Publications by Type: Book Chapter

2016
Sahraoui S, Bilami A. Asymmetric end-to-end security for human-to-thing communications in the internet of things. In: Modelling and Implementation of Complex Systems. Springer ; 2016. pp. 249-260.
Bentrcia T, Mouss L-H. Fuzzy Modeling of Single Machine Scheduling Problems Including the Learning Effect. In: Metaheuristics for Production Systems. Springer ; 2016. pp. 315-348.
Bentrcia T, DJEFFAL F, Chebaki E. Multi-objective Design of Nanoscale Double Gate MOSFET Devices Using Surrogate Modeling and Global Optimization. In: Intelligent Nanomaterials, II, Second Edition. Willey ; 2016. pp. 395-427.Abstract
In recent years, the design and fabrication ofmulti-gate Metal Oxide Semiconductor Field Effect Transistors (MOSFETs) have attracted more efforts due to their high appropriateness for advanced integration circuits’ applications. In fact, the boost of MOSFET structures is a battle against parasitic phenomena appearing at the nanoscale level. Short channel and quantum confinement effects are among the critical drawbacks that need to be remedied carefully. On the other hand, the hot carrier degradation effect is mainly a reliability concern affecting the device per- formance after long duration of work. In response to the high computational costs related to the development of physi- cal based models for Double Gate (DG) MOSFETs including all these effects, more flexible alternatives have been proposed for the prediction of device performances. Our aim in this chapter is to investigate the efficiency of a new proposed frame- work, built upon Kriging metamodeling and Non-dominated Sorting Genetic Algorithm version II (NSGA II), for the optimal design in terms of OFF-current, threshold voltage and swing factor. The input variables of interest are limited to the geometrical parameters namely the channel length and thickness. Data generated according to computer experiments, based on ATLAS 2-D simulator, are used to identify and adjust Kriging surrogate models. It is emphasized that the obtained models can be used accurately in a multi-objective context to offer several Pareto optimal configurations. Therefore, a wide range of selection possibilities is avail- able to the designer depending on situations under consideration.
Djeffal EA, Djeffal L, Benoumelaz F. New Complexity Analysis of the Path Following Method for Linear Complementarity Problem. In: Intelligent Mathematics II: Applied Mathematics and Approximation Theory. Springer ; 2016. pp. 87-104.
2015
ZEGHICHI L, MOKHNACHE L, Djebabra MEBAREK. Application of the Monte Carlo method for the determination of physical parameters of an electrical discharge. In: Computational Problems in Science and Engineering. Springer ; 2015. pp. 439-447.
Abdenebi H, Zitouni B, Moussa HB, HADDAD D, Zitouni H, Sahli Y. Inlet methane temperature effect at a planar sofc thermal field under direct internal reforming condition. In: Progress in Clean Energy, Volume 2. Springer ; 2015. pp. 567-581.
HADDAD D, Oulmi K, Moussa HB, Aouachria Z, Youcef S. Modeling of Heat Transfer in the PEMFC: Velocity Inlet and Current Density Effect. In: Progress in Clean Energy, Volume 1. Springer ; 2015. pp. 463-473.
Bait O, Si-Ameur M, Benmoussa A. Phenomenological Study of a Cylindrical Solar Water Heater: Critical Analysis of the Mathematical Model. In: Progress in Clean Energy, Volume 1. Springer ; 2015. pp. 485-501.
Cherifa AZOUI, Brahim BENMOHAMMED. Stability Lobes for 1DOF and 2DOF Milling System. In: Design and Modeling of Mechanical Systems - II. Springer, Cham ; 2015. pp. pp 645-650.Abstract
Recently, the investigation of periodic motion of the delay differential (DDEs) and the associated variation systems become into the focus of many studies. One of the most important motivations is the milling process analysis. In this work, the semi discretization method is briefly explained and have been applied for 1-DOF (degree of freedom) and 2-DOF milling system in order to build the stability lobes charts.
Toral-Cruz H, Hidoussi F, Boubiche DE, Barbosa R, Voznak M, Lakhtaria KI. A survey on wireless sensor networks. In: Next Generation Wireless Network Security and Privacy. IGI Global ; 2015. pp. 171-210.
Sahli Y, Zitouni B, Moussa HB, Abdenebi H. Three-Dimensional Numerical Study of the Heat Transfer on The Planar Solid Oxide Fuel Cell: Joules Effect. In: Progress in Clean Energy, Volume 1. Springer ; 2015. pp. 449-461.
Toral-Cruz H, Hidoussi F, Boubiche DE, Bilami A, Voznak M, Jakovlev S. Wireless Sensor Networks. In: Encyclopedia of Information Science and Technology, Third Edition. IGI Global ; 2015. pp. 5815-5824.
2014
Mesbahi N, KAZAR O, Zoubeidi M, BENHARZALLAH S. An agent-based modeling for an enterprise resource planning (ERP). In: Advanced Approaches to Intelligent Information and Database SystemsAdvanced Approaches to Intelligent Information and Database Systems. Springer ; 2014. pp. 225-234.
Bentrcia T, DJEFFAL F. An ANFIS Based Approach for Prediction of Threshold Voltage Degradation in Nanoscale DG MOSFET Devices. In: Transactions on Engineering Technologies. Springer ; 2014. pp. 339-353.
BENDIB T, DJEFFAL F. Fuzzy-Logic Based Computation for Parameters Identification of Solar Cell Models. In: Transactions on Engineering Technologies. Springer ; 2014. pp. 327-338.
2013
Hafi H, Bilami A. Cooperative strategy to secure mobile p2p network. In: Modeling Approaches and Algorithms for Advanced Computer Applications. Springer ; 2013. pp. 145-154.
Djeffal EA, Djeffal L, Benterki D. Extension of Karmarkar’s algorithm for solving an optimization problem. In: Advances in Applied Mathematics and Approximation Theory. Springer ; 2013. pp. 263-271.
DJEFFAL F, Meguellati M. Multigate RADFET dosimeter for radioactive environment monitoring applications. In: IAENG Transactions on Engineering Technologies. Springer ; 2013. pp. 301-313.
BENDIB T, DJEFFAL F. Multi-objective-based approach to optimize the analog electrical behavior of GSDG MOSFET: Application to nanoscale circuit design. In: IAENG Transactions on Engineering Technologies. Springer ; 2013. pp. 315-325.
Bensari M, Bilami A. A new hybrid authentication protocol to secure data communications in mobile networks. In: Modeling Approaches and Algorithms for Advanced Computer Applications. Springer ; 2013. pp. 195-204.

Pages