2019
Tigane S, KAHLOUL L, BENHARZALLAH S, Baarir S, BOUREKKACHE S.
Reconfigurable GSPNs: a modeling formalism of evolvable discrete-event systems. Science of Computer ProgrammingScience of Computer Programming. 2019;183 :102302.
Imen C, Fouad DJAIZ, Mabrouk B.
Reconsideration of the Cenomanian-Turonian stratigraphics units in the Tebessa region (Algero-TunisienConfines): Petroleum implications. The 1st National Seminar in Geosciences and Environment (SGSE 2019) [Internet]. 2019.
Publisher's VersionAbstract
The Algero-Tunisian confines (Tebessa region) is partially composed of Cenomano- Turonian carbonate outcrops; therefore, it presents a good example to highlight the black shale levels reported over a short period, around the Cenomanian-Turonian boundary. The lithostratigraphic study made it possible to specify the paleoenvironment during the Cenomano-Turonian in the Tebessa region. At that time, the depositional environment emphasized a relatively deep, calm and often confined ocean environment that was significantly shalloweron the north part of the study area. The lithology and the distribution of the facies in the Constantine domain allow us to underline the pelagic influences during the Upper Cretaceous and neritic during the lower Cretaceous period. We note a maximum thickness of the Cenomano- Turonian in the southern zones and a minimum (100m) appears further north. This Palaeogeographic organization continue laterally in Tunisia on the extension of the Constantine mole.
Naima B, Louiza B, Boubekeur A.
Reduction of the Low Voltage Substation Constraints by Inserting Photovoltaic Systems in Underserved Areas. Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering). 2019;12 :105-112.
Benbouza N, Benfarhi L, Azoui B.
Reduction of the Low Voltage Substation Constraints by Inserting Photovoltaic Systems in Underserved Areas. Recent Advances in Electrical & Electronic Engineering, DOI : 10.2174/2352096511666180523095219Recent Advances in Electrical & Electronic Engineering, DOI : 10.2174/2352096511666180523095219. 2019;12 :102-107.
Hafdaoui H, Benatia D.
Regrouping of acoustics microwaves in piezoelectric material (ZnO) by SVM classifier. International Journal of Digital Signals and Smart SystemsInternational Journal of Digital Signals and Smart Systems. 2019;3 :110-120.
Hichem H, Djamel B.
Regrouping of acoustics microwaves in piezoelectric material (ZnO) by SVM classifier, ISSN / e-ISSN 2398-0311 / 2398-032X. International Journal of Digital Signals and Smart SystemsInternational Journal of Digital Signals and Smart Systems. 2019;Volume 3 :pp 110 - 120.
AbstractIn this paper, we propose a new numerical method for acoustics microwaves detection of an acoustics microwaves signal during the propagation of acoustics microwaves in a piezoelectric substrate zinc oxide (ZnO). We have used support vector machines (SVMs), the originality of this method is the accurate values that provides this technique help to identify undetectable waves that we can not identify with the classical methods. We classify all the values of the real part and the imaginary part of the coefficient attenuation with the acoustic velocity in order to build a model from which we note the types of microwaves acoustics (bulk waves or surface waves or leaky waves). We obtain accurate values for each of the coefficient attenuation and acoustic velocity. This study will be very interesting in modelling and realisation of acoustics microwaves devices (ultrasound, radiating structures, filter SAW…) based on the propagation of acoustics microwaves.
Hamza Z, Hacene S.
Reliability and safety analysis using fault tree and Bayesian networks. International Journal of Computer Aided Engineering and TechnologyInternational Journal of Computer Aided Engineering and Technology. 2019;11 :73-86.
Ari AAA, Gueroui A, Titouna C, Thiare O, Aliouat Z.
Resource allocation scheme for 5G C-RAN: A Swarm Intelligence based approach. Computer NetworksComputer Networks. 2019;165 :106957.
Lamine B, Nabil C, Tarek D.
Reviewing the potential anthropogenic sources of groundwater contamination - Case study of the expanding urban area of Taleza in Algeria. 72nd Canadian Geotechnical Conference. 2019.
Abstract
Located in northeast Algerian, the coastal aquifer of Taleza constitutes a significant source of groundwater. It contains hundreds of private wells installed by the population for several purposes including drinking water. Recently, the groundwater has become quite salinized. Furthermore, some people have noted the presence of a bad odor, as rotten eggs, in the groundwater pumped from their wells. The groundwater quality is mostly controlled by two factors: 1) natural processes related to aquifer lithology, and soil/rock interactions with groundwater, and 2) anthropogenic activities. However, the later activities can be considered as the most serious sources of groundwater contamination. This paper describes a review of potential anthropogenic sources of groundwater contamination over the Taleza territory. Several different potential anthropogenic sources were identified, such as cultivated fields, private sanitation systems, random urbanisation, over-exploitation of groundwater, solid waste dumpsites, and cemeteries. Consequently, efficient and durable groundwater protection planning is urgently required, to limit and possibly remediate groundwater contamination related to anthropogenic activities.
Ramzi M, Larbi GUEZOULI, Lyamine G.
Road obstacle detection. Proceedings of the 3rd International Conference on Future Networks and Distributed Systems. 2019 :1-5.
Bakhti I, Chaouch S, Makouf A, Douadi T.
Robust integral backstepping control with extended Kalman filter of permanent magnet synchronous motor. International Journal of Industrial and Systems EngineeringInternational Journal of Industrial and Systems Engineering. 2019;31 :1-14.
Goléa NE-H, Melkemi KE.
ROI-based fragile watermarking for medical image tamper detection. International Journal of High Performance Computing and NetworkingInternational Journal of High Performance Computing and Networking. 2019;13 :199-210.
Meddour A, Yahia M, Hambaba L.
Safety evaluation and analgesic studies of defatted methanol extract of Capparis spinosa L.(Capparidaceae) fruits and roots bark in albino wistar rats. Journal of Biological Research-Bollettino della Società Italiana di Biologia SperimentaleJournal of Biological Research-Bollettino della Società Italiana di Biologia Sperimentale. 2019;92.
BOUCETTA ALDJIA, Melkemi KE.
Score Level Fusion of Palmprint, Face and Iris Using Adaptive PSO. International Journal of Applied Metaheuristic Computing (IJAMC)International Journal of Applied Metaheuristic Computing (IJAMC). 2019;10 :175-194.
Hamouid K, Adi K.
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority. Peer-to-Peer Networking and ApplicationsPeer-to-Peer Networking and Applications. 2019;12 :1137–1155.
AbstractThis paper proposes a compromise-tolerant (t,n)-threshold certification management scheme for MANETs. Our solution allows to mitigate the impact of compromised nodes that participate in the certification service. In our design, certification management is achieved anonymously by an Anonymous Certification Authority (ACA). The latter is fully distributed into multiple disjointed coalitions of nodes whose structure is made hidden. This prevents an adversary from taking the control of the ACA by arbitrarily compromising t or more nodes. In other words, our proposal enhances the compromise-tolerance to more than the threshold number t of nodes without breaking down the whole certification system. As a result, our scheme requires a very smaller threshold than traditional schemes, which improves considerably the service availability. The experimental study shows a clear advantage over traditional threshold-based certification schemes by ensuring a significant positive compromise between security and availability of certification service.
Mahmoud C, Aouag S.
Security for internet of things: A state of the art on existing protocols and open research issues. Proceedings of the 9th international conference on information systems and technologies. 2019 :1-6.
Ameur S.
SELFADJOINT OPERATORS, NORMAL OPERATORS, AND CHARACTERIZATIONS. Operators and MatricesOperators and Matrices. 2019;13 :835–842.
AbstractLet B(H) be the C* -algebra of all bounded linear operators acting on a complex separable Hilbert space H . We shall show that: 1. The class of all selfadjoint operators in B(H) multiplied by scalars is characterized by ∀X ∈ B(H), S2X +XS2 =>2||SXS||, (S ∈ B(H)). 2. The class of all normal operators in B(H) is characterized by each of the three following properties (where DS = S*S-SS* , for S ∈ B(H)), (i) ∀X ∈ B(H), S2X + XS2 =>2||SXS||,(S ∈ B(H)), (ii) S*DSS = 0 = SDSS*,(S ∈ B(H)), (iii) S*DSS=> 0 =>SDSS*,(S ∈ B(H)).
Seddik A.
Selfadjoint operators, normal operators, and characterizations. Operators and MatricesOperators and Matrices. 2019;13 :835-842.