Publications

2021
Boulagouas W, García-Herrero S, Chaib R, García SH, Djebabra M. On the contribution to the alignment during an organizational change: Measurement of job satisfaction with working conditions. Journal of safety research [Internet]. 2021;76 :289-300. Publisher's VersionAbstract

Introduction: Modern approaches to Occupational Health and Safety have acknowledged the important contribution that continuous improvements to working conditions can make to the motivation of employees, their subsequent performance, and therefore to the competitiveness of the company. Despite this fact, organizational change initiatives represent a path less traveled by employees. Specialized literature has drawn on the fact that employees’ satisfaction presents both the foundation and catalyst for effective implementation of improvements to working conditions. Method: This paper conceptualizes the alignment of employees through measurement of job satisfaction and uses the Bayesian Network to assess the influence of human factors, particularly the cognitive, emotional, and behavioral aspects. Toward this aim, the Bayesian Network is evaluated through a cross-validation process, and a sensitivity analysis is then conducted for each influential dimension: emotional, cognitive, and behavioral. Results: The results reveal that these three dimensions are interrelated and have a direct influence on job satisfaction and employees’ alignment during the organization change. Further, they suggest that the best strategy for enhanced alignment and smooth conduct of organizational changes is simultaneous enhancement of the three dimensions. Practical applications: This study shows the influence of emotional, cognitive, and behavioral dimensions on job satisfaction and employees’ alignment during the organizational change. Furthermore, it elaborates the way to develop efficient and effective strategies for a successful change implementation and sustained alignment.

Heddar Y, Djebabra M, Saadi S. Contribution to the quantitative study of violence in Algerian hospital environment. 11th Annual International Conference on Industrial Engineering and Operations Management, IEOM 2021 [Internet]. 2021 :2042-2042. Publisher's VersionAbstract
The workplace, and more particularly the healthcare sector, has recently experienced a staggering increase in violence. These aggressive behaviors are resulting in considerable consequences on healthcare workers, both in terms of mental and physical health. In light of this observation, this study aims to provide a quantitative analysis of the potential causes leading to violence in Algerian hospitals, which have become the place where tensions arise, especially during these uncertain times caused by the COVID-19 pandemic. Therefore, we started with conducting a field survey, in order to highlight the main causes behind this violence, as well as the strategy in terms of how it is managed as a risk. Then we used ISHIKAWA diagrams to classify predefined causes into several categories and anticipate the likelihood of such violent behaviors. Finally, the results of this study revealed that working conditions were the main cause of violence in Algerian hospitals. In order to remedy this gap, we recommend improving the healthcare staff well-being, as well as prioritizing proactive measures preventing violent behaviors
Bouhoufani O, Hamchi I. Correction to: Coupled System of Nonlinear Hyperbolic Equations with Variable-Exponents: Global Existence and Stability. Mediterranean Journal of Mathematics [Internet]. 2021;18 :1-2. Publisher's Version
Bellal SE, Mouss LH, Sahnoun M’hammed, Messaadia M. Cost Optimisation for Wheelchair Redesign. 2021 1st International Conference On Cyber Management And Engineering (CyMaEn) [Internet]. 2021 :1-5. Publisher's VersionAbstract
Requirements of users in developing countries differ from those of developed countries. This difference can be seen through wheelchair displacement in infrastructures that don't meet international standards. However, developing countries are obliged to purchase products from developed countries that don't necessarily meet all user's requirements. The modification of these requirements will generate disruption on all the supply chain. This paper proposes a model for optimising the cost of requirement modification on the supply chain and seeks to evaluate the introduction of a new requirement on an existing product/process. This model is adapted to the redesign and development of products, such as wheelchairs, satisfying specific Algerian end-user requirements.
Bouhoufani O, Hamchi I. Coupled System of Nonlinear Hyperbolic Equations with Variable-Exponents: Global Existence and Stability (vol 17, 166, 2020). MEDITERRANEAN JOURNAL OF MATHEMATICS [Internet]. 2021;18. Publisher's VersionAbstract

In this paper, we consider a coupled system of two nonlinear hyperbolic equations with variable-exponents in the damping and source terms. Under suitable assumptions on the intial data and the variable exponents, we prove a global existence theorem, using the Stable-set method. Then, we establish a decay estimate of the solution energy, by Komornik’s integral approach.

Nacer F, DRIDI H. The Creation of Development Regions as Input to the Regional Development in the North-East Wilayas (Departments) of Algeria. Analele Universităţii din Oradea, Seria GeografieAnalele Universităţii din Oradea, Seria Geografie [Internet]. 2021;31 :1-10. Publisher's VersionAbstract
  • The research paper aims to create development region, as itis a means for reorganizing the potential for development, as the research work dealt with a systematic vision based on the merging of the results of statistical analysis with the principles adopted in regional divisions, we have identified three regions with different developmental characteristics; the north eastern developmental region, the Constantine development region and the eastern high plains region. The results of the work are shown in a map of development regions were the final outputs of the research paper are prepared.
  • Copyright of Annals of the University of Oradea, Geography Series / Analele Universitatii din Oradea, Seria Geografie is the property of University of Oradea, Department of Geography, Tourism & Territorial Planning and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.
Boubiche D-E, Athmania D, Boubiche S, Homero T-C. Cybersecurity issues in wireless sensor networks: current challenges and solutions. Wireless Personal Communications [Internet]. 2021;117 :177-213. Publisher's VersionAbstract

Wireless sensor networks are deployed without predefined infrastructure and are generally left unattended. Indeed, the vulnerability of the wireless sensor networks to attacks comes principally from their inherent characteristics. As the data are transmitted over the air, it is very easy for an adversary to spy on traffic. Also, to meet the strict budgetary requirements, the sensor nodes tend to not be tamperproof and thus offer no protection against security attacks. Alongside with these vulnerabilities, the human intervention is always not allowed to deal with adversaries who attempt to compromise the network. Therefore, security systems are mainly needed to secure the network and ensure the protection against security threats. Indeed, cryptographic based systems are generally used to ensure security. However, due to the lack of memory and power (low computing, limited energy reserves) of the sensor nodes, most of these approaches are not suitable. Therefore, providing security while respecting the specific constraints of the sensors, represents one of the most important research issue in wireless sensor networks. Indeed, several studies have been conducted these last decades to propose lightweight and efficient security protocols for wireless sensor networks. In this paper, we review the most leading protocols and classify them based the addressed security issue. Also, we outline the main security constraints and challenges and present the future research directions based on the emerged application fields.

Mohammed AS, Smail R. A decision loop for situation risk assessment under uncertainty: A case study of a gas facility. Petroleum [Internet]. 2021;7 (3) :343-348. Publisher's VersionAbstract

This paper presents a decision-making support system for situation risk assessment associated with critical alarms conditions in a gas facility. The system provides a human operator with advice on the confirmation and classification of occurred alarm. The input of the system comprises uncertain and incomplete information. In the light of uncertain and incomplete information, different uncertainties laws have been associated with the probabilistic assessment of the system loops which combine data of several sources to reach the ultimate classification. The implemented model used Observe-Orient-Decide-Act loop (OODA) combined with Bayesian networks. Results show that the system can classify the alarms system.

Sebti R, Zroug S, KAHLOUL L, BENHARZALLAH S. A deep learning approach for the diabetic retinopathy detection. The Proceedings of the International Conference on Smart City Applications [Internet]. 2021 :459-469. Publisher's VersionAbstract
Diabetic retinopathy is a severe retinal disease that can blur or distort the vision of the patient. It is one of the leading causes of blindness. Early detection of diabetic retinopathy can significantly help in the treatment. The recent development in the field of AI and especially Deep learning provides ambitious solutions that can be exploited to predict, forecast and diagnose several diseases in their early phases. This work aims towards finding an automatic way to classify a given set of retina images in order to detect the diabetic retinopathy. Deep learning concepts have been used with a convolutional neural network (CNN) algorithm to build a multi-classification model that can detect and classify disease levels automatically. In this study, a CNN architecture has been applied with several parameters on a dataset of diabetic retinopathy with different structures. At the current stage of this work, obtained results are highly encouraging.
Berghout T, Mouss L-H, Bentrcia T, Elbouchikhi E, Benbouzid M. A deep supervised learning approach for condition-based maintenance of naval propulsion systems. Ocean EngineeringOcean Engineering [Internet]. 2021;221 :108525. Publisher's VersionAbstract

In the last years, predictive maintenance has gained a central position in condition-based maintenance tasks planning. Machine learning approaches have been very successful in simplifying the construction of prognostic models for health assessment based on available historical labeled data issued from similar systems or specific physical models. However, if the collected samples suffer from lack of labels (small labeled dataset or not enough samples), the process of generalization of the learning model on the dataset as well as on the newly arrived samples (application) can be very difficult. In an attempt to overcome such drawbacks, a new deep supervised learning approach is introduced in this paper. The proposed approach aims at extracting and learning important patterns even from a small amount of data in order to produce more general health estimator. The algorithm is trained online based on local receptive field theories of extreme learning machines using data issued from a propulsion system simulator. Compared to extreme learning machine variants, the new algorithm shows a higher level of accuracy in terms of approximation and generalization under several training paradigms.

Naima G, Rahi SB. Design and Optimization of Heterostructure Double Gate Tunneling Field Effect Transistor for Ultra Low Power Circuit and System. In: Electrical and Electronic Devices, Circuits, and Materials: Technological Challenges and SolutionsElectrical and Electronic Devices, Circuits, and Materials: Technological Challenges and Solutions. ; 2021. pp. 19-36. Publisher's VersionAbstract

This chapter focuses on double gate (DG) Tunneling Field Effect Transistor (TFET), having band engineering and high - k dielectrics. The basic structure of TFET device is derived and developed by p-i-n diode, containing two heavily doped degenerated semiconductor “p” and “n” regions and lightly doped intrinsic “i” region, respectively. The chapter explores the idea of high-k dielectric engineering as well as band engineering concept with DG -TFET. TFET is a type of field effect device in which current transport phenomena occur due to quantum tunneling between source and channel. The estimation of device characteristics and performance of TFET is time consuming and costly due to lack of rapid advancement in technology. TFET devices have become the most popular switching device among semiconductor players. The chapter summarizes the obtained results by popular device analysis technique, modeling and simulation of DG -TFET.

Alkebsi EAA, Ameddah H, OUTTAS T, Almutawakel A. Design of graded lattice structures in turbine blades using topology optimization. International Journal of Computer Integrated Manufacturing [Internet]. 2021;34 :370-384. Publisher's VersionAbstract

Designing and manufacturing lattice structures with Topology Optimization (TO) and Additive Manufacturing (AM) techniques is a novel method to create light-weight components with promising potential and high design flexibility. This paper proposes a new design of lightweight-graded lattice structures to replace the internal solid volume of the turbine blade to increase its endurance of high thermal stresses effects. The microstructure design of unit cells in a 3D framework is conducted by using the lattice structure topology optimization (LSTO) technique. The role of the LSTO is to find an optimal density distribution of lattice structures in the design space under specific stress constraints and fill the inner solid part of the blade with graded lattice structures. The derived implicit surfaces modelling is used from a triply periodic minimal surfaces (TPMS) to optimize the mechanical performances of lattice structures. Numerical results show the validity of the proposed method. The effectiveness and robustness of the constructed models are analysed by using finite element analysis. The simulation results show that the graded lattice structures in the improved designs have better efficiency in terms of lightweight (33.41–40.32%), stress (25.52–48.55%) and deformation (7.35–19.58%) compared to the initial design.

Brahimi M, Melkemi K, Boussaad A. Design of nonstationary wavelets through the positive solution of Bezout’s equation. Journal of Interdisciplinary Mathematics [Internet]. 2021;24 (3) :553-565. Publisher's VersionAbstract

In this paper, we present a new technique for constructing a nonstationary wavelet. The key idea relies on the following: for each wavelet level, we solve the Bezout’s equation and we propose a positive solution over the interval [–1, 1]. Using the Bernstein’s polynomials we approximate this proposed positive solution with the intention to perform a spectral factorization.

Seddik M-T, KADRI O, Bouarouguene C, Brahimi H. Detection of Flooding Attack on OBS Network Using Ant Colony Optimization and Machine Learning. Computación y Sistemas [Internet]. 2021;25 (2) :423-433. Publisher's VersionAbstract

Optical burst switching (OBS) has become one of the best and widely used optical networking techniques. It offers more efficient bandwidth usage than optical packet switching (OPS) and optical circuit switching (OCS).However, it undergoes more attacks than other techniques and the Classical security approach cannot solve its security problem. Therefore, a new security approach based on machine learning and cloud computing is proposed in this article. We used the Google Colab platform to apply Support Vector Machine (SVM) and Extreme Learning Machine (ELM)to Burst Header Packet (BHP) flooding attack on Optical Burst Switching (OBS) Network Data Set.

AKSA K, Aitouche S, Bentoumi H, Sersa I. Developing a Web Platform for the Management of the Predictive Maintenance in Smart Factories. Wireless Personal Communications [Internet]. 2021;119 :1469-1497. Publisher's VersionAbstract

Industry 4.0 is a tsunami that will invade the whole world. The real challenge of the future factories requires a high degree of reliability both in machinery and equipment. Thereupon, shifting the rudder towards new trends is an inevitable obligation in this fourth industrial revolution where the maintenance system has radically changed to a new one called predictive maintenance 4.0 (PdM 4.0). This latter is used to avoid predicted problems of machines and increase their lifespan taking into account that if machines have not any predicted problem, they will never be checked. However, in order to get successful prediction of any kind of problems, minimizing energy and resources consumption along with saving costs, this PdM 4.0 needs many new emerging technologies such as the internet of things infrastructure, collection and distribution of data from different smart sensors, analyzing/interpreting a huge amount of data using machine/deep learning…etc. This paper is devoted to present the industry 4.0 and its specific technologies used to ameliorate the existing predictive maintenance strategy. An example is given via a web platform to get a clear idea of how PdM 4.0 is applied in smart factories.

Belmazouzi Y. DEVELOPPEMENT ET VALIDATION D’UNE APPROCHE DE DECISION SOCIOTECHNIQUE LIEE AUX PROBLEMES D’INDUSTRIALISATION EN ALGERIE. Hygiène et sécurité industrielle [Internet]. 2021. Publisher's VersionAbstract
Le Groupe Sonatrach est le géant algérien de l’industrie pétro-gazière. Sa force réside dans sa capacité à être un Groupe intégré dans l’ensemble de la chaîne de valeurs (depuis l’exploration en passant par la production jusqu’à la commercialisation). Ses installations onshore, qui sont considérées comme des systèmes sociotechniques complexes, souffrent des problèmes de vieillissement matérialisés par la dégradation des performances de ces installations. Cette thèse de doctorat a pour objet d’étudier ce problème de vieillissement dans le but de le maîtriser. S’intégrant dans ce contexte et après avoir rappelé le phénomène du vieillissement ainsi que les approches qui le gouverne, une proposition d’une approche de maîrise du vieillissement à base d’indicateurs est proposée dans un premier temps et dans un second temps une étude critique du référentiel "Gestion des Modifications" du Groupe Sonatrach est également présentée.
Chouia S, Seddik-Ameur N. Different EDF goodness-of-fit tests for competing risks models. Communications in Statistics-Simulation and ComputationCommunications in Statistics-Simulation and Computation [Internet]. 2021;52 (8) :1-11. Publisher's VersionAbstract

The common used goodeness-of-fit tests are based on the empirical distributions functions (EDF) where distances between empirical and theoretical hypothesized distributions are compared to critical values. The aim of this paper is to provide for different sample sizes, tables of goodness-of-fit critical values of modified Kolmogorov-Smirnov statistic Dn,��, Anderson-Darling statistic A2, Cramer-Von Mises statistic W2,�2, Liao and Shimokawa statistic Ln, and Watson statistic U2 for the competing risks model of Bertholon which is used to describe the reliability of real systems where failure times can have different risks and in medical studies to characterize the survival time of patients who can have risks of death from different causes. The power of these statistics is studied using some alternatives such as the exponential, the inverse Weibull, the exponentiated Weibull and the exponentiated exponential distributions. All the computation are carried out by using matlab software and Monte Carlo method.

BENDJEDDOU YACINE, Abdessemed R, MERABET ELKHEIR. DIRECTIONAL VIRTUAL FLOW CONTROL OF THE DOUBLE STAR CAGE ASYNCHRONOUS GENERATOR. Revue Roumaine des Sciences Techniques—Série Électrotechnique et Énergétique [Internet]. 2021;66 :71-76. Publisher's VersionAbstract

This article is devoted to the study of the performance of the double star cage asynchronous generator (GASDE) in isolated site. The control system consists of a GASDE connected to a dc bus and a load at the output of two PWM control rectifiers. A comparative study between the conventional control technique and the adapted control based on the introduction of the SVM- PI-fuzzy and a new flux estimator (virtual stator flux) in order to improve the quality of energy and to attenuate the harmonic of the current.

Ledmi M, Moumen H, Siam A, Haouassi H, Azizi N. A Discrete Crow Search Algorithm for Mining Quantitative Association Rules. International Journal of Swarm Intelligence Research (IJSIR) [Internet]. 2021;12 (4) :101-124. Publisher's VersionAbstract
Association rules are the specific data mining methods aiming to discover explicit relations between the different attributes in a large dataset. However, in reality, several datasets may contain both numeric and categorical attributes. Recently, many meta-heuristic algorithms that mimic the nature are developed for solving continuous problems. This article proposes a new algorithm, DCSA-QAR, for mining quantitative association rules based on crow search algorithm (CSA). To accomplish this, new operators are defined to increase the ability to explore the searching space and ensure the transition from the continuous to the discrete version of CSA. Moreover, a new discretization algorithm is adopted for numerical attributes taking into account dependencies probably that exist between attributes. Finally, to evaluate the performance, DCSA-QAR is compared with particle swarm optimization and mono and multi-objective evolutionary approaches for mining association rules. The results obtained over real-world datasets show the outstanding performance of DCSA-QAR in terms of quality measures.
Aouadj W, Abdessemed MR, Seghir R. Discrete Large-scale Multi-Objective Teaching-Learning-Based Optimization Algorithm, in Proceedings of the 4th International Conference on Networking, Information Systems & Security. ; 2021 :1-6. Publisher's VersionAbstract
This paper presents a teaching-learning-based optimization algorithm for discrete large-scale multi-objective problems (DLM-TLBO). Unlike the previous variants, the learning strategy used by each individual and the acquired knowledge are defined based on its level. The proposed approach is used to solve a bi-objective object clustering task (B-OCT) in a swarm robotic system, as a case study. The simple robots have as mission the gathering of a number of objects distributed randomly, while respecting two objectives: maximizing the clustering quality, and minimizing the energy consumed by these robots. The simulation results of the proposed algorithm are compared to those obtained by the well-known algorithm NSGA-II. The results show the superiority of the proposed DLM-TLBO in terms of the quality of the obtained Pareto front approximation and convergence speed.

Pages