Publications

2016
Ferhati H, DJEFFAL F. Role of Optimized Grooves Surface-Textured Front Glass in Improving TiO 2 Thin-Film UV Photodetector Performance. IEEE sensors journalIEEE Sensors Journal. 2016;16 :5618-5625.
Hichem F, Fayçal DJEFFAL. Role of Optimized Grooves Surface-Textured Front Glass in Improving TiO2 Thin Film UV Photodetector Performance, ISSN / e-ISSN 1530-437X / 1558-1748. IEEE Sensors JournalIEEE Sensors Journal. 2016;Volume 16 :pp 5618-5625.Abstract
In this paper, the impact of the surface-textured front glass on the absorption of TiO 2 /glass thin-film ultraviolet (UV) photodetector is investigated, in order to achieve the dual role of increasing the scattering of UV-light as well as reducing the refracting UV-light in the glass. The efficient control of these phenomena may lead to more electric field confinement and UV-light trapping in TiO 2 absorber layer. Moreover, semianalytical modeling combined with particle swarm optimization is carried out for studying and enhancing the metal-semiconductor-metal photodetector optical and electrical performances. The results obtained from our semianalytical investigation are validated by comparison with the experimental data. It is found that the absorbance increases significantly by about 51% in optimized design over the planar structure, which is expected to improve the photodetector figures of merit. In this context, photodetector with optimized grooves texturization exhibits a 341% improvement, in terms of responsivity, in comparison with the planar structure and 275% improvement with respect to the textured device without optimization. The obtained results make the proposed design methodology a promising alternative for high-performance optoelectronic applications.
Ferhati H, DJEFFAL F. Role of Optimized Grooves Surface-Textured Front Glass in Improving TiO 2 Thin-Film UV Photodetector Performance. IEEE sensors journalIEEE Sensors Journal. 2016;16 :5618-5625.
Khelalef A, Ababsa F, Benoudjit N. A Sample Human Activity Recognition Technique Using DCT. 2016.Abstract
In this paper, we present a simple new human activity recognition method using discrete cosine transform (DCT). The scheme uses the DCT coefficients extracted from silhouettes as descriptors (features) and performs frame-by-frame recognition, which make it simple and suitable for real time applications. We carried out several tests using radial basis neural network (RBF) for classification, a comparative study against stat-of-the-art methods shows that our technique is faster, simple and gives higher accuracy performance comparing to discrete transform based techniques and other methods proposed in literature.
Khelalef A, Ababsa F, Benoudjit N. A Sample Human Activity Recognition Technique Using DCT. 2016.Abstract
In this paper, we present a simple new human activity recognition method using discrete cosine transform (DCT). The scheme uses the DCT coefficients extracted from silhouettes as descriptors (features) and performs frame-by-frame recognition, which make it simple and suitable for real time applications. We carried out several tests using radial basis neural network (RBF) for classification, a comparative study against stat-of-the-art methods shows that our technique is faster, simple and gives higher accuracy performance comparing to discrete transform based techniques and other methods proposed in literature.
Khelalef A, Ababsa F, Benoudjit N. A Sample Human Activity Recognition Technique Using DCT. 2016.Abstract
In this paper, we present a simple new human activity recognition method using discrete cosine transform (DCT). The scheme uses the DCT coefficients extracted from silhouettes as descriptors (features) and performs frame-by-frame recognition, which make it simple and suitable for real time applications. We carried out several tests using radial basis neural network (RBF) for classification, a comparative study against stat-of-the-art methods shows that our technique is faster, simple and gives higher accuracy performance comparing to discrete transform based techniques and other methods proposed in literature.
FILALI ABDELWAHHAB, KALLA M. Scenario de gestion des crises en milieu urbain–cas d’El Eulma (Algérie). Romanian Journal of GeographyRomanian Journal of Geography. 2016;60 :203-211.
FILALI ABDELWAHHAB, KALLA M. Scenario de gestion des crises en milieu urbain–cas d’El Eulma (Algérie). Romanian Journal of GeographyRomanian Journal of Geography. 2016;60 :203-211.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
GUEZOULI L, Essafi H. SEARCH OF INFORMATION BASED CONTENT IN SEMI-STRUCTURED DOCUMENTS USING INTERFERENCE WAVE. International Journal of Computational Science, Information Technology and Control EngineeringInternational Journal of Computational Science, Information Technology and Control Engineering. 2016;3 :29-39.Abstract
This paper proposes a semi-structured information retrieval model based on a new method for calculation of similarity. We have developed CASISS (Calculation of Similarity of Semi-Structured documents) method to quantify how two given texts are similar. This new method identifies elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of descriptors for each element, which characterize the contents of elements.It can be used to increase the accuracy of the information retrieval process by taking into account not only the presence of query terms in the given document but also the topology (position continuity) of these terms.
GUEZOULI L, Essafi H. SEARCH OF INFORMATION BASED CONTENT IN SEMI-STRUCTURED DOCUMENTS USING INTERFERENCE WAVE. International Journal of Computational Science, Information Technology and Control EngineeringInternational Journal of Computational Science, Information Technology and Control Engineering. 2016;3 :29-39.Abstract
This paper proposes a semi-structured information retrieval model based on a new method for calculation of similarity. We have developed CASISS (Calculation of Similarity of Semi-Structured documents) method to quantify how two given texts are similar. This new method identifies elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of descriptors for each element, which characterize the contents of elements.It can be used to increase the accuracy of the information retrieval process by taking into account not only the presence of query terms in the given document but also the topology (position continuity) of these terms.
Sahraoui H, Alaoui LC, Drid S, Bussy P. Second Order Sliding Mode Control of DC-DC converter used in the Photovoltaic System according an Adaptive MPPT. Journal of Renewable Energy ResearchJournal of Renewable Energy Research. 2016;6, No.2.
Sahraoui H, Alaoui LC, Drid S, Bussy P. Second Order Sliding Mode Control of DC-DC converter used in the Photovoltaic System according an Adaptive MPPT. Journal of Renewable Energy ResearchJournal of Renewable Energy Research. 2016;6, No.2.
Sahraoui H, Alaoui LC, Drid S, Bussy P. Second Order Sliding Mode Control of DC-DC converter used in the Photovoltaic System according an Adaptive MPPT. Journal of Renewable Energy ResearchJournal of Renewable Energy Research. 2016;6, No.2.
Sahraoui H, Alaoui LC, Drid S, Bussy P. Second Order Sliding Mode Control of DC-DC converter used in the Photovoltaic System according an Adaptive MPPT. Journal of Renewable Energy ResearchJournal of Renewable Energy Research. 2016;6, No.2.

Pages