Publications by Type: Journal Article

2019
Hamouid K, Adi K. Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority. Peer-to-Peer Networking and ApplicationsPeer-to-Peer Networking and Applications. 2019;12 :1137–1155.Abstract
This paper proposes a compromise-tolerant (t,n)-threshold certification management scheme for MANETs. Our solution allows to mitigate the impact of compromised nodes that participate in the certification service. In our design, certification management is achieved anonymously by an Anonymous Certification Authority (ACA). The latter is fully distributed into multiple disjointed coalitions of nodes whose structure is made hidden. This prevents an adversary from taking the control of the ACA by arbitrarily compromising t or more nodes. In other words, our proposal enhances the compromise-tolerance to more than the threshold number t of nodes without breaking down the whole certification system. As a result, our scheme requires a very smaller threshold than traditional schemes, which improves considerably the service availability. The experimental study shows a clear advantage over traditional threshold-based certification schemes by ensuring a significant positive compromise between security and availability of certification service.
Ameur S. SELFADJOINT OPERATORS, NORMAL OPERATORS, AND CHARACTERIZATIONS. Operators and MatricesOperators and Matrices. 2019;13 :835–842.Abstract
Let B(H) be the C* -algebra of all bounded linear operators acting on a complex separable Hilbert space H . We shall show that: 1. The class of all selfadjoint operators in B(H) multiplied by scalars is characterized by ∀X ∈ B(H), S2X +XS2 =>2||SXS||, (S ∈ B(H)). 2. The class of all normal operators in B(H) is characterized by each of the three following properties (where DS = S*S-SS* , for S ∈ B(H)), (i) ∀X ∈ B(H), S2X + XS2 =>2||SXS||,(S ∈ B(H)), (ii) S*DSS = 0 = SDSS*,(S ∈ B(H)), (iii) S*DSS=> 0 =>SDSS*,(S ∈ B(H)).  
Seddik A. Selfadjoint operators, normal operators, and characterizations. Operators and MatricesOperators and Matrices. 2019;13 :835-842.
Riad K, Hamza R, Yan H. Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records. IEEE AccessIEEE Access. 2019;7 :86384 - 86393.Abstract
Electronic health records (EHRs) replaced the old paper-based systems to make patient data more accurate, reliable, and more accessible. Yet, the EHRs system requires high transmission cost, energy, and waste of time for both doctors and patients. Furthermore, EHRs security presents a serious issue threatening the patient’s privacy. Most of the third-party hosting systems have some issues related to the users’ privacy and data security. Hence, it is necessary to restrict the access control policies and develop efficient mechanisms for cloud-based EHRs data. In this paper, a sensitive and energetic access control (SE-AC) mechanism is proposed for managing the cloud-hosted EHRs and providing a fine-grained access control even in critical situations. The proposed mechanism ensures the confidentiality of the patient’s data, where only authorized individuals to have permission to be able to edit or review certain of the patient’s data. Each EHR data is encrypted by the managing authority before submitting to the cloud storage. The requesting user can get dynamically changing permissions based on authentication and context attributes. In addition, seven major aspects have been quantified to assess the operation of any access control that could be deployed in the Internet-of-Thing (IoT). The security analysis indicates that the SE-AC mechanism is secure and will prevent any unauthorized access. The results show exceptional compatibility and performance with different setups and configuration.
AOUDIA I, BENHARZALLAH S, KAHLOUL L, KAZAR O. Service composition approaches for internet of things: a review. International Journal of Communication Networks and Distributed SystemsInternational Journal of Communication Networks and Distributed Systems. 2019;23 :194-230.
Ourlis L, Bellala D. SIMD Implementation of the Aho-Corasick Algorithm Using Intel AVX2. Scalable Computing: Practice and ExperienceScalable Computing: Practice and Experience. 2019;20 :563-576.
Zouggar EO, Chaouch S, Abdeslam DO, Abdelhamid AL. Sliding Control with Fuzzy Type-2 Controller of Wind Energy System Based on Doubly Fed Induction Generator. Instrumentation, Mesures, MétrologiesInstrumentation, Mesures, Métrologies. 2019;18.
Moussa O, Abdessemed R, Benaggoune S, Benguesmia H. Sliding Mode Control of a Grid-Connected Brushless Doubly Fed Induction Generator. European Journal of Electrical EngineeringEuropean Journal of Electrical Engineering. 2019;21 :421-430.Abstract
This paper designs an indirect power control method for brushless doubly fed induction generator (BDFIG), in which the stator is attached to grid with back-to-back space vector modulation (SVM) converter that converts the generated wind power. Our control method is a sliding mode control based on the theory of variable structure control. Specifically, the active and reactive powers, which are exchanged between the stator of the BDFIG and the grid in a linear and decoupled manner, are subjected to decoupled, vector control. In addition, a proportional integral (PI) controller was implemented to keep the DC-voltage constant for the back-to-back SVM converter. The efficiency of our control strategy was validated through simulation. The research greatly promotes the control of renewable energy generators.
Beghoul M, Demagh R. Slurry shield tunneling in soft ground. Comparison between field data and 3D numerical simulation. Studia Geotechnica et MechanicaStudia Geotechnica et Mechanica. 2019;41 :115-128.
Merahi W, Guedjiba S. SOME PROPERTIES OF COMMON HERMITIAN SOLUTIONS OF MATRIX EQUATIONS A1XA*1= B1 AND A2XA∗2 = B2. MATEMATICKI VESNIK ˇ MATEMATIQKI VESNIKMATEMATICKI VESNIK ˇ MATEMATIQKI VESNIK. 2019;71 :214–229.
Merahi W, Guedjiba S. SOME PROPERTIES OF COMMON HERMITIAN SOLUTIONS OF MATRIX EQUATIONS A1XA. 2019.
Saidi A, Naceri F. Speed control of a doubly-fed induction machine based on fuzzy adaptive. International Journal of Intelligent Engineering InformaticsInternational Journal of Intelligent Engineering Informatics. 2019;7 :61-76.
Saadna Y, Behloul A, Mezzoudj S. Speed limit sign detection and recognition system using SVM and MNIST datasets. Neural Computing and ApplicationsNeural Computing and Applications. 2019;31 :5005–5015.Abstract
This article presents a computer vision system for real-time detection and robust recognition of speed limit signs, specially designed for intelligent vehicles. First, a new segmentation method is proposed to segment the image, and the CHT transformation (circle hog transform) is used to detect circles. Then, a new method based on local binary patterns is proposed to filter segmented images in order to reduce false alarms. In the classification phase, a cascading architecture of two linear support vector machines is proposed. The first is trained on the GTSRB dataset to decide whether the detected region is a speed limit sign or not, and the second is trained on the MNIST dataset to recognize the sign numbers. The system achieves a classification recall of 99.81% with a precision of 99.08% on the GTSRB dataset; in addition, the system is also tested on the BTSD and STS datasets, and it achieves a classification recall of 99.39% and 98.82% with a precision of 99.05% and 98.78%, respectively, within a processing time of 11.22 ms.
Dassamiour S, Hambaba L. Stability of polyphenoloxidase and peroxidase activities of Deglet Nour and Ghars dates at different pH and temperatures. ICOFAAS 2019ICOFAAS 2019. 2019 :363.
Ferroudji F. Static strength analysis of a full-scale 850 kW wind turbine steel tower. Int. J. Eng. Adv. TechnolInt. J. Eng. Adv. Technol. 2019;8 :403-406.
A B, Sabrine G, Nafaa B. statistical and hydrochemical classification of underground waters in a multi-layer aquifer system in an arid zone: application to chott el gharbi basin (extreme west of algeria), ISSN: 1112-9867. Journal of Fundamental and Applied SciencesJournal of Fundamental and Applied Sciences. 2019;volume 11 :pp.786-803.
Boudjema A, Guettaia S, Brinis N. STATISTICAL AND HYDROCHEMICAL CLASSIFICATION OF UNDERGROUND WATERS IN A MULTI-LAYER AQUIFER SYSTEM IN AN ARID ZONE: APPLICATION TO CHOTT EL GHARBI BASIN (EXTREME WEST OF ALGERIA). Journal of Fundamental and Applied Sciences. 2019;11 :786-803.
BEDRA S, BEDRA R, BENKOUDA S, FORTAKI T. Study of an inverted rectangular patch printed on anisotropic substrates. IETE Journal of ResearchIETE Journal of Research. 2019 :1-8.
Sami B, Randa B, Siham B, Tarek F. Study of an Inverted Rectangular Patch Printed on Anisotropic Substrates (In press), e-ISSN 0974-780X. IETE Journal of ResearchIETE Journal of Research. 2019.Abstract
The resonant frequencies and bandwidths of the inverted rectangular patch over anisotropic substrates are investigated in this paper. A rigorous analysis is performed using dyadic Green’s function formulation in the vector Fourier transform domain. The Galerkin’s technic is then used in the resolution of the integral equation; the complex resonance frequencies for the TM01 mode are studied with sinusoidal basis functions. The numerical results obtained are compared with previously published numerical results computed by means of the electromagnetic simulator “IE3D software”. Good agreement is found in all cases among all sets of results. For an isotropic substrate, it is confirmed that the bandwidth decreases with increasing of air-gap layer for high permittivity and low thickness of the substrate. Also, we show that the resonant frequencies and bandwidths are highly dependent on the permittivity variations alongside the optical axis. Other theoretical results attained display that the resonant frequencies downtrend monotonically with increasing substrate thickness, the diminution being larger for the uniaxial anisotropy of the substrate. Finally, numerical results for the effects of uniaxial anisotropy in the substrate on the radiation of the inverted rectangular microstrip structure are also presented.
Bouthayna C, Toureche K, Bounecer H. Study of dietary risk factors for breast cancer in women in the region of Batna. ALGERIA Case-control study 2014-2015. Pan Arab Journal of Oncology . 2019;12 (2) :39-39.Abstract
  • Breast cancer is a multifactorial disease; several socioeconomic, food factors and lifestyle are incriminated in its development. It is the first cancer of women in the world and in Algeria, in terms of incidence and mortality. In Batna, the standardized incidence has doubled, from 13.6 in 2001 to 25.3 in 2011. OBJECTIVE The main objective is to study the dietary risk factors associated with the occurrence of breast cancer in women in the region of Batna. METHODS A case-control study with 1-1 matching by age and address was conducted from January 1st, 2013 to December 31rd, 2014. The total sample consisted of 160 women. RESULTS Eating fast-food every day increases the risk of breast cancer by 7 times as well as fat from red meat. Consumption of sausage and poultry skin by 5 times. Cooking vegetables in sauce increases the risk by 5 times (p <0.0001), Taking olive oil each day reduces the risk of 25% with a p <0.02, the consumption of milk mixed or not with coffee reduces the risk of one third and the fact of nibbling rarely reduced it with OR = 0,117 (0,023- 0.59) p = 0.009. DISCUSSION The associations between dietary risk factors and breast cancer are discordant in the various studies carried out in the world, our results are in line with studies but require further research
  • Copyright of Pan Arab Journal of Oncology is the property of Arab Medical Association Against Cancer and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.

Pages