<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zender, Rouia</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author><author><style face="normal" font="default" size="100%">Abdessemed, Mohamed-Rida</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Secret Sharing Scheme based on Integer Decomposition and Hexagonal Structure</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information and Communication Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">Submitted</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security limitations of Shamir&amp;rsquo;s secret sharing</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Discrete Mathematical Sciences and Cryptography</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.tandfonline.com/doi/abs/10.1080/09720529.2021.1961902</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Taylor &amp; Francis</style></publisher><pages><style face="normal" font="default" size="100%">1-13</style></pages><isbn><style face="normal" font="default" size="100%">0972-0529</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The security is so&amp;nbsp;important&amp;nbsp;for both storing and transmitting the digital data, the choice of parameters is critical for a security system, that is, a weak parameter will make the scheme very vulnerable to attacks, for example the use of supersingular curves or anomalous curves leads to weaknesses in elliptic curve cryptosystems, for RSA cryptosystem there are some attacks for low public exponent or small private exponent. In certain circumstances the secret sharing scheme is required to decentralize the risk. In the context of the security of secret sharing schemes, it is known that for the scheme of Shamir, an unqualified set of shares cannot leak any information about the secret. This paper aims to show that the well-known Shamir’s secret sharing is not always perfect and that the uniform randomization before sharing is insufficient to obtain a secure scheme. The second purpose of this paper is to give an explicit construction of weak polynomials for which the Shamir’s (k,&amp;nbsp;n) threshold scheme is insecure in the sense that there exist a fewer than&amp;nbsp;k&amp;nbsp;shares which can reconstruct the secret. Particular attention is given to the scheme whose threshold is less than or equal to 6. It also showed that for certain threshold&amp;nbsp;k, the secret can be calculated by a pair of shares with the probability of 1/2. Finally, in order to address the mentioned vulnerabilities, several classes of polynomials should be avoided.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Benreguia, Badreddine</style></author><author><style face="normal" font="default" size="100%">Moumen, Hamouma</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Some Consistency Rules for Graph Matching</style></title><secondary-title><style face="normal" font="default" size="100%">SN Computer Science</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://link.springer.com/article/10.1007/s42979-021-01001-z</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">1-16</style></pages><isbn><style face="normal" font="default" size="100%">2661-8907</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Graph matching is a comparison process of two objects represented as graphs through finding a correspondence between vertices and edges. This process allows defining a similarity degree (or dissimilarity) between the graphs. Generally, graph matching is used for extracting, finding and retrieving any information or sub-information that can be represented by graphs. In this paper, a new consistency rule is proposed to tackle with various problems of graph matching. After, using the proposed rule as a necessary and sufficient condition for the graph isomorphism, we generalize it for subgraph isomorphism, homomorphism and for an example of inexact graph matching. To determine whether there is a matching or not, a backtracking algorithm called CRGI2 is presented who checks the consistency rule by exploring the overall search space. The tree-search is consolidated with a tree pruning technique that eliminates the unfruitful branches as early as possible. Experimental results show that our algorithm is efficient and applicable for a real case application in the information retrieval field. On the efficiency side, due to the ability of the proposed rule to eliminate as early as possible the incorrect solutions, our algorithm outperforms the existing algorithms in the literature. For the application side, the algorithm has been successfully tested for querying a real dataset that contains a large set of e-mail messages.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hayi, Mohamed Yassine</style></author><author><style face="normal" font="default" size="100%">Chouiref, Zahira</style></author><author><style face="normal" font="default" size="100%">Moumen, Hamouma</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards Intelligent Road Traffic Management Over a Weighted Large Graphs Hybrid Meta-Heuristic-Based Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Cases on Information Technology (JCIT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.igi-global.com/article/towards-intelligent-road-traffic-management-over-a-weighted-large-graphs-hybrid-meta-heuristic-based-approach/281225</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">IGI Global</style></publisher><volume><style face="normal" font="default" size="100%">24</style></volume><pages><style face="normal" font="default" size="100%">1-18</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	This paper introduces a new approach of hybrid meta-heuristics based optimization technique for decreasing the computation time of the shortest paths algorithm. The problem of finding the shortest paths is a combinatorial optimization problem which has been well studied from various fields. The number of vehicles on the road has increased incredibly. Therefore, traffic management has become a major problem. We study the traffic network in large scale routing problems as a field of application. The meta-heuristic we propose introduces new hybrid genetic algorithm named IOGA. The problem consists of finding the k optimal paths that minimizes a metric such as distance, time, etc. Testing was performed using an exact algorithm and meta-heuristic algorithm on random generated network instances. Experimental analyses demonstrate the efficiency of our proposed approach in terms of runtime and quality of the result. Empirical results obtained show that the proposed algorithm outperforms some of the existing technique in term of the optimal solution in every generation.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Telli, Abdelmoutia</style></author><author><style face="normal" font="default" size="100%">Belazoui, Abdelouahab</style></author><author><style face="normal" font="default" size="100%">Arar, Chafik</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">OBDA Integration Approach for Web Analytics</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Advances in Communication Technology (ICACTCE)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Belazoui, Abdelouahab</style></author><author><style face="normal" font="default" size="100%">Telli, Abdelmoutia</style></author><author><style face="normal" font="default" size="100%">Arar, Chafik</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Mobile and Adaptive Medical Application to Enhance Chronic Disease Self‐Management</style></title><secondary-title><style face="normal" font="default" size="100%"> International Conference on Advances in Communication Technology (ICACTCE)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sebti, Riad</style></author><author><style face="normal" font="default" size="100%">Zroug, Siham</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Deep Learning Approach for the Diabetic Retinopathy Detection</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Smart City Applications SCA 2021: Innovations in Smart Cities Applications </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://link.springer.com/chapter/10.1007/978-3-030-94191-8_37</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Diabetic retinopathy is a severe retinal disease that can blur or distort the vision of the patient. It is one of the leading causes of blindness. Early detection of diabetic retinopathy can significantly help in the treatment. The recent development in the field of AI and especially Deep learning provides ambitious solutions that can be exploited to predict, forecast and diagnose several diseases in their early phases. This work aims towards finding an automatic way to classify a given set of retina images in order to detect the diabetic retinopathy. Deep learning concepts have been used with a convolutional neural network (CNN) algorithm to build a multi-classification model that can detect and classify disease levels automatically. In this study, a CNN architecture has been applied with several parameters on a dataset of diabetic retinopathy with different structures. At the current stage of this work, obtained results are highly encouraging.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Torki, Fatima-Zohra</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Hammani, Nadia</style></author><author><style face="normal" font="default" size="100%">Belaiche, Leila</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Products Scheduling in Reconfigurable Manufacturing System Considering the Responsiveness Index</style></title><secondary-title><style face="normal" font="default" size="100%">22nd International Arab Conference on Information Technology (ACIT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><pub-location><style face="normal" font="default" size="100%">Muscat, Oman</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Reconfigurable manufacturing system (RMS) is a recent manufacturing paradigm, which can easily adjust its capacity and functionality for rapid responsiveness to sudden changes in the market. The core component of RMS is called reconfigurable machine tool (RMT), which has a modular structure. The RMTs can be reconfigured into many configurations. This ability allows RMS to manufacture many types of products with high quantities. In this paper, the scheduling of products in a multi-product line is fulfilled based on three criteria: profit over cost, due date, and reconfiguration responsiveness index. The latter is the combination of reconfiguration time and reconfiguration reliability of machines. An integrated approach of maximum deviation method (MDM) and multi-criteria decision-making (MCDM) approach called technique for order preference by similarity to ideal solution (TOPSIS) is proposed as a solution approach for getting the optimal scheduling of the products to be manufactured in RMS. Weights of criteria have been calculated using MDM and ranking of products is obtained using TOPSIS. A numerical example is presented to illustrate the scheduling of products in RMS.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Leila Boussaad</style></author><author><style face="normal" font="default" size="100%">Boucetta, Aldjia</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The aging effects on face recognition algorithms: the accuracy according to age groups and age gaps</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://ieeexplore.ieee.org/abstract/document/9671213</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">El Oued, Algeria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	This paper aims to examine the effects of aging on the efficiency of facial recognition algorithms in terms of age groups and age difference intervals. A comparative analysis of the recognition performance of two approaches is conducted for different age groups and different length time intervals between images. The first approach uses a two-dimensional discrete cosine transform (2D-DCT) and a Kernel Fisher Analysis (KFA) as description tools; classification is made using a k-NN classifier based on Euclidean distance. However, the second one is performed in two ways: first, we considered face as a single entity, then we viewed face as an independent component set. This approach makes use of Convolutional Neural Networks (CNN) for description and Support vector machines (SVM) for classification. Achieved results using the publicly accessible FG-NET face database prove that age groups influence the performance of face recognition algorithms. Also, time length lapses between images can significantly reduce the performance of face recognition.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Grid, Maroua</style></author><author><style face="normal" font="default" size="100%">Belaiche, Leila</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Parallel Dynamic Multi-Objective Optimization Evolutionary Algorithm</style></title><secondary-title><style face="normal" font="default" size="100%">22nd International Arab Conference on Information Technology (ACIT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://ieeexplore.ieee.org/abstract/document/9677438</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Muscat, Oman</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Multi-objective optimization evolutionary algorithms (MOEAs) are considered as the most suitable heuristic methods for solving multi-objective optimization problems (MOPs). These MOEAs aim to search for a uniformly distributed, near-optimal and near-complete Pareto front for a given MOP. However, MOEAs fail to achieve their aim completely because of their fixed population size. To overcome this limit, an evolutionary approach of multi-objective optimization was proposed; the dynamic multi-objective evolutionary algorithms (DMOEAs). This paper deals with improving the user requirements (i.e., getting a set of optimal solutions in minimum computational time). Although, DMOEA has the distinction of dynamic population size, being an evolutionary algorithm means that it will certainly be characterized by long execution time. One of the main reasons for adapting parallel evolutionary algorithms (PEAs) is to obtain efficient results with an execution time much lower than the one of their sequential counterparts in order to tackle more complex problems. Thus, we propose a parallel version of DMOEA (i.e., PDMOEA). As experimental results, the proposed PDMOEA enhances DMOEA in terms of three criteria: improving the objective space, minimization of computational time and converging to the desired population size.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hafidi, Hossem Eddine</style></author><author><style face="normal" font="default" size="100%">Hmidi, Zohra</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Formal Specification and Verification of 5G Authentication and Key Agreement Protocol using mCRL2</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Networking and Advanced Systems (ICNAS)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://ieeexplore.ieee.org/abstract/document/9628917</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Annaba, Algeria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The fifth-generation (5G) standard is the last telecommunication technology, widely considered to have the most important characteristics in the future network industry. The 5G system infrastructure contains three principle interfaces, each one follows a set of protocols defined by the 3rd Generation Partnership Project group (3GPP). For the next generation network, 3GPP specified two authentication methods systematized in two protocols namely 5G Authentication and Key Agreement (5G-AKA) and Extensible Authentication Protocol (EAP). Such protocols are provided to ensure the authentication between system entities. These two protocols are critical systems, thus their reliability and correctness must be guaranteed. In this paper, we aim to formally re-examine 5G-AKA protocol using micro Common Representation Language 2 (mCRL2) language to verify such a security protocol. The mCRL2 language and its associated toolset are formal tools used for modeling, validation, and verification of concurrent systems and protocols. In this context, the authentication protocol 5G-AKA model is built using Algebra of Communication Processes (ACP), its properties are specified using Modal mu-Calculus and the properties analysis exploits Model-Checker provided with mCRL2. Indeed, we propose a new mCRL2 model of 3GPP specification considering 5G-AKA protocol and we specify some properties that describe necessary requirements to evaluate the correctness of the protocol where the parsed properties of Deadlock Freedom, Reachability, Liveness and Safety are positively assessed.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zroug, Siham</style></author><author><style face="normal" font="default" size="100%">Remadna, Ikram</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author><author><style face="normal" font="default" size="100%">Terrissa, Sadek-Labib</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Leveraging the Power of Machine Learning for Performance Evaluation Prediction in Wireless Sensor Networks</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Information Technology (ICIT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://ieeexplore.ieee.org/abstract/document/9491722</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Amman, Jordan</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Formal methods are widely exploited in the performance evaluation of Wireless Sensor Networks (WSNs) protocols and algorithms. These methods help researchers to model and to analyse mathematically such protocols. Numerical results obtained by analysis and performance evaluation can be employed to prove the correctness and consistency of the designed models. However, these methods face a scalability problem when the number of components becomes very high, which is often the case in WSNs. To overcome this challenge, this paper proposes to use a Machine Learning (ML) solution to provide predictions when the number of nodes increases and the formal model becomes enable to make the analysis. Indeed, this work deals with the application of effective Artificial Neural Networks (ANNs) for the prediction of a set of crucial performance metrics of CSMA/CA-MAC protocol in WSNs when the number of nodes increases significantly in the network. This prediction process is based on prior results obtained by the formal model when the number of nodes was manageable by that formal model.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dilekh, Tahar</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">SIRAT an Arabic Text Editor Makes Real-Time Indexing and Based on the Extraction of Keywords</style></title><secondary-title><style face="normal" font="default" size="100%">ICCSA’2021 : the 2nd International Conference on Computer Science’s Complex Systems and their Applications, May 25–26, </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://ceur-ws.org/Vol-2904/74.pdf</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Oum El Bouaghi, Algeria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Indexing stage in information retrieval process has a great importance as an essential tool for the performance of recall and precision. Despite the many studies that have been done on the indexing conducted in the last few decades, to our knowledge, no study has investigated whether indexing real-time based on keywords extraction is efficient to perform of recall and precision. Moreover, relatively fewer Arabic text indexing studies are currently available despite the enormous efforts put together to satisfy the needs of the growing number of Arabic internet users. This paper suggests a method for Arabic text indexing based on keywords extraction. The proposed method consists of two stages. The first stage conducts a real-time indexing. The second stage is a keywords extraction and updating of initial index taking into account the output of keywords extraction process. We illustrate application and the performance of this method of indexing using an Arabic text editor (SIRAT) developed and designed for this aim. We also illustrate the process of building a new form of Arabic corpus appropriate to conduct the necessary experiments. Our findings show that SIRAT successfully identifies the keywords most relevant to the document. Finally, the main contribution of this experiment is to demonstrate the effectiveness of this method compared to other methods. In addition, the paper proposes a solution to issues and deficiencies Arabic language processing suffers from, especially regarding corpora building and keywords extraction evaluation systems.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aouadj, Wafa</style></author><author><style face="normal" font="default" size="100%">Abdessemed, Mohamed-Rida</style></author><author><style face="normal" font="default" size="100%">Rachid Seghir</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Discrete Large-scale Multi-Objective Teaching-Learning-Based Optimization Algorithm</style></title><secondary-title><style face="normal" font="default" size="100%">4th International Conference on Networking, Information Systems &amp; Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://dl.acm.org/doi/abs/10.1145/3454127.3456609</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	This paper presents a teaching-learning-based optimization algorithm for discrete large-scale multi-objective problems (DLM-TLBO). Unlike the previous variants, the learning strategy used by each individual and the acquired knowledge are defined based on its level. The proposed approach is used to solve a bi-objective object clustering task (B-OCT) in a swarm robotic system, as a case study. The simple robots have as mission the gathering of a number of objects distributed randomly, while respecting two objectives: maximizing the clustering quality, and minimizing the energy consumed by these robots. The simulation results of the proposed algorithm are compared to those obtained by the well-known algorithm NSGA-II. The results show the superiority of the proposed DLM-TLBO in terms of the quality of the obtained Pareto front approximation and convergence speed.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Saliha Mezzoudj</style></author><author><style face="normal" font="default" size="100%">Melkemi, Kamal-Eddine</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Hybrid Approach for Shape Retrieval Using Genetic Algorithms and Approximate Distance</style></title><secondary-title><style face="normal" font="default" size="100%">Research Anthology on Multi-Industry Uses of Genetic Programming and Algorithms</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.igi-global.com/chapter/a-hybrid-approach-for-shape-retrieval-using-genetic-algorithms-and-approximate-distance/271630</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	This article describes how the classical algorithm of shape context (SC) is still unable to capture the part structure of some complex shapes. To overcome this insufficiency, the authors propose a novel shape-based retrieval approach that is called HybMAS-GA using a multi-agent system (MAS) and a genetic algorithm (GA). They define a new distance called approximate distance (AD) to define a SC method by AD, which called approximate distance shape context (ADSC) descriptor. Furthermore, the authors' proposed HybMAS-GA is a star architecture where all shape context agents, N, are directly linked to a coordinator agent. Each retrieval agent must perform either a SC or an ADSC method to obtain a similar shape, started from its own initial configuration of sample points. This combination increases the efficiency of the proposed HybMAS-GA algorithm and ensures its convergence to an optimal images retrieval as it is shown through experimental results.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Saliha Mezzoudj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A parallel content-based image retrieval system using spark and tachyon frameworks</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of King Saud University - Computer and Information Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.sciencedirect.com/science/article/pii/S1319157818307146</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">141-149</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	With the huge increase of large-scale multimedia over Internet, especially images, building Content-Based Image Retrieval (CBIR) systems for large-scale images has become a big challenge. One of the drawbacks associated with CBIR is the very long execution time. In this article, we propose a fast Content-Based Image Retrieval system using Spark (CBIR-S) targeting large-scale images. Our system is composed of two steps.&amp;nbsp;&lt;em&gt;(i) image indexation step&lt;/em&gt;, in which we use&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/mapreduce&quot; title=&quot;Learn more about MapReduce from ScienceDirect's AI-generated Topic Pages&quot;&gt;MapReduce&lt;/a&gt;&amp;nbsp;distributed model on Spark in order to speed up the indexation process. We also use a memory-centric&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/distributed-storage-system&quot; title=&quot;Learn more about distributed storage system from ScienceDirect's AI-generated Topic Pages&quot;&gt;distributed storage system&lt;/a&gt;, called Tachyon, to enhance the write operation&amp;nbsp;&lt;em&gt;(ii) image retrieving step&lt;/em&gt;&amp;nbsp;which we speed up by using a parallel k-Nearest Neighbors (k-NN) search method based on&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/mapreduce-model&quot; title=&quot;Learn more about MapReduce model from ScienceDirect's AI-generated Topic Pages&quot;&gt;MapReduce model&lt;/a&gt;&amp;nbsp;implemented under&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/apache-spark&quot; title=&quot;Learn more about Apache Spark from ScienceDirect's AI-generated Topic Pages&quot;&gt;Apache Spark&lt;/a&gt;, in addition to exploiting the cache method of spark framework. We have showed, through a wide set of experiments, the effectiveness of our approach in terms of processing time.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aouadj, Wafa</style></author><author><style face="normal" font="default" size="100%">Abdessemed, Mohamed-Rida</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Reliable Behavioral Model: Optimizing Energy Consumption and Object Clustering Quality by Naïve Robots</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Swarm Intelligence Research (IJSIR)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.igi-global.com/article/a-reliable-behavioral-model/290283</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">12</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	This study concerns a swarm of autonomous reactive mobile robots, qualified of naïve because of their simple constitution, having the mission of gathering objects randomly distributed while respecting two contradictory objectives: maximizing quality of the emergent heap-formation and minimizing energy consumed by aforesaid robots. This problem poses two challenges: it is a multi-objective optimization problem and it is a hard problem. To solve it, one of renowned multi-objective evolutionary algorithms is used. Obtained solution, via a simulation process, unveils a close relationship between behavioral-rules and consumed energy; it represents the sought behavioral model, optimizing the grouping quality and energy consumption. Its reliability is shown by evaluating its robustness, scalability, and flexibility. Also, it is compared with a single-objective behavioral model. Results' analysis proves its high robustness, its superiority in terms of scalability and flexibility, and its longevity measured based on the activity time of the robotic system that it integrates.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aoudia Idir</style></author><author><style face="normal" font="default" size="100%">Benharzallah Saber</style></author><author><style face="normal" font="default" size="100%">Kahloul Laid</style></author><author><style face="normal" font="default" size="100%">Kazar Okba</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Multi-Population Genetic Algorithm for Adaptive QoS-Aware Service Composition in FogIoT Healthcare Environment</style></title><secondary-title><style face="normal" font="default" size="100%">The International Arab Journal of Information Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://iajit.org/PDF/Special%20Issue%202021,%20No.%203A/20684.pdf</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">18</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The growth of Internet of Thing (IoT) implies the availability of a very large number of services which may be similar or the same, managing the Quality of Service (QoS) helps to differentiate one service from another. The service composition provides the ability to perform complex activities by combining the functionality of several services within a single process. Very few works have presented an adaptive service composition solution managing QoS attributes, moreover in the field of healthcare, which is one of the most difficult and delicate as it concerns the precious human life.In this paper, we will present an adaptive QoS-Aware Service Composition Approach (P-MPGA) based on multi-population genetic algorithm in Fog-IoT healthcare environment. To enhance Cloud-IoT architecture, we introduce a Fog-IoT 5-layared architecture. Secondly, we implement a QoS-Aware Multi-Population Genetic Algorithm (P-MPGA), we considered 12 QoS dimensions, i.e., Availability (A), Cost (C), Documentation (D), Location (L), Memory Resources (M), Precision (P), Reliability (R), Response time (Rt), Reputation (Rp), Security (S), Service Classification (Sc), Success rate (Sr), Throughput (T). Our P-MPGA algorithm implements a smart selection method which allows us to select the right service. Also, P-MPGA implements a monitoring system that monitors services to manage dynamic change of IoT environments. Experimental results show the excellent results of P-MPGA in terms of execution time, average fitness values and execution time / best fitness value ratio despite the increase in population. P-MPGA can quickly achieve a composite service satisfying user’s QoS needs, which makes it suitable for a large scale IoT environment.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Arar, Chafik</style></author><author><style face="normal" font="default" size="100%">Belazoui, Abdelouahab</style></author><author><style face="normal" font="default" size="100%">Telli, Abdelmoutia</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Adoption of social robots as pedagogical aids for efficient learning of second language vocabulary to children</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of e-Learning and Knowledge Society</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://je-lks.org/ojs/index.php/Je-LKS_EN/article/view/1135551</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">119-126</style></pages><isbn><style face="normal" font="default" size="100%">1971-8829</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this digital age embracing robotics across various areas of life, especially intellectual ones, have reaped great benefits owing to this modern technology. Therefore, the learning field has not remained unchanged given current evolutions as the schooling conditions have been improved through these smart devices. However, teachers still face some difficulties when choosing pedagogical methods and means for effective language learning for children. Thus, this paper aims to measure the effectiveness of social robots in facilitating children’s learning of a second language (L2). For this purpose, the term L2 learning and its subordinate concepts have been distinguished, and then the different methods of language learning were discussed. The latest research regarding social robots in the educational context was also discussed when reviewing the literature. An experimental study conducted on a sample of children illustrated that the use of the social robot significantly helped them in the L2 learning regarding the assimilation fast, retention, and correct pronunciation of its vocabulary. Finally, this study concludes that the social robot would be a good solution and recommends their widespread use in education given its role in improving the schooling conditions of children.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ledmi, Makhlouf</style></author><author><style face="normal" font="default" size="100%">Moumen, Hamouma</style></author><author><style face="normal" font="default" size="100%">Siam, Abderrahim</style></author><author><style face="normal" font="default" size="100%">Haouassi, Hichem</style></author><author><style face="normal" font="default" size="100%">Azizi, Nabil</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Discrete Crow Search Algorithm for Mining Quantitative Association Rules</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Swarm Intelligence Research (IJSIR)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.igi-global.com/article/a-discrete-crow-search-algorithm-for-mining-quantitative-association-rules/290282</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">IGI Global</style></publisher><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">101-124</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	&lt;br&gt;Association rules are the specific data mining methods aiming to discover explicit relations between the different attributes in a large dataset. However, in reality, several datasets may contain both numeric and categorical attributes. Recently, many meta-heuristic algorithms that mimic the nature are developed for solving continuous problems. This article proposes a new algorithm, DCSA-QAR, for mining quantitative association rules based on crow search algorithm (CSA). To accomplish this, new operators are defined to increase the ability to explore the searching space and ensure the transition from the continuous to the discrete version of CSA. Moreover, a new discretization algorithm is adopted for numerical attributes taking into account dependencies probably that exist between attributes. Finally, to evaluate the performance, DCSA-QAR is compared with particle swarm optimization and mono and multi-objective evolutionary approaches for mining association rules. The results obtained over real-world datasets show the outstanding performance of DCSA-QAR in terms of quality measures.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Taguelmimt, Redha</style></author><author><style face="normal" font="default" size="100%">Beghdad, Rachid</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information Security and Privacy (IJISP)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.igi-global.com/article/ds-knn/276388</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">IGI Global</style></publisher><volume><style face="normal" font="default" size="100%">15</style></volume><pages><style face="normal" font="default" size="100%">131-144</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	On one hand, there are many proposed intrusion detection systems (IDSs) in the literature. On the other hand, many studies try to deduce the important features that can best detect attacks. This paper presents a new and an easy-to-implement approach to intrusion detection, named distance sum-based k-nearest neighbors (DS-kNN), which is an improved version of k-NN classifier. Given a data sample to classify, DS-kNN computes the distance sum of the k-nearest neighbors of the data sample in each of the possible classes of the dataset. Then, the data sample is assigned to the class having the smallest sum. The experimental results show that the DS-kNN classifier performs better than the original k-NN algorithm in terms of accuracy, detection rate, false positive, and attacks classification. The authors mainly compare DS-kNN to CANN, but also to SVM, S-NDAE, and DBN. The obtained results also show that the approach is very competitive.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zroug, Siham</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author><author><style face="normal" font="default" size="100%">Djouani, Karim</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A hierarchical formal method for performance evaluation of WSNs protocol</style></title><secondary-title><style face="normal" font="default" size="100%">Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://link.springer.com/article/10.1007/s00607-020-00898-3</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">103</style></volume><pages><style face="normal" font="default" size="100%">1183-1208</style></pages><isbn><style face="normal" font="default" size="100%">1436-5057</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The design and the evaluation of communication protocols in WSNs is a crucial issue. Generally, researchers use simulation methods to evaluate them. However, formal modelling and analysis techniques are an efficient alternative to simulation methods. Indeed, these techniques allow performance evaluation and model verification. In this paper, a formal approach is proposed to modelling and to evaluating the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) MAC protocol with a star topology. Moreover, the proposed approach deals with some properties that are not stated in most existing works. The approach uses Hierarchical Timed Coloured Petri Nets (HTCPNs) formalism to model the protocol and exploits the CPN-Tools to analyse the generated models. HTCPNs provide timed aspect which facilitates the consideration of time constraints inherent to the CSMA/CA protocol.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">6</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aoudia, Idir</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Kazar, Okba</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Multi-Population Genetic Algorithm for Adaptive QoS-Aware Service Composition in Fog-IoT Healthcare Environment</style></title><secondary-title><style face="normal" font="default" size="100%">Int. Arab. J. Inf. Technol</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://iajit.org/PDF//Special%20Issue%202021,%20No.%203A/20684.pdf</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">464-475</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The growth of Internet of Thing (IoT) implies the availability of a very large number of services which may be similar or the same, managing the Quality of Service (QoS) helps to differentiate one service from another. The service composition provides the ability to perform complex activities by combining the functionality of several services within a single process. Very few works have presented an adaptive service composition solution managing QoS attributes, moreover in the field of healthcare, which is one of the most difficult and delicate as it concerns the precious human life.In this paper, we will present an adaptive QoS-Aware Service Composition Approach (P-MPGA) based on multi-population genetic algorithm in Fog-IoT healthcare environment. To enhance Cloud-IoT architecture, we introduce a Fog-IoT 5-layared architecture. Secondly, we implement a QoS-Aware Multi-Population Genetic Algorithm (P-MPGA), we considered 12 QoS dimensions, i.e., Availability (A), Cost (C), Documentation (D), Location (L), Memory Resources (M), Precision (P), Reliability (R), Response time (Rt), Reputation (Rp), Security (S), Service Classification (Sc), Success rate (Sr), Throughput (T). Our P-MPGA algorithm implements a smart selection method which allows us to select the right service. Also, P-MPGA implements a monitoring system that monitors services to manage dynamic change of IoT environments. Experimental results show the excellent results of P-MPGA in terms of execution time, average fitness values and execution time / best fitness value ratio despite the increase in population. P-MPGA can quickly achieve a composite service satisfying user’s QoS needs, which makes it suitable for a large scale IoT environment
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hmidi, Zohra</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author><author><style face="normal" font="default" size="100%">Hamani, Nadia</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Performance evaluation of ODMAC protocol for WSNs powered by ambient energy</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Simulation and Process Modelling</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.inderscienceonline.com/doi/abs/10.1504/IJSPM.2021.120853</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Inderscience Publishers (IEL)</style></publisher><volume><style face="normal" font="default" size="100%">17</style></volume><pages><style face="normal" font="default" size="100%">67-78</style></pages><isbn><style face="normal" font="default" size="100%">1740-2123</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Designing a good MAC protocol remains a challenge. Such a protocol has to guarantee access to the medium while reducing energy consumption. With the appearance of energy harvesting-wireless sensor networks (EH-WSNs), energy is no longer a problem but the challenge now is that each sensor remains in its energetically sustainable state as much as possible. This paper proposes a formal study of on demand MAC (ODMAC) one of the well-known protocols proposed for EH-WSNs. An analysis through statistical model checking is made where properties that guarantee the protocol's correctness are verified and a performance evaluation of important aspects is achieved.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Meissa, Marwa</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Kazar, Okba</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Personalized Recommendation for Web API Discovery in Social Web of Things</style></title><secondary-title><style face="normal" font="default" size="100%">INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://iajit.org/portal/PDF/Special%20Issue%202021,%20No.%203A/20682.pdf</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">ZARKA PRIVATE UNIV COLL COMPUTING &amp; INFORMATION SOC, PO BOX 132222, ZARQA …</style></publisher><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">438-445</style></pages><isbn><style face="normal" font="default" size="100%">1683-3198</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	With the explosive growth of Web of Things (WoT) and social web, it is becoming hard for device owners and users to find suitable web Application Programming Interface (API) that meet their needs among a large amount of web APIs. Socialaware and collaborative filtering-based recommender systems are widely applied to recommend personalized web APIs to users and to face the problem of information overload. However, most of the current solutions suffer from the dilemma of accuracydiversity where the prediction accuracy gains are typically accompanied by losses in the diversity of the recommended APIs due to the influence of popularity factor on the final score of APIs (e.g., high rated or high-invoked APIs). To address this problem, the purpose of this paper is developing an improved recommendation model called (Personalized Web API Recommendation) PWR, which enables to discover APIs and provide personalized suggestions for users without sacrificing the recommendation accuracy. To validate the performance of our model, seven variant algorithms of different approaches (popularity-based, userbased and item-based) are compared using MovieLens 20M dataset. The experiments show that our model improves the recommendation accuracy by 12% increase with the highest score among compared methods. Additionally it outperforms the compared models in diversity over all lengths of recommendation lists. It is envisaged that the proposed model is useful to accurately recommend personalized web API for users.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3 A</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Belazoui, Abdelouahab</style></author><author><style face="normal" font="default" size="100%">Telli, Abdelmoutia</style></author><author><style face="normal" font="default" size="100%">Arar, Chafik</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Web-Based Learning Under Tacit Mining of Various Data Sources.</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Emerging Technologies in Learning</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://online-journals.org/index.php/i-jet/article/view/23405</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">16</style></volume><isbn><style face="normal" font="default" size="100%">1863-0383</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Nowadays, many platforms provide open educational resources to learners. So, they must browse and explore several suggested contents to better assimilate their courses. To facilitate the selecting task of these resources, the present paper proposes an intelligent tutoring system that can access teaching contents available on the web automatically and offers them to learners as additional information sources. In doing so, the authors highlight the description logic approach and its knowledge representation strength that underwrites the modulization, inference, and querying about a web ontology language, and enhanced traditional tutoring systems architecture using ontologies and description logic to enable them to access various data sources on the web. Finally, this article concludes that the combination of machine learning with the semantic web has provided a supportive study environment and enhanced the schooling conditions within open and distance learning.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">16</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Meissa, Marwa</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Kazar, Okba</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Social-aware Web API Recommendation in IoT</style></title><secondary-title><style face="normal" font="default" size="100%">21st International Arab Conference on Information Technology (ACIT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://ieeexplore.ieee.org/abstract/document/9300092</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Giza, Egypt</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The core idea of IoT is the connectivity of real-world devices to the Internet, which allows them to expose their functionalities in APIs ways, communicate to other entities, and flow their data over internet. With the massive growth of connected IoT devices, the number of APIs have also increased. Thus, led up to overload information problem, which is making APIs selection more and more difficult for devices owners and users. Therefore, this paper propose web APIs recommendation framework in IoT environment based on social relationships. The main purpose is providing a novel Recommendation method, which enable to discover APIs and provide relevant suggestion for users. The proposed hybrid algorithm is combined content-based filtering and collaborative filtering techniques to improve the accuracy of rating prediction. Finally, experiments are conducted to evaluate the performance of recommendation.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ahmid, Maroua</style></author><author><style face="normal" font="default" size="100%">Kazar, Okba</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Merizig, Abdelhak</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Intelligent and Secure Health Monitoring System Based on Agent</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://ieeexplore.ieee.org/abstract/document/9089602</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Doha, Qatar</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper, we propose a novel, secure, and intelligent IoT approach based on agent, we have implemented in the health care domain, where we developed an intelligent patient monitoring system for monitoring the patients heart rate automatically. Our system is more intelligent that can anticipate the critical condition before it even happens, send a message to the patient family, doctors, nurses, as well as hospital in-charge personal, and launch an alarm to be assisted by the nearest people in place. Also, our architecture ensures the authentication, authorization, and data sensing confidentiality. Hospitals and medical clinics can utilize our system to monitor their outpatients who are in danger of unpredictable health conditions. The approach presented in the paper can also be applied to other IoT domains.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aoudia, Idir</style></author><author><style face="normal" font="default" size="100%">Benhazrallah, Saber</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Kazar, Okba</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">QoS-aware service composition in Fog-IoT computing using multi-population genetic algorithm</style></title><secondary-title><style face="normal" font="default" size="100%">21st International Arab Conference on Information Technology (ACIT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://ieeexplore.ieee.org/abstract/document/9300090</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Giza, Egypt</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The Internet of things (IoT) is the integration of information space and physical space, becoming more and more popular in several places. In this paper, we will present QoS service composition approach based on multi-population genetic algorithm based on Fog-IoT computing, IoT-cloud architecture problems led us to use the 5-layared architecture implemented on a Fog computing system especially the transport layer. Our work was focus on this transport layer where we divided it into four sub-layers (security, storage, pre-processing &amp;amp; monitoring), it allows us to have promising advantages. Secondly, we implemented a multi-population genetic algorithm (MPGA) based on a QoS model, we considered seven QoS dimensions, i.e. Cost, response time, reliability, reputation, location, security and availability. Experimental results show the excellent results of MPGA in terms of fitness value and execution time to handle our ambulance emergency study case.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">GOLEA, Nour-El-Houda</style></author><author><style face="normal" font="default" size="100%">Melkemi, Kamal-Eddine</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Feature-based Fragile Watermarking for Tamper Detection using Voronoi Diagram Decomposition</style></title><secondary-title><style face="normal" font="default" size="100%"> 10th International Conference on Computer Science, Engineering and Applications (CCSEA 2020)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://aircconline.com/csit/papers/vol10/csit101012.pdf</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper, we have proposed a novel feature-based fragile watermarking scheme for image authentication. The proposed technique extracts Feature Points (FP) by performing the Harris corner detector and used them as germs to decomposes the host image in segments using Voronoi Diagram (VD). The authentication of each segment is guaranteed by using the Cyclic Redundancy Check code (CRC). Then, the CRC encoding procedure is applied to each segment to generate the watermark. Voronoi decomposition is employed because it has a good retrieval performance compared to similar geometrical decomposition algorithms. The security aspect of our proposed method is achieved by using the public key crypto-system RSA (Rivest–Shamir–Adleman) to encrypt the FP. Experimental results demonstrate the efficiency of our approach in terms of imperceptibility, the capability of detection of alterations, the capacity of embedding, and computation time. We have also prove the impact of VD decomposition on the quality of the watermarked image compared to block decomposition. The proposed method can be applicable in the case where the tamper detection is critical and only some regions of interest must be re-transmitted if they are corrupted, like in the case of medical images. An example of the application of our approach to medical image is briefly presented.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Weaknesses of Shamir&amp;rsquo;ssecret sharing scheme</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Computational Techniques and iIntelligent Machines, ICCTIM-</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pub-location><style face="normal" font="default" size="100%">Bathinda, India</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Karima Djebaili</style></author><author><style face="normal" font="default" size="100%">Lamine Melkemi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Different Encryption System Based on the Integer Factorization Problem</style></title><secondary-title><style face="normal" font="default" size="100%">Malaysian Journal of Computing and Applied Mathematics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.sciencegate.app/document/10.37231/myjcam.2020.3.1.43</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">50-54</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	We present a new computational problem in this paper, namely the order of a group element problem which is based on the factorization problem, and we analyze its applications in cryptography. We present a new one-way function and from this function we propose a homomorphic probabilistic scheme for encryption. Our scheme, provably secure under the new computational problem in the standard model.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ben-Attia, Hasiba</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Benhazrallah, Saber</style></author><author><style face="normal" font="default" size="100%">Bourekkache , Samir</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information Security </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://link.springer.com/article/10.1007/s10207-019-00448-9</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">163–187 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Role-Based Access Control (RBAC) is one of the most used models in designing and implementation of security policies, in large networking systems. Basic RBAC model does not consider temporal aspects which are so important in such policies. Temporal RBAC (TRBAC) is proposed to deal with these temporal aspects. Despite the elegance of these models, designing a security policy remains a challenge. Designers must ensure the consistency and the correctness of the policy. The use of formal methods provides techniques for proving that the designed policy is consistent. In this paper, we present a formal modelling/analysis approach of TRBAC policies. This approach uses Hierarchical Timed Coloured Petri Nets (HTCPN) formalism to model the TRBAC policy, and the CPN-tool to analyse the generated models. The timed aspect, in HTCPN, facilitates the consideration of temporal constraints introduced in TRBAC. The hierarchical aspect of HTCPN makes the model “manageable”, in spite of the complexity of TRBAC policy specification. The analysis phase allows the verification of many important properties about the TRBAC security policy.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hmidi, Zohra</style></author><author><style face="normal" font="default" size="100%">Kahloul, Laid</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Using priced timed automata for the specification and verification of CSMA/CA in WSNs</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information and Communication Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.inderscience.com/info/inarticle.php?artid=108963</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">17</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Several contention-based MAC protocols for WSNs have been proposed. The control channel is accessed with carrier sense multiple access with collision avoidance (CSMA/CA) method. The complexity of this method and its criticality motivate the formal specification and verification of its basic algorithms. Most existing works do not deal with all possible aspects such as topology, number of nodes, node behaviour, and number of possible retransmissions. In this paper, we propose a stochastic generic model for the 802.11 MAC protocol for an arbitrary network topology which is independent of the number of sensors. In addition to the qualitative evaluation that proves the correctness of the model, we will make a quantitative evaluation using the statistical model checking to measure the probabilistic performance of the protocol.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zoubeidi, Merouane</style></author><author><style face="normal" font="default" size="100%">Kazar, Okba</style></author><author><style face="normal" font="default" size="100%">Benharzallah, Saber</style></author><author><style face="normal" font="default" size="100%">Mesbahi, Nadjib</style></author><author><style face="normal" font="default" size="100%">Merizig, Abdelhak</style></author><author><style face="normal" font="default" size="100%">Rezki, Djamil</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A new approach agent-based for distributing association rules by business to improve decision process in ERP systems</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information and Decision Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.inderscience.com/info/inarticle.php?artid=104993</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">1-35</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Nowadays, the distributed computing plays an important role in the data mining process. To make systems scalable it is important to develop mechanisms that distribute the workload among several sites in a flexible way. Moreover, the acronym ERP refers to the systems and software packages used by organisations to manage day-by-day business activities. ERP systems are designed for the defined schema that usually has a common database. In this paper, we present a collaborative multi-agent based system for association rules mining from distributed databases. In our proposed approach, we combine the multi-agent system with association rules as a data mining technique to build a model that can execute the association rules mining in a parallel and distributed way from the centralised ERP database. The autonomous agents used to provide a generic and scalable platform. This will help business decision-makers to take the right decisions and provide a perfect response time using multi-agent system. The platform has been compared with the classic association rules algorithms and has proved to be more efficient and more scalable.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tioura, Abdelhamid</style></author><author><style face="normal" font="default" size="100%">Moumen, Hamouma</style></author><author><style face="normal" font="default" size="100%">Kalla, Hamoudi</style></author><author><style face="normal" font="default" size="100%">Ait-Saidi, Ahmed</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Hybrid Protocol to Solve Authenticated Byzantine Consensus</style></title><secondary-title><style face="normal" font="default" size="100%">Fundamenta Informaticae</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://content.iospress.com/articles/fundamenta-informaticae/fi1916</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">173</style></volume><pages><style face="normal" font="default" size="100%">73-89</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The consensus is a central problem of fault-tolerant distributed computing. Unfortunately, solving such a problem is impossible in asynchronous distributed systems prone to process failures. To circumvent this impossibility (known as FLP impossibility result) in a deterministic way, on top of asynchronous distributed systems enriched with additional assumptions, several protocols have been proposed. Actually, to solve the Byzantine Consensus problem, with a deterministic manner, in systems where at most t processes may exhibit a Byzantine behavior, two approaches have been investigated. The first relies on the addition of synchrony, called Timer-Based, while the second, called Time-Free, is based on the pattern of message exchange. This paper shows that both types of assumptions are not antagonist and can be combined to solve authenticated Byzantine consensus. The combined assumption considers a correct process pi, called ⋄〈t + 1〉-BW, and a set X of t+1 correct processes (including pi itself) such that, eventually, for each query broadcasted by a correct process pj of X, pj receives a response from pi ∈ X among the (n – t) first responses to that query or both links connecting pi and pj are timely. Based on this combination, a simple hybrid authenticated Byzantine consensus protocol benefiting from the best of both worlds is proposed. As a matter of fact, although numerous hybrid protocols have been designed for the consensus problem in the crash model, this is, to our knowledge, the first hybrid deterministic solution to the Byzantine consensus problem.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Benreguia, Badreddine</style></author><author><style face="normal" font="default" size="100%">Moumen, Hamouma</style></author><author><style face="normal" font="default" size="100%">Merzoug, Mohammed-Amine</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Tracking covid-19 by tracking infectious trajectories</style></title><secondary-title><style face="normal" font="default" size="100%"> IEEE Access</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://ieeexplore.ieee.org/document/9162031</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">145242 - 145255</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Nowadays, the coronavirus pandemic has and is still causing large numbers of deaths and infected people. Although governments all over the world have taken severe measurements to slow down the virus spreading (e.g., travel restrictions, suspending all sportive, social, and economic activities, quarantines, social distancing, etc.), a lot of persons have died and a lot more are still in danger. Indeed, a recently conducted study [1] has reported that 79% of the confirmed infections in China were caused by undocumented patients who had no symptoms. In the same context, in numerous other countries, since coronavirus takes several days before the emergence of symptoms, it has also been reported that the known number of infections is not representative of the real number of infected people (the actual number is expected to be much higher). That is to say, asymptomatic patients are the main factor behind the large quick spreading of coronavirus and are also the major reason that caused governments to lose control over this critical situation. To contribute to remedying this global pandemic, in this article, we propose an IoT&amp;nbsp;&lt;sup&gt;&lt;i&gt;a&lt;/i&gt;&lt;/sup&gt;&amp;nbsp;investigation system that was specifically designed to spot both undocumented patients and infectious places. The goal is to help the authorities to disinfect high-contamination sites and confine persons even if they have no apparent symptoms. The proposed system also allows determining all persons who had close contact with infected or suspected patients. Consequently, rapid isolation of suspicious cases and more efficient control over any pandemic propagation can be achieved.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oussama Noui</style></author><author><style face="normal" font="default" size="100%">Barkat, Amine</style></author><author><style face="normal" font="default" size="100%">Assia Beloucif</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Novel Image Encryption Approach Using Polar Decomposition and Orthogonal Matrices</style></title><secondary-title><style face="normal" font="default" size="100%">Malaysian Journal of Computing and Applied Mathematics </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://myfik.unisza.edu.my/myjcam/index.php/myjcam/article/view/40</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">27-34</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Information security is one of the important issues in the information age, image encryption algorithms have been increasingly studied to guarantee the secure image transmission over the internet and through wireless networks. In this article, we propose a new approach for image encryption based on polar decomposition and orthogonal matrices. This scheme offers good confusion and diffusion qualities. The proposed algorithm is shown to be secure against important cryptanalytic attacks (statistical attacks, sensitivity dependence, differential attacks, brute force attacks...), theoretical analysis and computer simulations both confirm that it has a high security level.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Merzoug, Assia</style></author><author><style face="normal" font="default" size="100%">Adda, Ali-Pacha</style></author><author><style face="normal" font="default" size="100%">Hadj-Said, Naima</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">New chaotic cryptosystem for the image encryption</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information and Computer Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://www.inderscience.com/info/inarticle.php?artid=107452</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">450-463</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Recent researches of image encryption algorithms have been increasingly based on chaotic systems. This paper, a new image encryption scheme which employs. The idea is to associate the Hénon attractor and the logistics map, for the construction of a new secret key cryptosystem. We generate values through of the logistics map that will be added to the pixels of the plaintext image. This result modulo 256 will be permuted to another position of the encrypted image. The calculation of this permutation is deducted from the Hénon attractor, which is 2-dimensional, in order to have a significantly increasing the resistance to attacks. The proposed system has the advantage of bigger key space (about 180 bits); high security analysis such as key space analysis, statistical analysis and sensitivity analysis were carried out. The results demonstrate that the proposed system is highly efficient and a robust system.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Khaled Riad</style></author><author><style face="normal" font="default" size="100%">Rafik Hamza</style></author><author><style face="normal" font="default" size="100%">Hongyang Yan</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Access</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">7</style></volume><pages><style face="normal" font="default" size="100%">86384 - 86393</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Electronic health records (EHRs) replaced the old paper-based systems to make patient data more accurate, reliable, and more accessible. Yet, the EHRs system requires high transmission cost, energy, and waste of time for both doctors and patients. Furthermore, EHRs security presents a serious issue threatening the patient’s privacy. Most of the third-party hosting systems have some issues related to the users’ privacy and data security. Hence, it is necessary to restrict the access control policies and develop efficient mechanisms for cloud-based EHRs data. In this paper, a sensitive and energetic access control (SE-AC) mechanism is proposed for managing the cloud-hosted EHRs and providing a fine-grained access control even in critical situations. The proposed mechanism ensures the confidentiality of the patient’s data, where only authorized individuals to have permission to be able to edit or review certain of the patient’s data. Each EHR data is encrypted by the managing authority before submitting to the cloud storage. The requesting user can get dynamically changing permissions based on authentication and context attributes. In addition, seven major aspects have been quantified to assess the operation of any access control that could be deployed in the Internet-of-Thing (IoT). The security analysis indicates that the SE-AC mechanism is secure and will prevent any unauthorized access. The results show exceptional compatibility and performance with different setups and configuration.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Karima Djebaili</style></author><author><style face="normal" font="default" size="100%">Lamine Melkemi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Two dimensional ElGamal public key cryptosystem</style></title><secondary-title><style face="normal" font="default" size="100%">Information Security Journal: A Global Perspective</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%">120-126</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this work, we propose a secure version of ElGamal public key cryptosystem, and prove that it is semantically secure assuming the hardness of what we call the two-dimensional decisional Diffie-Hellman (2DDDH) problem, this cryptosystem is distinguished by the speed of encryption and decryption processes and by its resistance to active adversaries. Since the 2DDDH problem is harder than the decisional Diffie-Hellman (DDH) problem (as it will be seen), one may conclude that our model reinforces the exchange security compared to the existed cryptosystems falling within the same context, also we discuss the difficult problems that guarantee its security.</style></abstract><issue><style face="normal" font="default" size="100%">4-5</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Khaled Riad</style></author><author><style face="normal" font="default" size="100%">Rafik Hamza</style></author><author><style face="normal" font="default" size="100%">Hongyang Yan</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Access </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">7</style></volume><pages><style face="normal" font="default" size="100%">86384 - 86393</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Electronic health records (EHRs) replaced the old paper-based systems to make patient data more accurate, reliable, and more accessible. Yet, the EHRs system requires high transmission cost, energy, and waste of time for both doctors and patients. Furthermore, EHRs security presents a serious issue threatening the patient's privacy. Most of the third-party hosting systems have some issues related to the users' privacy and data security. Hence, it is necessary to restrict the access control policies and develop efficient mechanisms for cloud-based EHRs data. In this paper, a sensitive and energetic access control (SE-AC) mechanism is proposed for managing the cloud-hosted EHRs and providing a fine-grained access control even in critical situations. The proposed mechanism ensures the confidentiality of the patient's data, where only authorized individuals to have permission to be able to edit or review certain of the patient's data. Each EHR data is encrypted by the managing authority before submitting to the cloud storage. The requesting user can get dynamically changing permissions based on authentication and context attributes. In addition, seven major aspects have been quantified to assess the operation of any access control that could be deployed in the Internet-of-Thing (IoT). The security analysis indicates that the SE-AC mechanism is secure and will prevent any unauthorized access. The results show exceptional compatibility and performance with different setups and configuration.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Karima Djebaili</style></author><author><style face="normal" font="default" size="100%">Lamine Melkemi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Two dimensional ElGamal public key cryptosystem</style></title><secondary-title><style face="normal" font="default" size="100%">Information Security Journal: A Global Perspective </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">28</style></volume><pages><style face="normal" font="default" size="100%"> 120-126</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this work, we propose a secure version of ElGamal public key cryptosystem, and prove that it is semantically secure assuming the hardness of what we call the two-dimensional decisional Diffie-Hellman (2DDDH) problem, this cryptosystem is distinguished by the speed of encryption and decryption processes and by its resistance to active adversaries. Since the 2DDDH problem is harder than the decisional Diffie-Hellman (DDH) problem (as it will be seen), one may conclude that our model reinforces the exchange security compared to the existed cryptosystems falling within the same context, also we discuss the difficult problems that guarantee its security.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4-5</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wassila Belferdi</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration</style></title><secondary-title><style face="normal" font="default" size="100%">Multidimensional Systems and Signal Processing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">30</style></volume><pages><style face="normal" font="default" size="100%">1093–1112</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wassila Belferdi</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration</style></title><secondary-title><style face="normal" font="default" size="100%">Multidimensional Systems and Signal Processing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">30</style></volume><pages><style face="normal" font="default" size="100%">pages1093–1112</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Assia Beloucif</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A lossless image encryption algorithm using matrix transformations and XOR operation</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information and Communication Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">13</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Encryption is the way to ensure confidentiality of different data, digital images have special features as large data, bulky data, and strong correlation between pixels, which makes traditional encryption algorithms not suitable for image encryption. For this concern, we propose a novel lossless encryption scheme for digital images based on combination of matrix transformations and XOR operation. The numerical experimental results confirms that the proposed method achieves high security level against brute force attacks, statistical attacks and sensitivity analysis, moreover the suggested algorithm provides a good randomness properties, thus our method can be applied for image encryption and transmission in sensitive domains.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sabah Delenda</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A new steganography algorithm using polar decomposition</style></title><secondary-title><style face="normal" font="default" size="100%">Information Security Journal: A Global Perspective</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">27</style></volume><pages><style face="normal" font="default" size="100%">133-144</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Nowadays, the security of communication becomes very important with the rapid development of network technology. So, the transmission and distribution of the several digital information must be protected and secured against other users. Many steganography techniques have been proposed for embedding secret digital data in other digital data. In this article, we propose a new steganography algorithm based on a linear algebraic tool that is the polar decomposition (PD) for hiding secret data in an image. A host image is selected and divided into blocks of size 2&amp;nbsp;×&amp;nbsp;2, a PD is applied on each block, and the secret data are embedded in suitable blocks. Experimental results show that our proposed algorithm gives a higher hiding capacity, achieves good imperceptibility, and also provides a high degree of security against common types of attacks such as compression attack with quality 10%, gamma correction attack, and impulse noise attack.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Karima Djebaili</style></author><author><style face="normal" font="default" size="100%">Lamine Melkemi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security and robustness of a modified ElGamal encryption scheme</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information and Communication Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">13</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper, we propose a new and practical variant of ElGamal encryption which is secure against every passive and active adversary. Under the hardiness of the decisional Diffie-Hellman assumption, we can prove that the proposed scheme is secure against an adaptive chosen ciphertext attacks in the standard model. Such security verifies not only the confidentiality but also verifies the integrity and the authentication of communications. We display that the modified scheme furthermore achieves anonymity as well as strong robustness.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Karima Djebaili</style></author><author><style face="normal" font="default" size="100%">Lamine Melkemi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security and robustness of a modified ElGamal encryption scheme</style></title><secondary-title><style face="normal" font="default" size="100%"> International Journal of Information and Communication Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">13</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper, we propose a new and practical variant of ElGamal encryption which is secure against every passive and active adversary. Under the hardiness of the decisional Diffie-Hellman assumption, we can prove that the proposed scheme is secure against an adaptive chosen ciphertext attacks in the standard model. Such security verifies not only the confidentiality but also verifies the integrity and the authentication of communications. We display that the modified scheme furthermore achieves anonymity as well as strong robustness.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wassila Belferdi</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration</style></title><secondary-title><style face="normal" font="default" size="100%">Multidimensional Systems and Signal Processing </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://link.springer.com/article/10.1007/s11045-018-0597-x</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">30</style></volume><pages><style face="normal" font="default" size="100%">1093–1112</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Assia Beloucif</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A lossless image encryption algorithm using matrix transformations and XOR operation</style></title><secondary-title><style face="normal" font="default" size="100%"> International Journal of Information and Communication Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">13</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Encryption is the way to ensure confidentiality of different data, digital images have special features as large data, bulky data, and strong correlation between pixels, which makes traditional encryption algorithms not suitable for image encryption. For this concern, we propose a novel lossless encryption scheme for digital images based on combination of matrix transformations and XOR operation. The numerical experimental results confirms that the proposed method achieves high security level against brute force attacks, statistical attacks and sensitivity analysis, moreover the suggested algorithm provides a good randomness properties, thus our method can be applied for image encryption and transmission in sensitive domains.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sabah Delenda</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A new steganography algorithm using polar decomposition</style></title><secondary-title><style face="normal" font="default" size="100%">Information Security Journal: A Global Perspective </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">27</style></volume><pages><style face="normal" font="default" size="100%">133-144</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Nowadays, the security of communication becomes very important with the rapid development of network technology. So, the transmission and distribution of the several digital information must be protected and secured against other users. Many steganography techniques have been proposed for embedding secret digital data in other digital data. In this article, we propose a new steganography algorithm based on a linear algebraic tool that is the polar decomposition (PD) for hiding secret data in an image. A host image is selected and divided into blocks of size 2&amp;nbsp;×&amp;nbsp;2, a PD is applied on each block, and the secret data are embedded in suitable blocks. Experimental results show that our proposed algorithm gives a higher hiding capacity, achieves good imperceptibility, and also provides a high degree of security against common types of attacks such as compression attack with quality 10%, gamma correction attack, and impulse noise attack.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wassila Belferdi</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration</style></title><secondary-title><style face="normal" font="default" size="100%">Multidimensional Systems and Signal Processing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">30</style></volume><pages><style face="normal" font="default" size="100%">pages1093–1112</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Abdallah Benaissa</style></author><author><style face="normal" font="default" size="100%">Moussa Benlahcene</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Asymptotic expansion of double Laplace-type integrals with a curve of minimal points and application to an exit time problem</style></title><secondary-title><style face="normal" font="default" size="100%">Mathematica Slovaca</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">67</style></volume><pages><style face="normal" font="default" size="100%">737–750</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper we consider the problem of the asymptotic expansion of double Laplace-type integrals, in the case when the set&amp;nbsp;γ&amp;nbsp;of points where the phase achieves its absolute minimum is a simple curve. It will be shown that the asymptotic behaviour of such integrals is governed by the order of degeneracy of normal derivatives of the phase with respect to the curve&amp;nbsp;γ. Complete asymptotic expansions will be constructed if that order is constant along&amp;nbsp;γ, and the first two coefficients will be explicitly computed. If not, a uniform asymptotic expansion method, involving special functions, is suggested.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Abdallah Benaissa</style></author><author><style face="normal" font="default" size="100%">Moussa Benlahcene</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Asymptotic expansion of double Laplace-type integrals with a curve of minimal points and application to an exit time problem</style></title><secondary-title><style face="normal" font="default" size="100%">Mathematica Slovaca</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">67</style></volume><pages><style face="normal" font="default" size="100%">737–750</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper we consider the problem of the asymptotic expansion of double Laplace-type integrals, in the case when the set&amp;nbsp;γ&amp;nbsp;of points where the phase achieves its absolute minimum is a simple curve. It will be shown that the asymptotic behaviour of such integrals is governed by the order of degeneracy of normal derivatives of the phase with respect to the curve&amp;nbsp;γ. Complete asymptotic expansions will be constructed if that order is constant along&amp;nbsp;γ, and the first two coefficients will be explicitly computed. If not, a uniform asymptotic expansion method, involving special functions, is suggested.</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mourad Chelgham</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ON CERTAIN INVARIANTS OF TRIVECTORS</style></title><secondary-title><style face="normal" font="default" size="100%">Communications in Applied Analysis</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">595-606</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Let E be a n-dimensional vector space over a field k and ω a trivector of Λ3E. We can associate to the trivector ω several invariants either algebraic, arithmetic or geometric. In this paper we consider the following three invariants, the commutant C(ω), the complexity c(ω) and the automorphisms group Aut(ω). We show that there exists a vector space E and a trivector ω of Λ3E for which C(ω) is not a Frobenius algebra. We also show that the complexity c(ω) and the length l(ω) are equal. Finally, we prove the existence of a trivector ω such that Aut(ω) is not a FC-group.</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mourad Chelgham</style></author><author><style face="normal" font="default" size="100%">Mohamed Kerada</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ON CERTAIN INVARIANTS OF TRIVECTORS</style></title><secondary-title><style face="normal" font="default" size="100%">Communications in Applied Analysis</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">595-606</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Let E be a n-dimensional vector space over a field k and ω a trivector of Λ3E. We can associate to the trivector ω several invariants either algebraic, arithmetic or geometric. In this paper we consider the following three invariants, the commutant C(ω), the complexity c(ω) and the automorphisms group Aut(ω). We show that there exists a vector space E and a trivector ω of Λ3E for which C(ω) is not a Frobenius algebra. We also show that the complexity c(ω) and the length l(ω) are equal. Finally, we prove the existence of a trivector ω such that Aut(ω) is not a FC-group.</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oussama Noui</style></author><author><style face="normal" font="default" size="100%">Assia Beloucif</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Secure image encryption scheme based on polar decomposition and chaotic map</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information and Communication Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">10</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Security is an important issue in image storage and communication, encryption is one of the most common ways to ensure security. Recently, many schemes based on chaotic map have been proposed, but most of this method suffers from small key space, which makes them vulnerable to brute forces attacks. In this study, we design a highly robust novel symmetric image encryption scheme which offer good confusion and diffusion qualities, and a large key space to ensure popular security factor and to overcome the weaknesses of the state of the art encryption schemes. In the security analysis section, we prove that our scheme can resist most known attacks, such as cipher image only attack, known and chosen plain image attacks, differential and exhaustive attacks. It is shown in this paper that the use of polar decomposition with chaotic map can gives a fast and secures encryption.</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Rafik Hamza</style></author><author><style face="normal" font="default" size="100%">Khan Muhammad</style></author><author><style face="normal" font="default" size="100%">Zhihan Lv</style></author><author><style face="normal" font="default" size="100%">Faiza Titouna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Secure video summarization framework for personalized wireless capsule endoscopy</style></title><secondary-title><style face="normal" font="default" size="100%">Pervasive and Mobile Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">41</style></volume><pages><style face="normal" font="default" size="100%">436-450</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Wireless capsule&amp;nbsp;endoscopy&amp;nbsp;(WCE) has several benefits over traditional endoscopy such as its portability and ease of usage, particularly for remote&amp;nbsp;internet of things&amp;nbsp;(IoT)-assisted&amp;nbsp;healthcare services. During the WCE procedure, a significant amount of redundant video data is generated, the transmission of which to healthcare centers and gastroenterologists securely for analysis is challenging as well as wastage of several resources including energy, memory, computation, and bandwidth. In addition to this, it is inherently difficult and time consuming for gastroenterologists to analyze this huge volume of gastrointestinal video data for desired contents. To surmount these issues, we propose a secure video summarization framework for outdoor patients going through WCE procedure. In the proposed system,&amp;nbsp;keyframes&amp;nbsp;are extracted using a light-weighted video summarization scheme, making it more suitable for WCE. Next, a&amp;nbsp;cryptosystem&amp;nbsp;is presented for security of extracted keyframes based on 2D Zaslavsky chaotic map. Experimental results validate the performance of the proposed cryptosystem in terms of robustness and high-level security compared to other recent image encryption schemes during dissemination of important keyframes to healthcare centers and gastroenterologists for personalized WCE.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Rafik Hamza</style></author><author><style face="normal" font="default" size="100%">Khan Muhammad</style></author><author><style face="normal" font="default" size="100%">Zhihan Lv</style></author><author><style face="normal" font="default" size="100%">Faiza Titouna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Secure video summarization framework for personalized wireless capsule endoscopy</style></title><secondary-title><style face="normal" font="default" size="100%">Pervasive and Mobile Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">41</style></volume><pages><style face="normal" font="default" size="100%">436-450</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Wireless capsule&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/engineering/endoscopy&quot; title=&quot;Learn more about Endoscopy from ScienceDirect's AI-generated Topic Pages&quot;&gt;endoscopy&lt;/a&gt;&amp;nbsp;(WCE) has several benefits over traditional endoscopy such as its portability and ease of usage, particularly for remote&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/engineering/internet-of-things&quot; title=&quot;Learn more about Internet of Things from ScienceDirect's AI-generated Topic Pages&quot;&gt;internet of things&lt;/a&gt;&amp;nbsp;(IoT)-assisted&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/engineering/healthcare-service&quot; title=&quot;Learn more about Healthcare Service from ScienceDirect's AI-generated Topic Pages&quot;&gt;healthcare services&lt;/a&gt;. During the WCE procedure, a significant amount of redundant video data is generated, the transmission of which to healthcare centers and gastroenterologists securely for analysis is challenging as well as wastage of several resources including energy, memory, computation, and bandwidth. In addition to this, it is inherently difficult and time consuming for gastroenterologists to analyze this huge volume of gastrointestinal video data for desired contents. To surmount these issues, we propose a secure video summarization framework for outdoor patients going through WCE procedure. In the proposed system,&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/engineering/keyframes&quot; title=&quot;Learn more about Keyframes from ScienceDirect's AI-generated Topic Pages&quot;&gt;keyframes&lt;/a&gt;&amp;nbsp;are extracted using a light-weighted video summarization scheme, making it more suitable for WCE. Next, a&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/engineering/cryptography&quot; title=&quot;Learn more about Cryptography from ScienceDirect's AI-generated Topic Pages&quot;&gt;cryptosystem&lt;/a&gt;&amp;nbsp;is presented for security of extracted keyframes based on 2D Zaslavsky chaotic map. Experimental results validate the performance of the proposed cryptosystem in terms of robustness and high-level security compared to other recent image encryption schemes during dissemination of important keyframes to healthcare centers and gastroenterologists for personalized WCE.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Abdallah Benaissa</style></author><author><style face="normal" font="default" size="100%">Moussa Benlahcene</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Asymptotic expansion of double Laplace-type integrals with a curve of minimal points and application to an exit time problem</style></title><secondary-title><style face="normal" font="default" size="100%">Mathematica Slovaca </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">67</style></volume><pages><style face="normal" font="default" size="100%">737–750</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper we consider the problem of the asymptotic expansion of double Laplace-type integrals, in the case when the set&amp;nbsp;&lt;em&gt;γ&lt;/em&gt;&amp;nbsp;of points where the phase achieves its absolute minimum is a simple curve. It will be shown that the asymptotic behaviour of such integrals is governed by the order of degeneracy of normal derivatives of the phase with respect to the curve&amp;nbsp;&lt;em&gt;γ&lt;/em&gt;. Complete asymptotic expansions will be constructed if that order is constant along&amp;nbsp;&lt;em&gt;γ&lt;/em&gt;, and the first two coefficients will be explicitly computed. If not, a uniform asymptotic expansion method, involving special functions, is suggested.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Abdallah Benaissa</style></author><author><style face="normal" font="default" size="100%">Moussa Benlahcene</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Asymptotic expansion of double Laplace-type integrals with a curve of minimal points and application to an exit time problem</style></title><secondary-title><style face="normal" font="default" size="100%"> Mathematica Slovaca</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">67</style></volume><pages><style face="normal" font="default" size="100%">737–750</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper we consider the problem of the asymptotic expansion of double Laplace-type integrals, in the case when the set&amp;nbsp;&lt;em&gt;γ&lt;/em&gt;&amp;nbsp;of points where the phase achieves its absolute minimum is a simple curve. It will be shown that the asymptotic behaviour of such integrals is governed by the order of degeneracy of normal derivatives of the phase with respect to the curve&amp;nbsp;&lt;em&gt;γ&lt;/em&gt;. Complete asymptotic expansions will be constructed if that order is constant along&amp;nbsp;&lt;em&gt;γ&lt;/em&gt;, and the first two coefficients will be explicitly computed. If not, a uniform asymptotic expansion method, involving special functions, is suggested.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mourad Chelgham</style></author><author><style face="normal" font="default" size="100%">Mohamed Kerada</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ON CERTAIN INVARIANTS OF TRIVECTORS</style></title><secondary-title><style face="normal" font="default" size="100%">Communications in Applied Analysis</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">595-606</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Let E be a n-dimensional vector space over a field k and ω a trivector of Λ3E. We can associate to the trivector ω several invariants either algebraic, arithmetic or geometric. In this paper we consider the following three invariants, the commutant C(ω), the complexity c(ω) and the automorphisms group Aut(ω). We show that there exists a vector space E and a trivector ω of Λ3E for which C(ω) is not a Frobenius algebra. We also show that the complexity c(ω) and the length l(ω) are equal. Finally, we prove the existence of a trivector ω such that Aut(ω) is not a FC-group.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mourad Chelgham</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ON CERTAIN INVARIANTS OF TRIVECTORS</style></title><secondary-title><style face="normal" font="default" size="100%">Communications in Applied Analysis</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">595-606</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Let E be a n-dimensional vector space over a field k and ω a trivector of Λ3E. We can associate to the trivector ω several invariants either algebraic, arithmetic or geometric. In this paper we consider the following three invariants, the commutant C(ω), the complexity c(ω) and the automorphisms group Aut(ω). We show that there exists a vector space E and a trivector ω of Λ3E for which C(ω) is not a Frobenius algebra. We also show that the complexity c(ω) and the length l(ω) are equal. Finally, we prove the existence of a trivector ω such that Aut(ω) is not a FC-group.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oussama Noui</style></author><author><style face="normal" font="default" size="100%">Assia Beloucif</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Secure image encryption scheme based on polar decomposition and chaotic map</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information and Communication Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">10</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Security is an important issue in image storage and communication, encryption is one of the most common ways to ensure security. Recently, many schemes based on chaotic map have been proposed, but most of this method suffers from small key space, which makes them vulnerable to brute forces attacks. In this study, we design a highly robust novel symmetric image encryption scheme which offer good confusion and diffusion qualities, and a large key space to ensure popular security factor and to overcome the weaknesses of the state of the art encryption schemes. In the security analysis section, we prove that our scheme can resist most known attacks, such as cipher image only attack, known and chosen plain image attacks, differential and exhaustive attacks. It is shown in this paper that the use of polar decomposition with chaotic map can gives a fast and secures encryption.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nesrine Kamouche</style></author><author><style face="normal" font="default" size="100%">Abdallah Benaissa</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Asymptotic expansion of double Laplace-type integrals: The case of non-stationary minimum points</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the American Mathematical Society</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">144</style></volume><pages><style face="normal" font="default" size="100%">3741-3756</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper, we show that the asymptotic expansion of a double Laplace-type integral with a non-stationary minimum point, located on the boundary of the domain of integration, is governed by the order of contact between the boundary curve and the level curve of the phase through the minimum point. This achievement will enable us to construct complete asymptotic expansions in more general settings. Especially, the problem will be completely solved if the phase and the boundary curve of the domain of integration are analytic near the minimum point.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Karima Chatouh</style></author><author><style face="normal" font="default" size="100%">kenza Guenda</style></author><author><style face="normal" font="default" size="100%">T. A Gulliver</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Simplex and MacDonald codes over Rq</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Applied Mathematics and Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">55</style></volume><pages><style face="normal" font="default" size="100%">455–478</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">{ In this paper, we introduce the homogeneous weight and homogeneous Gray map over the ring&amp;nbsp;Rq=F2[u1,u2,…,uq]/⟨u2i=0</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Karima Chatouh</style></author><author><style face="normal" font="default" size="100%">kenza Guenda</style></author><author><style face="normal" font="default" size="100%">T Aaron Gulliver</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">On some classes of linear codes over Z2Z4 and their covering radii</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Applied Mathematics and Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">201–222</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper, we define the simplex and MacDonald codes of types&amp;nbsp;αα&amp;nbsp;and&amp;nbsp;β&amp;nbsp;over&amp;nbsp;Z2Z4. We also examine the covering radii of these codes. Further, we study the binary images of these codes and prove that the binary image of the simplex codes of type&amp;nbsp;αα&amp;nbsp;meets the Gilbert bound.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Karima Chatouh</style></author><author><style face="normal" font="default" size="100%">kenza Guenda</style></author><author><style face="normal" font="default" size="100%">T. A Gulliver</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Simplex and MacDonald codes over R&lt;sub&gt;q&lt;/sub&gt;</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Applied Mathematics and Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">55</style></volume><pages><style face="normal" font="default" size="100%">455–478</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper, we introduce the homogeneous weight and homogeneous Gray map over the ring&amp;nbsp;R&lt;sub&gt;q&lt;/sub&gt;=F&lt;sub&gt;2&lt;/sub&gt;[u&lt;sub&gt;1&lt;/sub&gt;,u&lt;sub&gt;2&lt;/sub&gt;,…,u&lt;sub&gt;q&lt;/sub&gt;]/⟨u&lt;sup&gt;2&lt;/sup&gt;&lt;sub&gt;i&lt;/sub&gt;=0,u&lt;sub&gt;i&lt;/sub&gt;u&lt;sub&gt;j&lt;/sub&gt;=u&lt;sub&gt;j&lt;/sub&gt;u&lt;sub&gt;i&lt;/sub&gt;⟩&amp;nbsp;for&amp;nbsp;q≥1q≥1. We also consider the construction of simplex and MacDonald codes of types&amp;nbsp;α&amp;nbsp;and&amp;nbsp;β&amp;nbsp;over this ring and their covering radius.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Karima Chatouh</style></author><author><style face="normal" font="default" size="100%">kenza Guenda</style></author><author><style face="normal" font="default" size="100%">T Aaron Gulliver</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">On some classes of linear codes over Z&lt;sub&gt;2&lt;/sub&gt;Z&lt;sub&gt;4&lt;/sub&gt; and their covering radii</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Applied Mathematics and Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">53</style></volume><pages><style face="normal" font="default" size="100%">201–222</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper, we define the simplex and MacDonald codes of types&amp;nbsp;αα&amp;nbsp;and&amp;nbsp;β&amp;nbsp;over&amp;nbsp;Z&lt;sub&gt;2&lt;/sub&gt;Z&lt;sub&gt;4&lt;/sub&gt;. We also examine the covering radii of these codes. Further, we study the binary images of these codes and prove that the binary image of the simplex codes of type&amp;nbsp;αα&amp;nbsp;meets the Gilbert bound.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nesrine Kamouche</style></author><author><style face="normal" font="default" size="100%">Abdallah Benaissa</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Asymptotic expansion of double Laplace-type integrals: The case of non-stationary minimum points</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the American Mathematical Society</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">144</style></volume><pages><style face="normal" font="default" size="100%">3741-3756</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper, we show that the asymptotic expansion of a double Laplace-type integral with a non-stationary minimum point, located on the boundary of the domain of integration, is governed by the order of contact between the boundary curve and the level curve of the phase through the minimum point. This achievement will enable us to construct complete asymptotic expansions in more general settings. Especially, the problem will be completely solved if the phase and the boundary curve of the domain of integration are analytic near the minimum point.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Abdallah Benaissa</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">On the exit problem of dynamic systems perturbed by a white noise</style></title><secondary-title><style face="normal" font="default" size="100%">AIP Conference Proceedings</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">1660</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&amp;nbsp; In this paper we are concerned with the exit time problem of a dynamic system perturbed by a&amp;nbsp;white noise,&amp;nbsp;in the case where the noiseless dynamics has a global&amp;nbsp;attractor&amp;nbsp;in a given domain. By the use of a singular&amp;nbsp;perturbation technique&amp;nbsp;and recent results on the asymptotic expansion of a class of Laplace-type integrals, new results concerning the problem under investigation will be presented. &amp;nbsp;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Abdallah Benaissa</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">On the exit problem of dynamic systems perturbed by a white noise</style></title><secondary-title><style face="normal" font="default" size="100%">AIP Conference Proceedings</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">1660</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	&amp;nbsp;
&lt;/p&gt;

&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper we are concerned with the exit time problem of a dynamic system perturbed by a&amp;nbsp;white noise,&amp;nbsp;in the case where the noiseless dynamics has a global&amp;nbsp;attractor&amp;nbsp;in a given domain. By the use of a singular&amp;nbsp;perturbation technique&amp;nbsp;and recent results on the asymptotic expansion of a class of Laplace-type integrals, new results concerning the problem under investigation will be presented.
&lt;/p&gt;

&lt;p style=&quot;text-align: justify;&quot;&gt;
	&amp;nbsp;
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oussama Noui</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A ROBUST BLIND AND SECURE WATERMARKING SCHEME USING POSITIVE SEMI DEFINITE MATRICES</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Computer Science &amp; Information Technology (IJCSIT)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><volume><style face="normal" font="default" size="100%">6</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In the last decade the need for new and robust watermarking schemes has been increased because of the large illegal possession by not respecting the intellectual property rights in the multimedia in the internet. In this paper we introduce a novel blind robust watermarking scheme which exploits the positive circulant matrices in frequency domain which is the SVD, Different applications such as copyright protection, control and illicit distributions have been given. Simulation results indicate that the proposed method is robust against attacks as common digital processing: compression, blurring, dithering, printing and scanning, etc. and subterfuge attacks (collusion and forgery) also geometric distortions and transformations. Furthermore, good results of NC (normalized correlation) and PSNR (Peak signal-tonoise ratio) have been achieved while comparing with recent state of the art watermarking algorithms.</style></abstract><issue><style face="normal" font="default" size="100%">5</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Oussama Noui</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A ROBUST BLIND AND SECURE WATERMARKING SCHEME USING POSITIVE SEMI DEFINITE MATRICES</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Computer Science &amp; Information Technology (IJCSIT) </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><volume><style face="normal" font="default" size="100%">6</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In the last decade the need for new and robust watermarking schemes has been increased because of the large illegal possession by not respecting the intellectual property rights in the multimedia in the internet. In this paper we introduce a novel blind robust watermarking scheme which exploits the positive circulant matrices in frequency domain which is the SVD, Different applications such as copyright protection, control and illicit distributions have been given. Simulation results indicate that the proposed method is robust against attacks as common digital processing: compression, blurring, dithering, printing and scanning, etc. and subterfuge attacks (collusion and forgery) also geometric distortions and transformations. Furthermore, good results of NC (normalized correlation) and PSNR (Peak signal-tonoise ratio) have been achieved while comparing with recent state of the art watermarking algorithms.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">5</style></issue></record></records></xml>