Publications

Guezouli L, Barka K, Bouam S, Zidani A. A variant of random way point mobility model to improve routing in wireless sensor networks. International Journal of Information and Communication Technology. 2018;13 (4).Abstract

The mobility of nodes in a wireless sensor network is a factor affecting the quality of service offered by this network. We think that the mobility of the nodes presents an opportunity where the nodes move in an appropriate manner. Therefore, the routing algorithms can benefit from this opportunity. Studying a model of mobility and adapt it to ensure an optimal routing in an agitated network is the purpose of our work. We are interested in applying a variant of the mobility model RWP (named routing-random waypoint 'R-RWP') on the whole network in order to maximise the coverage radius of the base station (which will be fixed in our study) and thus to optimise the data delivery end-to-end delay.

Hedjazi D. Constructing collective competence: a new CSCW-based approach. International Journal of Information and Communication Technology. 2018;12 (3) :4.Abstract

Within the majority of contexts, it is persons that are considered to be competent or incompetent. However, in many cases it is the performance of groups and teams that is most important. This implies a concept of collective competence that integrates the set of skills in a group. In addition, the collective competence construction process is also enriched through collaboration which implies exchanges, confrontations, negotiations and interpersonal interactions. This paper presents our CSCW-based approach supporting collective competence construction. As a case of study, the industrial maintenance workspace is fundamentally a collaborative context. Our contribution in this area led us first, to analyse the related task in order to highlight collaborative maintenance vital needs and design the appropriate required group awareness supports which will be used to support collective competence. Finally, the experimentation study identifies the highly effective group awareness tools.

Sahraoui S, Sahraoui S, Benbousa O, Berkani A-S, Bilami A. Sensor-based wearable system for the detection and automatic treatment of nocturnal hypoglycaemia. Healthcare Technology Letters . 2018;5 (6) :239 - 241.Abstract

Diabetic patients are prone to daily and severe health-related risks, namely hyper and hypoglycaemia. Hypoglycaemia phenomenon happens when the glucose level in patient's blood is lower than a well-determined sill. It may induce serious impacts, such as functional brain failure or even the death. Hypoglycaemia is especially dangerous when it occurs during the night while the patient is asleep because it becomes difficult to be detected by the patient itself or other persons around him. While all existing sensor-based solutions are detection-only driven, the proposed solution goes beyond and attempts to treat autonomously, and at low cost, the nocturnal hypoglycaemia. The presented system detects the nocturnal hypoglycaemia phenomenon based on accelerated heart-rate symptom and a progressive detection algorithm. The system treats then the detected nocturnal hypoglycaemia throughout safe and automatic injection of glucagon.

Djebaili Y, Bilami A. A Cross-Layer Fault Tolerant Protocol with Recovery Mechanism for Clustered Sensor Networks. International Journal of Distributed Systems and Technologies (IJDST) . 2018;9 (1) :22.Abstract

This article describes how fault tolerance is an essential issue for many WSN (Wireless Sensor Network) applications such as wildlife monitoring, battlefield surveillance and health monitoring. It represents a great challenge for researchers regarding to the characteristics of sensor nodes which are prone to failures due essentially to their limited resources. Faults may occur, not only when sensor nodes exhaust their energy, but also when the congestion phenomenon emerges, because of a high traffic in the network and limited storage capacity of the sensor nodes. In order to support fault tolerance in WSNs, the authors propose a new scheme which incorporates a link quality estimation algorithm and a congestion detection mechanism to enable nodes that present high quality links to be chosen for routing in a non-congested area in case of faults. Evaluations through simulations under NS2 show that our proposed protocol tolerates faults with a minimum cost relatively to HEEP protocol and improves network's performances comparatively to other fault tolerant protocols such as EF-LEACH.

Beghriche A, Bilami A. A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks. International Journal of Intelligent Computing and Cybernetics. 2018.Abstract

Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks (MANETs). In such systems, the cooperation between nodes is one of the important principles being followed in the current research works to formulate various security protocols. Many existing works assume that mobile nodes will follow prescribed protocols without deviation. However, this is not always the case, because these networks are subjected to a variety of malicious attacks. Since there are various models of attack, trust routing scheme can guarantee security and trust of the network. The purpose of this paper is to propose a novel trusted routing model for mitigating attacks in MANETs.

Gourdache S, Bilami A, Barka K. Spectrum harvesting for heterogeneous wireless networks integration. Wireless Networks. 2018;26 (1) :431–447.Abstract

Massive capacity demand is a major impetus behind the advances, in various ways, of today and near future wireless communication networks. To face this challenge, more wireless spectrum is needed, efficient usage of this spectrum is necessary, and adequate architectures are required. In this paper, we present a conceptual solution based on a cognitive-radio-inspired cellular network, for integrating idle spectrum resources of different wireless networks into a single mobile heterogeneous wireless network. We describe the conceptual architecture of this integrating network, referred to as Integrating cognitive-radio-inspired cellular network (I-CRICNet), and present a cooperative spectrum-harvesting scheme that keeps the former supplied with spectrum resources. In the latter scheme, we make extensive use of cross-correlated sequences (CSSs), for events signaling purposes. This choice is motived by the particularly interesting characteristics of the CSSs, namely, duration shortness, robustness to bad radio conditions, detection rather than decoding, and low probability of collision. As an illustration, we propose a reporting and detection scheme, in the context of OFDMA systems, and provide performance results from simulations to validate our proposal.

Benyahia A, Bilami A, Sedrati M. CARTEE: congestion avoidance with reliable transport and energy efficiency for multimedia applications in wireless sensor networks. Wireless Networks. 2018;26 (167) :1–20.Abstract

Reliable data transport is an essential requirement for many multimedia applications in wireless sensor networks. Actually, an efficient transport protocol for these applications must take into account not only reliability and energy consumption factors but also memory occupancy and data delivery delay. Recently, many research works have been conducted in this area, however the proposed protocols treat some of these aspects and neglect others. Contrarily, in this paper we present a novel transport solution designed to provide 100% reliability without making light of other factors. Through different mechanisms, we attempt to reach this objective with congestion avoidance and good performances in terms of energy consumption, delivery delay, and memory storage. The proposed protocol, called congestion avoidance with reliable transmission and energy efficiency (CARTEE), attains these goals through several mechanisms, namely: fixed sliding window transmission, alternative implicit/explicit acknowledgement, a new congestion detection technique, and distributed transmission rate adjustment. To evaluate the proposed protocol, we have conducted simulations using ns-3. The obtained results confirm the efficiency and scalability of CARTEE and demonstrate that it outperforms the recent proposed transport protocols in terms of reliability, congestion avoidance, data cache occupancy, and latency.

Bahloul NEH, Boudjit S, Abdennebi M, Boubiche DE. A Flocking-Based on Demand Routing Protocol for Unmanned Aerial Vehicles. Journal of Computer Science and Technology. 2018;33 (2) :263–276.Abstract

The interest shown by some community of researchers to autonomous drones or UAVs (unmanned aerial vehicles) has increased with the advent of wireless communication networks. These networks allow UAVs to cooperate more efficiently in an ad hoc manner in order to achieve specific tasks in specific environments. To do so, each drone navigates autonomously while staying connected with other nodes in its group via radio links. This connectivity can deliberately be maintained for a while constraining the mobility of the drones. This will be suitable for the drones involved in a given path of a given transmission between a source and a destination. This constraint could be removed at the end of the transmission process and the mobility of each concerned drone becomes again independent from the others. In this work, we proposed a flocking-based routing protocol for UAVs called BR-AODV. The protocol takes advantage of a well known ad hoc routing protocol for on-demand route computation, and the Boids of Reynolds mechanism for connectivity and route maintaining while data is being transmitted. Moreover, an automatic ground base stations discovery mechanism has been introduced for a proactive drones and ground networks association needed for the context of real-time applications. The performance of BR-AODV was evaluated and compared with that of classical AODV routing protocol and the results show that BR-AODV outperforms AODV in terms of delay, throughput and packet loss.

Boubiche D-E, Pathan A-SK, Lloret J, Zhou H, Hong S, Amin SO, Feki MA. Advanced Industrial Wireless Sensor Networks and Intelligent IoT. IEEE Communications Magazine . 2018;56 (2) :14 - 15.Abstract

Examines the market for wireless sensor networks in the era and expansion of the Internet of Things. Over the past decade, the fast expansion of the Internet of Things (IoT) paradigm and wireless communication technologies has raised many scientific and engineering challenges that call for ingenious research efforts from both academia and industry. The IoT paradigm now covers several technologies beyond RFID and wireless sensor networks (WSNs). In fact, the number of potential application fields has already exceeded expectations. According to Cisco IBSG, more than 50 billion devices are expected to be connected to the Internet by 2020, with around 20 percent from the industry sector. Therefore, integrating the IoT concept and industrial WSNs (IWSNs) is an attractive choice for industrial processes, which may optimize operational efficiency, automation, maintenance, and rationalization. Moreover, IoT ensures large-scale interconnection between machines, computers, and people, enabling intelligent industrial operations. This emergent technological evolution has led to what has become the Industrial IoT (IIoT). IIoT will bring promising opportunities, along with new challenges.

Boubiche S, Boubiche DE, Bilami A, Toral-Cruz H. Big Data Challenges and Data Aggregation Strategies in Wireless Sensor Networks. IEEE Access. 2018;6 :20558 - 20571.Abstract

The emergence of new data handling technologies and analytics enabled the organization of big data in processes as an innovative aspect in wireless sensor networks (WSNs). Big data paradigm, combined with WSN technology, involves new challenges that are necessary to resolve in parallel. Data aggregation is a rapidly emerging research area. It represents one of the processing challenges of big sensor networks. This paper introduces the big data paradigm, its main dimensions that represent one of the most challenging concepts, and its principle analytic tools which are more and more introduced in the WSNs technology. The paper also presents the big data challenges that must be overcome to efficiently manipulate the voluminous data, and proposes a new classification of these challenges based on the necessities and the challenges of WSNs. As the big data aggregation challenge represents the center of our interest, this paper surveys its proposed strategies in WSNs.

Guezouli L, Belhani H. Motion Detection of Some Geometric Shapes in Video Surveillance. American Journal of Data Mining and Knowledge Discovery. 2017;2 (1) : 8-14 .Abstract

Motion detection is a live issue. Moving objects are an important clue for smart video surveillance systems. In this work we try to detect the motion in video surveillance systems. The aim of our work is to propose solutions for the automatic detection of moving objects in real time with a surveillance camera. We are interested by objects that have some geometric shape (circle, ellipse, square, and rectangle). Proposed approaches are based on background subtraction and edge detection. Proposed algorithms mainly consist of three steps: edge detection, extracting objects with some geometric shapes and motion detection of extracted objects.

Saadna Y. An overview of traffic sign detection and classification methods. International Journal of Multimedia Information Retrieval. 2017;6 (3) :193–210.Abstract

Over the last few years, different traffic sign recognition systems were proposed. The present paper introduces an overview of some recent and efficient methods in the traffic sign detection and classification. Indeed, the main goal of detection methods is localizing regions of interest containing traffic sign, and we divide detection methods into three main categories: color-based (classified according to the color space), shape-based, and learning-based methods (including deep learning). In addition, we also divide classification methods into two categories: learning methods based on hand-crafted features (HOG, LBP, SIFT, SURF, BRISK) and deep learning methods. For easy reference, the different detection and classification methods are summarized in tables along with the different datasets. Furthermore, future research directions and recommendations are given in order to boost TSR’s performance.

Baroudi T, Seghir R, Loechner V. Optimization of Triangular and Banded Matrix Operations Using 2d-Packed Layouts. ACM Transactions on Architecture and Code Optimization (TACO). 2017;14 (4).Abstract

Over the past few years, multicore systems have become increasingly powerful and thereby very useful in high-performance computing. However, many applications, such as some linear algebra algorithms, still cannot take full advantage of these systems. This is mainly due to the shortage of optimization techniques dealing with irregular control structures. In particular, the well-known polyhedral model fails to optimize loop nests whose bounds and/or array references are not affine functions. This is more likely to occur when handling sparse matrices in their packed formats. In this article, we propose using 2d-packed layouts and simple affine transformations to enable optimization of triangular and banded matrix operations. The benefit of our proposal is shown through an experimental study over a set of linear algebra benchmarks.

Hamza R, Muhammad K, Lv Z, Titouna F. Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive and Mobile Computing . 2017;41 :436-450.Abstract

Wireless capsule endoscopy (WCE) has several benefits over traditional endoscopy such as its portability and ease of usage, particularly for remote internet of things (IoT)-assisted healthcare services. During the WCE procedure, a significant amount of redundant video data is generated, the transmission of which to healthcare centers and gastroenterologists securely for analysis is challenging as well as wastage of several resources including energy, memory, computation, and bandwidth. In addition to this, it is inherently difficult and time consuming for gastroenterologists to analyze this huge volume of gastrointestinal video data for desired contents. To surmount these issues, we propose a secure video summarization framework for outdoor patients going through WCE procedure. In the proposed system, keyframes are extracted using a light-weighted video summarization scheme, making it more suitable for WCE. Next, a cryptosystem is presented for security of extracted keyframes based on 2D Zaslavsky chaotic map. Experimental results validate the performance of the proposed cryptosystem in terms of robustness and high-level security compared to other recent image encryption schemes during dissemination of important keyframes to healthcare centers and gastroenterologists for personalized WCE.

Ferradji MA, Hedjazi D. Modeling collaborative learning: case of clinical reasoning. Medical Technologies Journal. 2017;19 (3) :52-53.Abstract

 

Background: Collaborative learning is an important pedagogical strategy which gained a huge interest in critical domains such as the medical field. However, to ensure the quality of this learning method, it is necessary to focus intention not only on the cognitive aspect but also on the social activities that represent an essential issue during collaborative learning sessions. Our objective in this study is to highlight the collaborative aspect in the group learning method of clinical reasoning.

Methods: In this work, we have focused on cognitive studies that are interested in the clinical reasoning processes, while proposing a model dedicated to the design of collaborative clinical reasoning learning environment in synchronous mode. This model is primarily interested in social activities that have a strong influence on the collaborative learning effectiveness, and they are generally treated implicitly by basing on the improvisation and spontaneity of the learners group.

Results: The research idea was embodied through a collaborative learning clinical reasoning environment based on Web 2.0 technologies. We chose this technology to benefit from its ease of use and from its technical performances that can significantly contribute to the development of the cognitive and social aspects in the collaborative learning environment.

Conclusion: Our first contact with medical students showed us that they are appreciating this learning method. Indeed, to evaluate objectively our choices reliability, we plan to accomplish this research with a quantitative study based on real experiences with clinicians and medical students. The suggested study will allow us to collect the necessary lessons to work in depth on the relevant questions concerning the cognitive and social activities in the collaborative clinical reasoning learning.

 

Pages