2016
Ghedadba N, Hambaba L, Fercha N, Houas B, Abdessemed S, Mokhtar SMO.
Assessment of hemostatic activity of the aqueous extract of leaves of Marrubium vulgare L., a Mediterranean Lamiaceae Algeria. Int. J. Health SciInt. J. Health Sci. 2016;2 :253-258.
Ghedadba N, Hambaba L, Fercha N, Houas B, Abdessemed S, Mokhtar SMO.
Assessment of hemostatic activity of the aqueous extract of leaves of Marrubium vulgare L., a Mediterranean Lamiaceae Algeria. Int. J. Health SciInt. J. Health Sci. 2016;2 :253-258.
Ghedadba N, Hambaba L, Fercha N, Houas B, Abdessemed S, Mokhtar SMO.
Assessment of hemostatic activity of the aqueous extract of leaves of Marrubium vulgare L., a Mediterranean Lamiaceae Algeria. Int. J. Health SciInt. J. Health Sci. 2016;2 :253-258.
SAHRAOUI S, Bilami A.
Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things, in
Modelling and Implementation of Complex Systems. Constantine, Algérie ; 2016.
Publisher's VersionAbstract
The Internet of Things (IoT) vision is a groundbreaking networking evolution that connects all things that were not meant to be connected to the Internet. Thus, identification technologies and Internet-enabled wireless sensor nodes will be incorporated in homes, cities, vehicles, watches, etc. making them uniquely identified and able to process and communicate information via Internet. Hence, the emergence of the Internet of Things paradigm will bring a lot of smartness to our daily life and will improve the way people monitor their goods, expenses, environment and health status. The smart connected things in the IoT interact with each other and/or with the regular Internet hosts according to two communications styles: Thing-to-Thing(s) (T2T) and Human-to-Thing (H2T). Enabling security for such communications is a real issue especially in H2T interactions. This is mainly due to scarce resources of the connected objects and the asymmetric nature of the communications between those smart things and the ordinary Internet hosts. In this paper we address this problematic and we propose an asymmetric security model that mitigates H2T communication heterogeneities and provides reasonable security costs.
Sahraoui S, Bilami A.
Asymmetric end-to-end security for human-to-thing communications in the internet of things. In: Modelling and Implementation of Complex Systems. Springer ; 2016. pp. 249-260.
SAHRAOUI S, Bilami A.
Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things, in
Modelling and Implementation of Complex Systems. Constantine, Algérie ; 2016.
Publisher's VersionAbstract
The Internet of Things (IoT) vision is a groundbreaking networking evolution that connects all things that were not meant to be connected to the Internet. Thus, identification technologies and Internet-enabled wireless sensor nodes will be incorporated in homes, cities, vehicles, watches, etc. making them uniquely identified and able to process and communicate information via Internet. Hence, the emergence of the Internet of Things paradigm will bring a lot of smartness to our daily life and will improve the way people monitor their goods, expenses, environment and health status. The smart connected things in the IoT interact with each other and/or with the regular Internet hosts according to two communications styles: Thing-to-Thing(s) (T2T) and Human-to-Thing (H2T). Enabling security for such communications is a real issue especially in H2T interactions. This is mainly due to scarce resources of the connected objects and the asymmetric nature of the communications between those smart things and the ordinary Internet hosts. In this paper we address this problematic and we propose an asymmetric security model that mitigates H2T communication heterogeneities and provides reasonable security costs.
Sahraoui S, Bilami A.
Asymmetric end-to-end security for human-to-thing communications in the internet of things. In: Modelling and Implementation of Complex Systems. Springer ; 2016. pp. 249-260.
Lombarkia F, Amouch M.
Asymmetric Fuglede Putnam's Theorem for operators reduced by their eigenspaces. arXiv preprint arXiv:1603.07494arXiv preprint arXiv:1603.07494. 2016.
Lombarkia F, Amouch M.
Asymmetric Fuglede Putnam's Theorem for operators reduced by their eigenspaces. arXiv preprint arXiv:1603.07494arXiv preprint arXiv:1603.07494. 2016.
Kamouche N, Benaissa A.
Asymptotic expansion of double Laplace-type integrals: The case of non-stationary minimum points. Proceedings of the American Mathematical SocietyProceedings of the American Mathematical Society. 2016;144 :3741-3756.
AbstractIn this paper, we show that the asymptotic expansion of a double Laplace-type integral with a non-stationary minimum point, located on the boundary of the domain of integration, is governed by the order of contact between the boundary curve and the level curve of the phase through the minimum point. This achievement will enable us to construct complete asymptotic expansions in more general settings. Especially, the problem will be completely solved if the phase and the boundary curve of the domain of integration are analytic near the minimum point.
Kamouche N, Benaissa A.
Asymptotic expansion of double Laplace-type integrals: The case of non-stationary minimum points. Proceedings of the American Mathematical SocietyProceedings of the American Mathematical Society. 2016;144 :3741-3756.
AbstractIn this paper, we show that the asymptotic expansion of a double Laplace-type integral with a non-stationary minimum point, located on the boundary of the domain of integration, is governed by the order of contact between the boundary curve and the level curve of the phase through the minimum point. This achievement will enable us to construct complete asymptotic expansions in more general settings. Especially, the problem will be completely solved if the phase and the boundary curve of the domain of integration are analytic near the minimum point.
Assia A.
Attitude et pratiques du personnel face aux AES à l’urgence du CHU de Batna 2015. II ième congrès international de gestion des risques et qualité de soins Setif OMS. 2016.
Roubache T, Chaouch S, NAIT-SAID MS.
Backstepping design for fault detection and FTC of an induction motor drives-based EVs. Automatika – Journal for Control, Measurement, Electronics, Computing and CommunicationsAutomatika – Journal for Control, Measurement, Electronics, Computing and Communications. 2016;57 :736–748.
Roubache T, Chaouch S, NAIT-SAID MS.
Backstepping design for fault detection and FTC of an induction motor drives-based EVs. Automatika – Journal for Control, Measurement, Electronics, Computing and CommunicationsAutomatika – Journal for Control, Measurement, Electronics, Computing and Communications. 2016;57 :736–748.
Roubache T, Chaouch S, NAIT-SAID MS.
Backstepping design for fault detection and FTC of an induction motor drives-based EVs. Automatika – Journal for Control, Measurement, Electronics, Computing and CommunicationsAutomatika – Journal for Control, Measurement, Electronics, Computing and Communications. 2016;57 :736–748.
Tebbal S.
BACTERIES ET CANCERS DIGESTIFS : Y a-t-il une relation ?. Deuxièmes Journées Nationales de Gastro-Entérologie. « BRAHIM TOUCHENE ». 2016.