Publications

2016
Khelalef A, Ababsa F, Benoudjit N. A Sample Human Activity Recognition Technique Using DCT. 2016.Abstract
In this paper, we present a simple new human activity recognition method using discrete cosine transform (DCT). The scheme uses the DCT coefficients extracted from silhouettes as descriptors (features) and performs frame-by-frame recognition, which make it simple and suitable for real time applications. We carried out several tests using radial basis neural network (RBF) for classification, a comparative study against stat-of-the-art methods shows that our technique is faster, simple and gives higher accuracy performance comparing to discrete transform based techniques and other methods proposed in literature.
Khelalef A, Ababsa F, Benoudjit N. A Sample Human Activity Recognition Technique Using DCT. 2016.Abstract
In this paper, we present a simple new human activity recognition method using discrete cosine transform (DCT). The scheme uses the DCT coefficients extracted from silhouettes as descriptors (features) and performs frame-by-frame recognition, which make it simple and suitable for real time applications. We carried out several tests using radial basis neural network (RBF) for classification, a comparative study against stat-of-the-art methods shows that our technique is faster, simple and gives higher accuracy performance comparing to discrete transform based techniques and other methods proposed in literature.
Khelalef A, Ababsa F, Benoudjit N. A Sample Human Activity Recognition Technique Using DCT. 2016.Abstract
In this paper, we present a simple new human activity recognition method using discrete cosine transform (DCT). The scheme uses the DCT coefficients extracted from silhouettes as descriptors (features) and performs frame-by-frame recognition, which make it simple and suitable for real time applications. We carried out several tests using radial basis neural network (RBF) for classification, a comparative study against stat-of-the-art methods shows that our technique is faster, simple and gives higher accuracy performance comparing to discrete transform based techniques and other methods proposed in literature.
FILALI ABDELWAHHAB, KALLA M. Scenario de gestion des crises en milieu urbain–cas d’El Eulma (Algérie). Romanian Journal of GeographyRomanian Journal of Geography. 2016;60 :203-211.
FILALI ABDELWAHHAB, KALLA M. Scenario de gestion des crises en milieu urbain–cas d’El Eulma (Algérie). Romanian Journal of GeographyRomanian Journal of Geography. 2016;60 :203-211.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication SystemsTelecommunication Systems. 2016;62 :277–288.Abstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
GUEZOULI L, Essafi H. SEARCH OF INFORMATION BASED CONTENT IN SEMI-STRUCTURED DOCUMENTS USING INTERFERENCE WAVE. International Journal of Computational Science, Information Technology and Control EngineeringInternational Journal of Computational Science, Information Technology and Control Engineering. 2016;3 :29-39.Abstract
This paper proposes a semi-structured information retrieval model based on a new method for calculation of similarity. We have developed CASISS (Calculation of Similarity of Semi-Structured documents) method to quantify how two given texts are similar. This new method identifies elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of descriptors for each element, which characterize the contents of elements.It can be used to increase the accuracy of the information retrieval process by taking into account not only the presence of query terms in the given document but also the topology (position continuity) of these terms.
GUEZOULI L, Essafi H. SEARCH OF INFORMATION BASED CONTENT IN SEMI-STRUCTURED DOCUMENTS USING INTERFERENCE WAVE. International Journal of Computational Science, Information Technology and Control EngineeringInternational Journal of Computational Science, Information Technology and Control Engineering. 2016;3 :29-39.Abstract
This paper proposes a semi-structured information retrieval model based on a new method for calculation of similarity. We have developed CASISS (Calculation of Similarity of Semi-Structured documents) method to quantify how two given texts are similar. This new method identifies elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of descriptors for each element, which characterize the contents of elements.It can be used to increase the accuracy of the information retrieval process by taking into account not only the presence of query terms in the given document but also the topology (position continuity) of these terms.
Sahraoui H, Alaoui LC, Drid S, Bussy P. Second Order Sliding Mode Control of DC-DC converter used in the Photovoltaic System according an Adaptive MPPT. Journal of Renewable Energy ResearchJournal of Renewable Energy Research. 2016;6, No.2.
Sahraoui H, Alaoui LC, Drid S, Bussy P. Second Order Sliding Mode Control of DC-DC converter used in the Photovoltaic System according an Adaptive MPPT. Journal of Renewable Energy ResearchJournal of Renewable Energy Research. 2016;6, No.2.
Sahraoui H, Alaoui LC, Drid S, Bussy P. Second Order Sliding Mode Control of DC-DC converter used in the Photovoltaic System according an Adaptive MPPT. Journal of Renewable Energy ResearchJournal of Renewable Energy Research. 2016;6, No.2.
Sahraoui H, Alaoui LC, Drid S, Bussy P. Second Order Sliding Mode Control of DC-DC converter used in the Photovoltaic System according an Adaptive MPPT. Journal of Renewable Energy ResearchJournal of Renewable Energy Research. 2016;6, No.2.
Sara B, Larbi GUEZOULI. Selection of Relevant Servers in Distributed Information Retrieval System. International Journal of Computer and Information EngineeringInternational Journal of Computer and Information Engineering. 2016;10 :818-822.
Sara B, Larbi GUEZOULI. Selection of Relevant Servers in Distributed Information Retrieval System. International Journal of Computer and Information EngineeringInternational Journal of Computer and Information Engineering. 2016;10 :818-822.
Benhamouda S, GUEZOULI L. Selection of Relevant Servers in Distributed Information Retrieval System. International Journal of Computer and Information EngineeringInternational Journal of Computer and Information Engineering. 2016;10.Abstract
Nowadays, the dissemination of information touches the distributed world, where selecting the relevant servers to a user request is an important problem in distributed information retrieval. During the last decade, several research studies on this issue have been launched to find optimal solutions and many approaches of collection selection have been proposed. In this paper, we propose a new collection selection approach that takes into consideration the number of documents in a collection that contains terms of the query and the weights of those terms in these documents. We tested our method and our studies show that this technique can compete with other state-of-the-art algorithms that we choose to test the performance of our approach.

Pages