2017
Hichem F, Fouzi D, Fayçal DJEFFAL.
Role of non-uniform channel doping in improving the nanoscale JL DG MOSFET reliability against the self-heating effects, ISSN 0749-6063. Superlattices and MicrostructuresSuperlattices and Microstructures. 2017;Volume 109 :pp 869-879.
AbstractIn this paper, a new hybrid approach by combining numerical investigation and Support Vector Machines (SVMs) classifier is proposed to study the thermoelectric performance of nanoscale Double Gate Junctionless DG JL MOSFET. In this context, a new Figure of Merit (FoM) parameter which combines both electrical and reliability characteristics is proposed. Moreover, the impact of Gaussian channel doping profile (GCD) in enhancing the DG JL MOSFET reliability against the self-heating effects (SHEs) is presented. The proposed design thermal stability and electrical characteristics are investigated and compared with those of the conventional structure in order to reveal the device performance including SHEs. It is found that the amended channel doping has a profound implication in improving both the device electrical performance and the reliability against the undesired self-heating and short channel effects (SCEs). Furthermore, the transistor thermal behavior analysis involves classification of the device performance by taking into account the device reliability. For this purpose, SVMs are adopted for supervised classification in order to identify the most favorable design configurations associated with suppressed SHEs and improved electrical performance. We find that the proposed design methodology has succeeded in selecting the better designs that offer superior reliability against the SHEs. The obtained results suggest the possibility for bridging the gap between high electrical performances with better immunity to the SHEs.
Ouarlent Y.
Screningof Von willebrand’s Diseas in a region of high consanguinity. XXVI Biennial congress and 63rd Annual Scientific and Standarization Commitee. 2017.
Noui O, Beloucif A, Noui L.
Secure image encryption scheme based on polar decomposition and chaotic map. International Journal of Information and Communication TechnologyInternational Journal of Information and Communication Technology. 2017;10.
AbstractSecurity is an important issue in image storage and communication, encryption is one of the most common ways to ensure security. Recently, many schemes based on chaotic map have been proposed, but most of this method suffers from small key space, which makes them vulnerable to brute forces attacks. In this study, we design a highly robust novel symmetric image encryption scheme which offer good confusion and diffusion qualities, and a large key space to ensure popular security factor and to overcome the weaknesses of the state of the art encryption schemes. In the security analysis section, we prove that our scheme can resist most known attacks, such as cipher image only attack, known and chosen plain image attacks, differential and exhaustive attacks. It is shown in this paper that the use of polar decomposition with chaotic map can gives a fast and secures encryption.
Oussama N, Assia B, Lemnouar N.
Secure image encryption scheme based on polar decomposition and chaotic map. International Journal of Information and Communication TechnologyInternational Journal of Information and Communication Technology. 2017;10 :437-453.
Noui O, Beloucif A, Noui L.
Secure image encryption scheme based on polar decomposition and chaotic map. International Journal of Information and Communication TechnologyInternational Journal of Information and Communication Technology. 2017;10.
AbstractSecurity is an important issue in image storage and communication, encryption is one of the most common ways to ensure security. Recently, many schemes based on chaotic map have been proposed, but most of this method suffers from small key space, which makes them vulnerable to brute forces attacks. In this study, we design a highly robust novel symmetric image encryption scheme which offer good confusion and diffusion qualities, and a large key space to ensure popular security factor and to overcome the weaknesses of the state of the art encryption schemes. In the security analysis section, we prove that our scheme can resist most known attacks, such as cipher image only attack, known and chosen plain image attacks, differential and exhaustive attacks. It is shown in this paper that the use of polar decomposition with chaotic map can gives a fast and secures encryption.
Oussama N, Assia B, Lemnouar N.
Secure image encryption scheme based on polar decomposition and chaotic map. International Journal of Information and Communication TechnologyInternational Journal of Information and Communication Technology. 2017;10 :437-453.
Noui O, Beloucif A, Noui L.
Secure image encryption scheme based on polar decomposition and chaotic map. International Journal of Information and Communication TechnologyInternational Journal of Information and Communication Technology. 2017;10.
AbstractSecurity is an important issue in image storage and communication, encryption is one of the most common ways to ensure security. Recently, many schemes based on chaotic map have been proposed, but most of this method suffers from small key space, which makes them vulnerable to brute forces attacks. In this study, we design a highly robust novel symmetric image encryption scheme which offer good confusion and diffusion qualities, and a large key space to ensure popular security factor and to overcome the weaknesses of the state of the art encryption schemes. In the security analysis section, we prove that our scheme can resist most known attacks, such as cipher image only attack, known and chosen plain image attacks, differential and exhaustive attacks. It is shown in this paper that the use of polar decomposition with chaotic map can gives a fast and secures encryption.
Oussama N, Assia B, Lemnouar N.
Secure image encryption scheme based on polar decomposition and chaotic map. International Journal of Information and Communication TechnologyInternational Journal of Information and Communication Technology. 2017;10 :437-453.
Hamza R, Muhammad K, Lv Z, TITOUNA F.
Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive and Mobile ComputingPervasive and Mobile Computing. 2017;41 :436-450.
AbstractWireless capsule endoscopy (WCE) has several benefits over traditional endoscopy such as its portability and ease of usage, particularly for remote internet of things (IoT)-assisted healthcare services. During the WCE procedure, a significant amount of redundant video data is generated, the transmission of which to healthcare centers and gastroenterologists securely for analysis is challenging as well as wastage of several resources including energy, memory, computation, and bandwidth. In addition to this, it is inherently difficult and time consuming for gastroenterologists to analyze this huge volume of gastrointestinal video data for desired contents. To surmount these issues, we propose a secure video summarization framework for outdoor patients going through WCE procedure. In the proposed system, keyframes are extracted using a light-weighted video summarization scheme, making it more suitable for WCE. Next, a cryptosystem is presented for security of extracted keyframes based on 2D Zaslavsky chaotic map. Experimental results validate the performance of the proposed cryptosystem in terms of robustness and high-level security compared to other recent image encryption schemes during dissemination of important keyframes to healthcare centers and gastroenterologists for personalized WCE.
Hamza R, Muhammad K, Lv Z, TITOUNA F.
Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive and Mobile ComputingPervasive and Mobile Computing. 2017;41 :436-450.
AbstractWireless capsule endoscopy (WCE) has several benefits over traditional endoscopy such as its portability and ease of usage, particularly for remote internet of things (IoT)-assisted healthcare services. During the WCE procedure, a significant amount of redundant video data is generated, the transmission of which to healthcare centers and gastroenterologists securely for analysis is challenging as well as wastage of several resources including energy, memory, computation, and bandwidth. In addition to this, it is inherently difficult and time consuming for gastroenterologists to analyze this huge volume of gastrointestinal video data for desired contents. To surmount these issues, we propose a secure video summarization framework for outdoor patients going through WCE procedure. In the proposed system, keyframes are extracted using a light-weighted video summarization scheme, making it more suitable for WCE. Next, a cryptosystem is presented for security of extracted keyframes based on 2D Zaslavsky chaotic map. Experimental results validate the performance of the proposed cryptosystem in terms of robustness and high-level security compared to other recent image encryption schemes during dissemination of important keyframes to healthcare centers and gastroenterologists for personalized WCE.
Hamza R, Muhammad K, Lv Z, TITOUNA F.
Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive and Mobile ComputingPervasive and Mobile Computing. 2017;41 :436-450.
AbstractWireless capsule endoscopy (WCE) has several benefits over traditional endoscopy such as its portability and ease of usage, particularly for remote internet of things (IoT)-assisted healthcare services. During the WCE procedure, a significant amount of redundant video data is generated, the transmission of which to healthcare centers and gastroenterologists securely for analysis is challenging as well as wastage of several resources including energy, memory, computation, and bandwidth. In addition to this, it is inherently difficult and time consuming for gastroenterologists to analyze this huge volume of gastrointestinal video data for desired contents. To surmount these issues, we propose a secure video summarization framework for outdoor patients going through WCE procedure. In the proposed system, keyframes are extracted using a light-weighted video summarization scheme, making it more suitable for WCE. Next, a cryptosystem is presented for security of extracted keyframes based on 2D Zaslavsky chaotic map. Experimental results validate the performance of the proposed cryptosystem in terms of robustness and high-level security compared to other recent image encryption schemes during dissemination of important keyframes to healthcare centers and gastroenterologists for personalized WCE.
Hamza R, Muhammad K, Lv Z, TITOUNA F.
Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive and Mobile ComputingPervasive and Mobile Computing. 2017;41 :436-450.
AbstractWireless capsule endoscopy (WCE) has several benefits over traditional endoscopy such as its portability and ease of usage, particularly for remote internet of things (IoT)-assisted healthcare services. During the WCE procedure, a significant amount of redundant video data is generated, the transmission of which to healthcare centers and gastroenterologists securely for analysis is challenging as well as wastage of several resources including energy, memory, computation, and bandwidth. In addition to this, it is inherently difficult and time consuming for gastroenterologists to analyze this huge volume of gastrointestinal video data for desired contents. To surmount these issues, we propose a secure video summarization framework for outdoor patients going through WCE procedure. In the proposed system, keyframes are extracted using a light-weighted video summarization scheme, making it more suitable for WCE. Next, a cryptosystem is presented for security of extracted keyframes based on 2D Zaslavsky chaotic map. Experimental results validate the performance of the proposed cryptosystem in terms of robustness and high-level security compared to other recent image encryption schemes during dissemination of important keyframes to healthcare centers and gastroenterologists for personalized WCE.
Rafika S.
Sedimentology, Geochemistry and Various Microfaunal Component Responses to Environmental Fluctuations of the Cenomanian-Turonian Boundary at Thénièt El Manchar (Batna, NE Algeria). 19th International Conference on Geological and Earth Sciences. 2017.
Abstract
focuses on the Cenomano-Turonian sediments observed in Thénièt El Manchar, the Bellezma-Batna Mountains, their evolution and the recognition of the main dating markers. The analysis (qualitative and quantitative) of the planktonic and benthic foraminifera and that of the ostracodes makes it possible to reconstitute the evolution of the paleo-environment and to estimate the variations of the relative paleo-depths. During the lower middle Cenomanian (Units IA, IB, IC and the lower part of ID), the microfaunistic associations are dominated by agglutinated benthic foraminifera testifying to a cold environment corresponding to the circalittoral deposits, in association with whole shells of ostracods indicating a weak hydrodynamism. In these deposits, the associations show a low to medium specific diversity and a more or less high faunistic richness, indicating trophic conditions and oxygenation considered normal. As for Unit ID (upper Cenomanian), it contains benthic foraminiferal biocenoses characteristic of warm and agitated seas. The return to deeper conditions, in the final terms of the Cenomanian and the beginning of the Turonian (Unit IIA), during a transgressive phase, is justified by the classical success of the events selected in North Africa, namely: The abundance of planktonic foraminifera, filaments and the drastic reduction of ostracofauna. These different elements open a reflection on the recorded paleo-environmental perturbations, the gradual disappearance of environmental stress and the return to relative normal conditions. These paleo-environmental interpretations agree with the data of the regional palaeogeographic context and highlight Tethysian features. Key words: sedimentology, geochemistry, paleo-environment, Cenomanian, Turonian, Batna, Algeria.
Khatab A, Aghezzaf ELH, Diallo C, Djelloul I.
Selective maintenance optimisation for series-parallel systems alternating missions and scheduled breaks with stochastic durations. International Journal of Production ResearchInternational Journal of Production Research. 2017;55 :3008-3024.
Khatab A, Aghezzaf ELH, Diallo C, Djelloul I.
Selective maintenance optimisation for series-parallel systems alternating missions and scheduled breaks with stochastic durations. International Journal of Production ResearchInternational Journal of Production Research. 2017;55 :3008-3024.
Khatab A, Aghezzaf ELH, Diallo C, Djelloul I.
Selective maintenance optimisation for series-parallel systems alternating missions and scheduled breaks with stochastic durations. International Journal of Production ResearchInternational Journal of Production Research. 2017;55 :3008-3024.
Khatab A, Aghezzaf ELH, Diallo C, Djelloul I.
Selective maintenance optimisation for series-parallel systems alternating missions and scheduled breaks with stochastic durations. International Journal of Production ResearchInternational Journal of Production Research. 2017;55 :3008-3024.
Khatab A, Aghezzaf E-H, Djelloul I, Sari Z.
Selective maintenance optimization for systems operating missions and scheduled breaks with stochastic durations. Journal of manufacturing systemsJournal of manufacturing systems. 2017;43 :168-177.
Khatab A, Aghezzaf E-H, Djelloul I, Sari Z.
Selective maintenance optimization for systems operating missions and scheduled breaks with stochastic durations. Journal of manufacturing systemsJournal of manufacturing systems. 2017;43 :168-177.
Khatab A, Aghezzaf E-H, Djelloul I, Sari Z.
Selective maintenance optimization for systems operating missions and scheduled breaks with stochastic durations. Journal of manufacturing systemsJournal of manufacturing systems. 2017;43 :168-177.