2019
Guezouli L, Barka K, Gourdache S, Boubiche DE.
Self-organization smart protocol for mobile wireless sensor networks. 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). 2019 :1002-1006.
Guezouli L, Barka K, Gourdache S, Boubiche DE.
Self-organization Smart Protocol for Mobile Wireless Sensor Networks. 15th International Wireless Communications & Mobile Computing Conference (IWCMC) [Internet]. 2019.
Publisher's VersionAbstractIn this paper, we propose a novel self-organization protocol for wireless sensor networks (WSNs) assisted by Unmanned Aerial Vehicle (UAV or Drone) called SSP (Self-organization Smart Protocol). In order to provide energy efficiency, low latency, high success rate and suitably interactions between sensors and UAVs while taking advantage of the air mobility (fly) and resource available on the UAVs in the network. The UAVs move according to RWP (Random Waypoint) mobility model. Each UAV, during its pause time at a known height, creates a temporary cluster, and acts as its head, collects and processes sensor data and performs actions on the environment based on the information gathered from sensor nodes in its cluster. Once an UAV detects a base station (BS) it forwards the collected data to it. The results of the simulations show the high performance of the proposed algorithm.
Riad K, Hamza R, Yan H.
Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records. IEEE AccessIEEE Access. 2019;7 :86384 - 86393.
AbstractElectronic health records (EHRs) replaced the old paper-based systems to make patient data more accurate, reliable, and more accessible. Yet, the EHRs system requires high transmission cost, energy, and waste of time for both doctors and patients. Furthermore, EHRs security presents a serious issue threatening the patient’s privacy. Most of the third-party hosting systems have some issues related to the users’ privacy and data security. Hence, it is necessary to restrict the access control policies and develop efficient mechanisms for cloud-based EHRs data. In this paper, a sensitive and energetic access control (SE-AC) mechanism is proposed for managing the cloud-hosted EHRs and providing a fine-grained access control even in critical situations. The proposed mechanism ensures the confidentiality of the patient’s data, where only authorized individuals to have permission to be able to edit or review certain of the patient’s data. Each EHR data is encrypted by the managing authority before submitting to the cloud storage. The requesting user can get dynamically changing permissions based on authentication and context attributes. In addition, seven major aspects have been quantified to assess the operation of any access control that could be deployed in the Internet-of-Thing (IoT). The security analysis indicates that the SE-AC mechanism is secure and will prevent any unauthorized access. The results show exceptional compatibility and performance with different setups and configuration.
Beddiaf Y, Zidani F, CHRIFI-ALAOUI L.
Sensorless Speed Control of Induction Motor Used Differential Flatness Theory. International Conference on Electrical Engineering and Control Applications. 2019 :3-21.
AOUDIA I, BENHARZALLAH S, KAHLOUL L, KAZAR O.
Service composition approaches for internet of things: a review. International Journal of Communication Networks and Distributed SystemsInternational Journal of Communication Networks and Distributed Systems. 2019;23 :194-230.
Ourlis L, Bellala D.
SIMD Implementation of the Aho-Corasick Algorithm Using Intel AVX2. Scalable Computing: Practice and ExperienceScalable Computing: Practice and Experience. 2019;20 :563-576.
Bahloul NEH, Bashir N, Boudjit S, Boubiche DE.
A Simple Proactive Routing Protocol with Multiple Base Stations Deployment for Unmanned Aerial Vehicular Networks. 2019 Global Information Infrastructure and Networking Symposium (GIIS). 2019 :1-6.
Zouggar EO, Chaouch S, Abdeslam DO, Abdelhamid AL.
Sliding Control with Fuzzy Type-2 Controller of Wind Energy System Based on Doubly Fed Induction Generator. Instrumentation, Mesures, MétrologiesInstrumentation, Mesures, Métrologies. 2019;18.
Moussa O, Abdessemed R, Benaggoune S, Benguesmia H.
Sliding Mode Control of a Grid-Connected Brushless Doubly Fed Induction Generator. European Journal of Electrical EngineeringEuropean Journal of Electrical Engineering. 2019;21 :421-430.
AbstractThis paper designs an indirect power control method for brushless doubly fed induction generator (BDFIG), in which the stator is attached to grid with back-to-back space vector modulation (SVM) converter that converts the generated wind power. Our control method is a sliding mode control based on the theory of variable structure control. Specifically, the active and reactive powers, which are exchanged between the stator of the BDFIG and the grid in a linear and decoupled manner, are subjected to decoupled, vector control. In addition, a proportional integral (PI) controller was implemented to keep the DC-voltage constant for the back-to-back SVM converter. The efficiency of our control strategy was validated through simulation. The research greatly promotes the control of renewable energy generators.
Beghoul M, Demagh R.
Slurry shield tunneling in soft ground. Comparison between field data and 3D numerical simulation. Studia Geotechnica et MechanicaStudia Geotechnica et Mechanica. 2019;41 :115-128.
Merzoug MA, Mostefaoui A, Benyahia A.
Smart iot notification system for efficient in-city parking. Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks. 2019 :37-42.
Merahi W, Guedjiba S.
SOME PROPERTIES OF COMMON HERMITIAN SOLUTIONS OF MATRIX EQUATIONS A1XA*1= B1 AND A2XA∗2 = B2. MATEMATICKI VESNIK ˇ MATEMATIQKI VESNIKMATEMATICKI VESNIK ˇ MATEMATIQKI VESNIK. 2019;71 :214–229.
Saidi A, Naceri F.
Speed control of a doubly-fed induction machine based on fuzzy adaptive. International Journal of Intelligent Engineering InformaticsInternational Journal of Intelligent Engineering Informatics. 2019;7 :61-76.
Saadna Y, Behloul A, Mezzoudj S.
Speed limit sign detection and recognition system using SVM and MNIST datasets. Neural Computing and ApplicationsNeural Computing and Applications. 2019;31 :5005–5015.
AbstractThis article presents a computer vision system for real-time detection and robust recognition of speed limit signs, specially designed for intelligent vehicles. First, a new segmentation method is proposed to segment the image, and the CHT transformation (circle hog transform) is used to detect circles. Then, a new method based on local binary patterns is proposed to filter segmented images in order to reduce false alarms. In the classification phase, a cascading architecture of two linear support vector machines is proposed. The first is trained on the GTSRB dataset to decide whether the detected region is a speed limit sign or not, and the second is trained on the MNIST dataset to recognize the sign numbers. The system achieves a classification recall of 99.81% with a precision of 99.08% on the GTSRB dataset; in addition, the system is also tested on the BTSD and STS datasets, and it achieves a classification recall of 99.39% and 98.82% with a precision of 99.05% and 98.78%, respectively, within a processing time of 11.22 ms.
Ferroudji F.
Static strength analysis of a full-scale 850 kW wind turbine steel tower. Int. J. Eng. Adv. TechnolInt. J. Eng. Adv. Technol. 2019;8 :403-406.