2019
Hichem H, Djamel B.
Regrouping of acoustics microwaves in piezoelectric material (ZnO) by SVM classifier, ISSN / e-ISSN 2398-0311 / 2398-032X. International Journal of Digital Signals and Smart SystemsInternational Journal of Digital Signals and Smart Systems. 2019;Volume 3 :pp 110 - 120.
AbstractIn this paper, we propose a new numerical method for acoustics microwaves detection of an acoustics microwaves signal during the propagation of acoustics microwaves in a piezoelectric substrate zinc oxide (ZnO). We have used support vector machines (SVMs), the originality of this method is the accurate values that provides this technique help to identify undetectable waves that we can not identify with the classical methods. We classify all the values of the real part and the imaginary part of the coefficient attenuation with the acoustic velocity in order to build a model from which we note the types of microwaves acoustics (bulk waves or surface waves or leaky waves). We obtain accurate values for each of the coefficient attenuation and acoustic velocity. This study will be very interesting in modelling and realisation of acoustics microwaves devices (ultrasound, radiating structures, filter SAW…) based on the propagation of acoustics microwaves.
Hafdaoui H, Benatia D.
Regrouping of acoustics microwaves in piezoelectric material (ZnO) by SVM classifier. International Journal of Digital Signals and Smart SystemsInternational Journal of Digital Signals and Smart Systems. 2019;3 :110-120.
Hamza Z, Hacene S.
Reliability and safety analysis using fault tree and Bayesian networks. International Journal of Computer Aided Engineering and TechnologyInternational Journal of Computer Aided Engineering and Technology. 2019;11 :73-86.
Ari AAA, Gueroui A, Titouna C, Thiare O, Aliouat Z.
Resource allocation scheme for 5G C-RAN: A Swarm Intelligence based approach. Computer NetworksComputer Networks. 2019;165 :106957.
Bakhti I, Chaouch S, Makouf A, Douadi T.
Robust integral backstepping control with extended Kalman filter of permanent magnet synchronous motor. International Journal of Industrial and Systems EngineeringInternational Journal of Industrial and Systems Engineering. 2019;31 :1-14.
Goléa NE-H, Melkemi KE.
ROI-based fragile watermarking for medical image tamper detection. International Journal of High Performance Computing and NetworkingInternational Journal of High Performance Computing and Networking. 2019;13 :199-210.
Meddour A, Yahia M, Hambaba L.
Safety evaluation and analgesic studies of defatted methanol extract of Capparis spinosa L.(Capparidaceae) fruits and roots bark in albino wistar rats. Journal of Biological Research-Bollettino della Società Italiana di Biologia SperimentaleJournal of Biological Research-Bollettino della Società Italiana di Biologia Sperimentale. 2019;92.
BOUCETTA ALDJIA, Melkemi KE.
Score Level Fusion of Palmprint, Face and Iris Using Adaptive PSO. International Journal of Applied Metaheuristic Computing (IJAMC)International Journal of Applied Metaheuristic Computing (IJAMC). 2019;10 :175-194.
Hamouid K, Adi K.
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority. Peer-to-Peer Networking and ApplicationsPeer-to-Peer Networking and Applications. 2019;12 :1137–1155.
AbstractThis paper proposes a compromise-tolerant (t,n)-threshold certification management scheme for MANETs. Our solution allows to mitigate the impact of compromised nodes that participate in the certification service. In our design, certification management is achieved anonymously by an Anonymous Certification Authority (ACA). The latter is fully distributed into multiple disjointed coalitions of nodes whose structure is made hidden. This prevents an adversary from taking the control of the ACA by arbitrarily compromising t or more nodes. In other words, our proposal enhances the compromise-tolerance to more than the threshold number t of nodes without breaking down the whole certification system. As a result, our scheme requires a very smaller threshold than traditional schemes, which improves considerably the service availability. The experimental study shows a clear advantage over traditional threshold-based certification schemes by ensuring a significant positive compromise between security and availability of certification service.
Ameur S.
SELFADJOINT OPERATORS, NORMAL OPERATORS, AND CHARACTERIZATIONS. Operators and MatricesOperators and Matrices. 2019;13 :835–842.
AbstractLet B(H) be the C* -algebra of all bounded linear operators acting on a complex separable Hilbert space H . We shall show that: 1. The class of all selfadjoint operators in B(H) multiplied by scalars is characterized by ∀X ∈ B(H), S2X +XS2 =>2||SXS||, (S ∈ B(H)). 2. The class of all normal operators in B(H) is characterized by each of the three following properties (where DS = S*S-SS* , for S ∈ B(H)), (i) ∀X ∈ B(H), S2X + XS2 =>2||SXS||,(S ∈ B(H)), (ii) S*DSS = 0 = SDSS*,(S ∈ B(H)), (iii) S*DSS=> 0 =>SDSS*,(S ∈ B(H)).
Seddik A.
Selfadjoint operators, normal operators, and characterizations. Operators and MatricesOperators and Matrices. 2019;13 :835-842.
Riad K, Hamza R, Yan H.
Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records. IEEE AccessIEEE Access. 2019;7 :86384 - 86393.
AbstractElectronic health records (EHRs) replaced the old paper-based systems to make patient data more accurate, reliable, and more accessible. Yet, the EHRs system requires high transmission cost, energy, and waste of time for both doctors and patients. Furthermore, EHRs security presents a serious issue threatening the patient’s privacy. Most of the third-party hosting systems have some issues related to the users’ privacy and data security. Hence, it is necessary to restrict the access control policies and develop efficient mechanisms for cloud-based EHRs data. In this paper, a sensitive and energetic access control (SE-AC) mechanism is proposed for managing the cloud-hosted EHRs and providing a fine-grained access control even in critical situations. The proposed mechanism ensures the confidentiality of the patient’s data, where only authorized individuals to have permission to be able to edit or review certain of the patient’s data. Each EHR data is encrypted by the managing authority before submitting to the cloud storage. The requesting user can get dynamically changing permissions based on authentication and context attributes. In addition, seven major aspects have been quantified to assess the operation of any access control that could be deployed in the Internet-of-Thing (IoT). The security analysis indicates that the SE-AC mechanism is secure and will prevent any unauthorized access. The results show exceptional compatibility and performance with different setups and configuration.
AOUDIA I, BENHARZALLAH S, KAHLOUL L, KAZAR O.
Service composition approaches for internet of things: a review. International Journal of Communication Networks and Distributed SystemsInternational Journal of Communication Networks and Distributed Systems. 2019;23 :194-230.
Ourlis L, Bellala D.
SIMD Implementation of the Aho-Corasick Algorithm Using Intel AVX2. Scalable Computing: Practice and ExperienceScalable Computing: Practice and Experience. 2019;20 :563-576.
Zouggar EO, Chaouch S, Abdeslam DO, Abdelhamid AL.
Sliding Control with Fuzzy Type-2 Controller of Wind Energy System Based on Doubly Fed Induction Generator. Instrumentation, Mesures, MétrologiesInstrumentation, Mesures, Métrologies. 2019;18.
Moussa O, Abdessemed R, Benaggoune S, Benguesmia H.
Sliding Mode Control of a Grid-Connected Brushless Doubly Fed Induction Generator. European Journal of Electrical EngineeringEuropean Journal of Electrical Engineering. 2019;21 :421-430.
AbstractThis paper designs an indirect power control method for brushless doubly fed induction generator (BDFIG), in which the stator is attached to grid with back-to-back space vector modulation (SVM) converter that converts the generated wind power. Our control method is a sliding mode control based on the theory of variable structure control. Specifically, the active and reactive powers, which are exchanged between the stator of the BDFIG and the grid in a linear and decoupled manner, are subjected to decoupled, vector control. In addition, a proportional integral (PI) controller was implemented to keep the DC-voltage constant for the back-to-back SVM converter. The efficiency of our control strategy was validated through simulation. The research greatly promotes the control of renewable energy generators.
Beghoul M, Demagh R.
Slurry shield tunneling in soft ground. Comparison between field data and 3D numerical simulation. Studia Geotechnica et MechanicaStudia Geotechnica et Mechanica. 2019;41 :115-128.
Merahi W, Guedjiba S.
SOME PROPERTIES OF COMMON HERMITIAN SOLUTIONS OF MATRIX EQUATIONS A1XA*1= B1 AND A2XA∗2 = B2. MATEMATICKI VESNIK ˇ MATEMATIQKI VESNIKMATEMATICKI VESNIK ˇ MATEMATIQKI VESNIK. 2019;71 :214–229.
Saidi A, Naceri F.
Speed control of a doubly-fed induction machine based on fuzzy adaptive. International Journal of Intelligent Engineering InformaticsInternational Journal of Intelligent Engineering Informatics. 2019;7 :61-76.