L. Numerical Modeling and Heuristic Algorithms for Nanogenerator Behavior Analysis, in Conference on Advances in Information Processing and Communication Technology - IPCT. Rome, Italy ; 2016 :86 – 90. Publisher's VersionAbstract

    Recently, the desire for a self-powered micro and nanodevices has attracted a great interest of using sustainable energy sources. Further, the ultimate goal of nanogenerator is to harvest energy from the ambient environment in which a self powered device based on these generators is needed. With the development of nanogeneratorbased circuits design and optimization, the building of new device simulator is necessary for the study and the synthesis of electromecanical parameters of this type of models. In the present article, both numerical modeling and optimization of piezoelectric nanogenerator based on zinc oxide have been carried out. They aim to improve the electromecanical performances, robustness, and synthesis process for nanogenerator. The proposed model has been developed for a systematic study of the nanowire morphology parameters in stretching mode. In addition, heuristic optimization technique, namely, particle swarm optimization has been implemented for an analytic modeling and an optimization of nanogeneratorbased process in stretching mode. Moreover, the obtained results have been tested and compared with conventional model where a good agreement has been obtained for excitation mode. The developed nanogenerator model can be generalized, extended and integrated into simulators devices to study nanogenerator-based circuits.

    Benaicha S, Zidani F, Nait-Said R, Nait-Said M-S. Direct Torque with Fuzzy Logic Torque Ripple Reduction Based Stator Flux Vector Control, in Second International Conference on Computer and Electrical Engineering. Vol 2. Dubai, United Arab Emirates ; 2009 :128-133. Publisher's VersionAbstract

    The major disadvantages of the conventional direct torque control (DTC) drive is the steady state ripples in torque and flux Using space vector control (SVM) method reduce the torque and stator flux ripples. In this paper, the use of SVM technique, a torque fuzzy controller is proposed to improve DTC performance and reduce significantly torque ripple. Simulation results will be presented and discussed to prove the effective new of the proposed