<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Samir Athmani</style></author><author><style face="normal" font="default" size="100%">Sabrina Boubiche</style></author><author><style face="normal" font="default" size="100%">Homero Toral-Cruz</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity issues in wireless sensor networks: current challenges and solutions</style></title><secondary-title><style face="normal" font="default" size="100%">Wireless Personal Communications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">117</style></volume><pages><style face="normal" font="default" size="100%">177-213</style></pages><isbn><style face="normal" font="default" size="100%">1572-834X</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aouadj, Wafa</style></author><author><style face="normal" font="default" size="100%">Abdessemed, Mohamed Rida</style></author><author><style face="normal" font="default" size="100%">Rachid Seghir</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Discrete Large-scale Multi-Objective Teaching-Learning-Based Optimization Algorithm</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 4th International Conference on Networking, Information Systems &amp; Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><pages><style face="normal" font="default" size="100%">1-6</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sabrina Boubiche</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Efficient Approach for Big Data Aggregation Mechanism in Heterogeneous Wireless Connected Sensor Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Wireless Personal Communications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">118</style></volume><pages><style face="normal" font="default" size="100%">1405-1437</style></pages><isbn><style face="normal" font="default" size="100%">1572-834X</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Benbrahim, Hayet</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Fine-tuned Xception for Image Classification on Tiny ImageNet</style></title><secondary-title><style face="normal" font="default" size="100%">2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">1-4</style></pages><isbn><style face="normal" font="default" size="100%">1665467142</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Samir Gourdache</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Kamel Barka</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A framework for spectrum harvesting in heterogeneous wireless networks integration</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of King Saud University-Computer and Information Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Elsevier</style></publisher><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">281-290</style></pages><isbn><style face="normal" font="default" size="100%">1319-1578</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sahraoui, Mohamed</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Taleb-Ahmed, Abdelmalik</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Heuristically accelerated reinforcement learning for channel assignment in wireless sensor networks</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Sensor Networks</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Inderscience Publishers (IEL)</style></publisher><volume><style face="normal" font="default" size="100%">37</style></volume><pages><style face="normal" font="default" size="100%">159-170</style></pages><isbn><style face="normal" font="default" size="100%">1748-1279</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kadri, Salim</style></author><author><style face="normal" font="default" size="100%">Aouag, Sofiane</style></author><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Incremental Model Projection Applied to Streamline Software Architecture Assessment and Monitoring</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information System Modeling and Design (IJISMD)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">IGI Global</style></publisher><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">27-43</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ayoub Benayache</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Benaggoune, Khaled</style></author><author><style face="normal" font="default" size="100%">Hayet Mouss</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Industrial IoT middleware using a multi-agent system for consistency-based diagnostic in cement factory</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Autonomous and Adaptive Communications Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Inderscience Publishers (IEL)</style></publisher><volume><style face="normal" font="default" size="100%">14</style></volume><pages><style face="normal" font="default" size="100%">291-310</style></pages><isbn><style face="normal" font="default" size="100%">1754-8632</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kadri, Salim</style></author><author><style face="normal" font="default" size="100%">Aouag, Sofiane</style></author><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">MS-QuAAF: A generic evaluation framework for monitoring software architecture quality</style></title><secondary-title><style face="normal" font="default" size="100%">Information and Software Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Elsevier</style></publisher><volume><style face="normal" font="default" size="100%">140</style></volume><pages><style face="normal" font="default" size="100%">106713</style></pages><isbn><style face="normal" font="default" size="100%">0950-5849</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Saliha Mezzoudj</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author><author><style face="normal" font="default" size="100%">Rachid Seghir</style></author><author><style face="normal" font="default" size="100%">Yassmina Saadna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A parallel content-based image retrieval system using spark and tachyon frameworks</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of King Saud University-Computer and Information Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Elsevier</style></publisher><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">141-149</style></pages><isbn><style face="normal" font="default" size="100%">1319-1578</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bada, Mousaab</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Lagraa, Nasreddine</style></author><author><style face="normal" font="default" size="100%">Kerrache, Chaker Abdelaziz</style></author><author><style face="normal" font="default" size="100%">Muhammad Imran</style></author><author><style face="normal" font="default" size="100%">Muhammad Shoaib</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A policy-based solution for the detection of colluding GPS-Spoofing attacks in FANETs</style></title><secondary-title><style face="normal" font="default" size="100%">Transportation Research Part A: Policy and Practice</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Elsevier</style></publisher><volume><style face="normal" font="default" size="100%">149</style></volume><pages><style face="normal" font="default" size="100%">300-318</style></pages><isbn><style face="normal" font="default" size="100%">0965-8564</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Khaled Hamouid</style></author><author><style face="normal" font="default" size="100%">Omar, Mawloud</style></author><author><style face="normal" font="default" size="100%">Kamel Adi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Privacy-Preserving Authentication Model Based on Anonymous Certificates in IoT</style></title><secondary-title><style face="normal" font="default" size="100%">2021 Wireless Days (WD)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">1-6</style></pages><isbn><style face="normal" font="default" size="100%">1665425598</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Belkacem, Soundes</style></author><author><style face="normal" font="default" size="100%">Larbi Guezouli</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Robust and Accurate Method for Textual Information Extraction Over Video Frames</style></title><secondary-title><style face="normal" font="default" size="100%">Advances on Smart and Soft Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pages><style face="normal" font="default" size="100%">119-129</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Somia Sahraoui</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Securing human‐to‐thing interactions in the Internet of Things with asymmetric and selective mechanism</style></title><secondary-title><style face="normal" font="default" size="100%">Security and Privacy</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Wiley Online Library</style></publisher><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">e38</style></pages><isbn><style face="normal" font="default" size="100%">2475-6725</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">5</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Boudra, Safia</style></author><author><style face="normal" font="default" size="100%">Yahiaoui, Itheri</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A set of statistical radial binary patterns for tree species identification based on bark images</style></title><secondary-title><style face="normal" font="default" size="100%">Multimedia Tools and Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">80</style></volume><pages><style face="normal" font="default" size="100%">22373-22404</style></pages><isbn><style face="normal" font="default" size="100%">1573-7721</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">15</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Douha, Djamel</style></author><author><style face="normal" font="default" size="100%">Mokhtari, Aicha</style></author><author><style face="normal" font="default" size="100%">Guessoum, Zahia</style></author><author><style face="normal" font="default" size="100%">Mandiau, René</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards a non monotonic agent testing</style></title><secondary-title><style face="normal" font="default" size="100%">2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">1-8</style></pages><isbn><style face="normal" font="default" size="100%">166540969X</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Douha, Djamel</style></author><author><style face="normal" font="default" size="100%">Mokhtari, Aicha</style></author><author><style face="normal" font="default" size="100%">Guessoum, Zahia</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards a non monotonic agent testing, reasoning about messages and behavior</style></title><secondary-title><style face="normal" font="default" size="100%">8th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2021</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Saliha Mezzoudj</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author><author><style face="normal" font="default" size="100%">Rachid Seghir</style></author><author><style face="normal" font="default" size="100%">Yassmina Saadna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A parallel content-based image retrieval system using spark and tachyon frameworks</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of King Saud University - Computer and Information Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	With the huge increase of large-scale multimedia over Internet, especially images, building Content-Based Image Retrieval (CBIR) systems for large-scale images has become a big challenge. One of the drawbacks associated with CBIR is the very long execution time. In this article, we propose a fast Content-Based Image Retrieval system using Spark (CBIR-S) targeting large-scale images. Our system is composed of two steps.&amp;nbsp;&lt;em&gt;(i) image indexation step&lt;/em&gt;, in which we use&amp;nbsp;MapReduce&amp;nbsp;distributed model on Spark in order to speed up the indexation process. We also use a memory-centric&amp;nbsp;distributed storage system, called Tachyon, to enhance the write operation&amp;nbsp;&lt;em&gt;(ii) image retrieving step&lt;/em&gt;&amp;nbsp;which we speed up by using a parallel k-Nearest Neighbors (k-NN) search method based on&amp;nbsp;MapReduce model&amp;nbsp;implemented under&amp;nbsp;Apache Spark, in addition to exploiting the cache method of spark framework. We have showed, through a wide set of experiments, the effectiveness of our approach in terms of processing time.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Abderrezak Benyahia</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Maamar Sedrati</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CARTEE: congestion avoidance with reliable transport and energy efficiency for multimedia applications in wireless sensor networks</style></title><secondary-title><style face="normal" font="default" size="100%">Wireless Networks</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">26</style></volume><pages><style face="normal" font="default" size="100%">1803-1822</style></pages><isbn><style face="normal" font="default" size="100%">1572-8196</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author><author><style face="normal" font="default" size="100%">Chorfi, Atef</style></author><author><style face="normal" font="default" size="100%">Aouag, Sofiane</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Clinical Reasoning Learning Groupware: An exploratory study of factors affecting the adoption behavior</style></title><secondary-title><style face="normal" font="default" size="100%">2020 4th International Symposium on Informatics and its Applications (ISIA)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">1-6</style></pages><isbn><style face="normal" font="default" size="100%">1728196523</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yasmine Djebaili</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Cross-Layer Fault Tolerant Protocol with Recovery Mechanism for Clustered Sensor Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Sensor Technology: Concepts, Methodologies, Tools, and Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">IGI Global</style></publisher><pages><style face="normal" font="default" size="100%">197-220</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Benbelgacem, Sonia</style></author><author><style face="normal" font="default" size="100%">Larbi Guezouli</style></author><author><style face="normal" font="default" size="100%">Rachid Seghir</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Distributed Information Retrieval Approach for Copyright Protection</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 3rd International Conference on Networking, Information Systems &amp; Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><pages><style face="normal" font="default" size="100%">1-6</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zeghina, Assaad Oussama</style></author><author><style face="normal" font="default" size="100%">Zoubia, Oussama</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Face Recognition Based on Harris Detector and Convolutional Neural Networks</style></title><secondary-title><style face="normal" font="default" size="100%">International Symposium on Modelling and Implementation of Complex Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pages><style face="normal" font="default" size="100%">163-171</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bensalem, Amina</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Zhou, Fen</style></author><author><style face="normal" font="default" size="100%">Rachedi, Abderrezak</style></author><author><style face="normal" font="default" size="100%">Mellouk, Abdelhamid</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Impact of Mobility Models on Energy Consumption in Unmanned Aerial Ad-Hoc Network</style></title><secondary-title><style face="normal" font="default" size="100%">2020 IEEE 45th Conference on Local Computer Networks (LCN)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">361-364</style></pages><isbn><style face="normal" font="default" size="100%">172817158X</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Haddad, Tarek Amine</style></author><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author><author><style face="normal" font="default" size="100%">Aouag, Sofiane</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An IoT-Based Adaptive Traffic Light Control Algorithm for Isolated Intersection</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Computing Systems and Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pages><style face="normal" font="default" size="100%">107-117</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Khaled Hamouid</style></author><author><style face="normal" font="default" size="100%">Othmen, Salwa</style></author><author><style face="normal" font="default" size="100%">Barkat, Amine</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">LSTR: lightweight and secure tree-based routing for wireless sensor networks</style></title><secondary-title><style face="normal" font="default" size="100%">Wireless Personal Communications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">112</style></volume><pages><style face="normal" font="default" size="100%">1479-1501</style></pages><isbn><style face="normal" font="default" size="100%">1572-834X</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kamel Barka</style></author><author><style face="normal" font="default" size="100%">Lyamine Guezouli</style></author><author><style face="normal" font="default" size="100%">Samir Gourdache</style></author><author><style face="normal" font="default" size="100%">Ameghchouche, Sara</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Mobility Based Genetic Algorithm for Heterogeneous Wireless Networks</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Machine Learning for Networking</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pages><style face="normal" font="default" size="100%">93-106</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kadri, Salim</style></author><author><style face="normal" font="default" size="100%">Aouag, Sofiane</style></author><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-view model-driven projection to facilitate the control of the evolution and quality of the architecture</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Software Innovation (IJSI)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">IGI Global</style></publisher><volume><style face="normal" font="default" size="100%">8</style></volume><pages><style face="normal" font="default" size="100%">21-39</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lyamine, Guezouli</style></author><author><style face="normal" font="default" size="100%">Kamel, Barka</style></author><author><style face="normal" font="default" size="100%">Souheila, Bouam</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A New Mobile Collaborative Approach Based Relays for Wireless Sensor Networks</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Information Science and Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><volume><style face="normal" font="default" size="100%">4</style></volume><pages><style face="normal" font="default" size="100%">31-38</style></pages><isbn><style face="normal" font="default" size="100%">2550-5114</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Khaled Hamouid</style></author><author><style face="normal" font="default" size="100%">Kamel Adi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy-aware Authentication Scheme for Electric Vehicle In-motion Wireless Charging</style></title><secondary-title><style face="normal" font="default" size="100%">2020 International Symposium on Networks, Computers and Communications (ISNCC)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">1-6</style></pages><isbn><style face="normal" font="default" size="100%">1728156289</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chorfi, Atef</style></author><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author><author><style face="normal" font="default" size="100%">Aouag, Sofiane</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Problem-based collaborative learning groupware to improve computer programming skills</style></title><secondary-title><style face="normal" font="default" size="100%">Behaviour &amp; Information Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Taylor &amp; Francis</style></publisher><pages><style face="normal" font="default" size="100%">1-20</style></pages><isbn><style face="normal" font="default" size="100%">0144-929X</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Toufik Baroudi</style></author><author><style face="normal" font="default" size="100%">Vincent Loechner</style></author><author><style face="normal" font="default" size="100%">Rachid Seghir</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Static versus dynamic memory allocation: a comparison for linear algebra kernels</style></title><secondary-title><style face="normal" font="default" size="100%">IMPACT 2020, in conjunction with HiPEAC 2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aouag, Sofiane</style></author><author><style face="normal" font="default" size="100%">Kadri, Salim</style></author><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards architectural view-driven modernization</style></title><secondary-title><style face="normal" font="default" size="100%">2020 International Conference on Advanced Aspects of Software Engineering (ICAASE)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">1-6</style></pages><isbn><style face="normal" font="default" size="100%">1665422319</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lyamine Guezouli</style></author><author><style face="normal" font="default" size="100%">Kamel Barka</style></author><author><style face="normal" font="default" size="100%">Djehiche, Asma</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">UAVs's efficient controlled mobility management for mobile heterogeneous wireless sensor networks</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of King Saud University-Computer and Information Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><publisher><style face="normal" font="default" size="100%">Elsevier</style></publisher><isbn><style face="normal" font="default" size="100%">1319-1578</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kadri, Salim</style></author><author><style face="normal" font="default" size="100%">Aouag, Sofiane</style></author><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multi-level approach for controlling architecture quality with Alloy</style></title><secondary-title><style face="normal" font="default" size="100%">2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">1-8</style></pages><isbn><style face="normal" font="default" size="100%">1728166330</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mahmoud, Chaira</style></author><author><style face="normal" font="default" size="100%">Aouag, Sofiane</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security for internet of things: A state of the art on existing protocols and open research issues</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 9th international conference on information systems and technologies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><pages><style face="normal" font="default" size="100%">1-6</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kamel Barka</style></author><author><style face="normal" font="default" size="100%">Lyamine Guezouli</style></author><author><style face="normal" font="default" size="100%">Samir Gourdache</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Proposal of a new self-organizing protocol for data collection regarding Mobile Wireless Sensor and actor Networks</style></title><secondary-title><style face="normal" font="default" size="100%"> 2019 15th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><pub-location><style face="normal" font="default" size="100%">Tangier, Morocco</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Mobile Wireless Sensor and Actor Networks (MWSANs) can simply be defined as an extension of Wireless Sensor and Actor Networks (WSANs) in which the actor nodes are mobile. As such, in addition to challenges existing in WSAN, the mobility also imposes new challenges such as localization of actors, cooperative tracking of both actor-actor and actor-sensor collaboration, and communication infrastructure between distant actors. New communication protocols, specific to MWSANs, are needed. In this paper, we propose a self-organization and data collection protocol in order to provide energy efficiency, low latency, high success rate and suitably interactions between sensors and actors and take benefit from the mobility and resources existing on the network's actor nodes. The actor nodes move according to RWP mobility model. Each actor, during its pause time creates a temporary cluster, and is the head of it, collects and processes sensor data and performs actions on the environment based on the information gathered from sensor nodes in its cluster. Once an actor detects a base station it delivers the collected data to it. The simulations carried out (with TOSSIM tool), comfort us with good performances results.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lyamine Guezouli</style></author><author><style face="normal" font="default" size="100%">Kamel Barka</style></author><author><style face="normal" font="default" size="100%">Samir Gourdache</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Self-organization Smart Protocol for Mobile Wireless Sensor Networks</style></title><secondary-title><style face="normal" font="default" size="100%">2019 15th International Wireless Communications &amp; Mobile Computing Conference (IWCMC)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><pub-location><style face="normal" font="default" size="100%">Tangier, Morocco</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper, we propose a novel self-organization protocol for wireless sensor networks (WSNs) assisted by Unmanned Aerial Vehicle (UAV or Drone) called SSP (Self-organization Smart Protocol). In order to provide energy efficiency, low latency, high success rate and suitably interactions between sensors and UAVs while taking advantage of the air mobility (fly) and resource available on the UAVs in the network. The UAVs move according to RWP (Random Waypoint) mobility model. Each UAV, during its pause time at a known height, creates a temporary cluster, and acts as its head, collects and processes sensor data and performs actions on the environment based on the information gathered from sensor nodes in its cluster. Once an UAV detects a base station (BS) it forwards the collected data to it. The results of the simulations show the high performance of the proposed algorithm.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Belkacem Soundes</style></author><author><style face="normal" font="default" size="100%">Guezouli Larbi</style></author><author><style face="normal" font="default" size="100%">Zidat Samir</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Pseudo Zernike moments-based approach for text detection and localisation from lecture videos</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Computational Science and Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">274-283</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Scene text presents challenging characteristics mainly related to acquisition circumstances and environmental changes resulting in low quality videos. In this paper, we present a scene text detection algorithm based on pseudo Zernike moments (PZMs) and stroke features from low resolution lecture videos. Algorithm mainly consists of three steps: slide detection, text detection and segmentation and non-text filtering. In lecture videos, slide region is a key object carrying almost all important information; hence slide region has to be extracted and segmented from other scene objects considered as background for later processing. Slide region detection and segmentation is done by applying pseudo Zernike moment's based on RGB frames. Text detection and extraction is performed using PZMs segmentation over V channel of HSV colour space, and then stroke feature is used to filter out non-text region and to remove false positives. The algorithm is robust to illumination, low resolution and uneven luminance from compressed videos. Effectiveness of PZM description leads to very few false positives comparing to other approached. Moreover resulting images can be used directly by OCR engines and no more processing is needed.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Saliha Mezzoudj</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author><author><style face="normal" font="default" size="100%">Rachid Seghir</style></author><author><style face="normal" font="default" size="100%">Yassmina Saadna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A parallel content-based image retrieval system using spark and tachyon frameworks</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of King Saud University - Computer and Information Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	With the huge increase of large-scale multimedia over Internet, especially images, building Content-Based Image Retrieval (CBIR) systems for large-scale images has become a big challenge. One of the drawbacks associated with CBIR is the very long execution time. In this article, we propose a fast Content-Based Image Retrieval system using Spark (CBIR-S) targeting large-scale images. Our system is composed of two steps.&amp;nbsp;&lt;em&gt;(i) image indexation step&lt;/em&gt;, in which we use&amp;nbsp;MapReduce&amp;nbsp;distributed model on Spark in order to speed up the indexation process. We also use a memory-centric&amp;nbsp;distributed storage system, called Tachyon, to enhance the write operation&amp;nbsp;&lt;em&gt;(ii) image retrieving step&lt;/em&gt;&amp;nbsp;which we speed up by using a parallel k-Nearest Neighbors (k-NN) search method based on&amp;nbsp;MapReduce model&amp;nbsp;implemented under&amp;nbsp;Apache Spark, in addition to exploiting the cache method of spark framework. We have showed, through a wide set of experiments, the effectiveness of our approach in terms of processing time.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Khaled Hamouid</style></author><author><style face="normal" font="default" size="100%">Kamel Adi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority</style></title><secondary-title><style face="normal" font="default" size="100%">Peer-to-Peer Networking and Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">1137–1155</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	This paper proposes a compromise-tolerant (&lt;em&gt;t&lt;/em&gt;,&lt;em&gt;n&lt;/em&gt;)-threshold certification management scheme for MANETs. Our solution allows to mitigate the impact of compromised nodes that participate in the certification service. In our design, certification management is achieved anonymously by an Anonymous Certification Authority (ACA). The latter is fully distributed into multiple disjointed coalitions of nodes whose structure is made hidden. This prevents an adversary from taking the control of the ACA by arbitrarily compromising&amp;nbsp;&lt;em&gt;t&lt;/em&gt;&amp;nbsp;or more nodes. In other words, our proposal enhances the compromise-tolerance to more than the threshold number&amp;nbsp;&lt;em&gt;t&lt;/em&gt;&amp;nbsp;of nodes without breaking down the whole certification system. As a result, our scheme requires a very smaller threshold than traditional schemes, which improves considerably the service availability. The experimental study shows a clear advantage over traditional threshold-based certification schemes by ensuring a significant positive compromise between security and availability of certification service.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">5</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Wassila Belferdi</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author><author><style face="normal" font="default" size="100%">Lemnouar Noui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration</style></title><secondary-title><style face="normal" font="default" size="100%">Multidimensional Systems and Signal Processing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">30</style></volume><pages><style face="normal" font="default" size="100%">1093–1112</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yassmina Saadna</style></author><author><style face="normal" font="default" size="100%">Ali Behloul</style></author><author><style face="normal" font="default" size="100%">Saliha Mezzoudj</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Speed limit sign detection and recognition system using SVM and MNIST datasets</style></title><secondary-title><style face="normal" font="default" size="100%">Neural Computing and Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">31</style></volume><pages><style face="normal" font="default" size="100%">5005–5015</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	This article presents a computer vision system for real-time detection and robust recognition of speed limit signs, specially designed for intelligent vehicles. First, a new segmentation method is proposed to segment the image, and the CHT transformation (circle hog transform) is used to detect circles. Then, a new method based on local binary patterns is proposed to filter segmented images in order to reduce false alarms. In the classification phase, a cascading architecture of two linear support vector machines is proposed. The first is trained on the GTSRB dataset to decide whether the detected region is a speed limit sign or not, and the second is trained on the MNIST dataset to recognize the sign numbers. The system achieves a classification recall of 99.81% with a precision of 99.08% on the GTSRB dataset; in addition, the system is also tested on the BTSD and STS datasets, and it achieves a classification recall of 99.39% and 98.82% with a precision of 99.05% and 98.78%, respectively, within a processing time of 11.22&amp;nbsp;ms.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ikram Boubechal</style></author><author><style face="normal" font="default" size="100%">Seghir Rachid</style></author><author><style face="normal" font="default" size="100%">Redha Benzid</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Generalized and Parallelized SSIM-Based Multilevel Thresholding Algorithm</style></title><secondary-title><style face="normal" font="default" size="100%">Applied Artificial Intelligence</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">1266-1289</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Multilevel thresholding is a widely used technique to perform image segmentation. It consists of dividing an input image into several distinct regions by finding the optimal thresholds according to a certain objective function. In this work, we generalize the use of the SSIM quality measure as an objective function to solve the multilevel thresholding problem using empirically tuned swarm intelligence algorithms. The experimental study we have conducted shows that our approach, producing near-exact solutions, is more effective compared to the state-of-the-art methods. Moreover, we show that the computation complexity has been significantly reduced by adopting a shared-memory parallel programming paradigm for all the algorithms we have implemented.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">14</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mezzoudj Saliha</style></author><author><style face="normal" font="default" size="100%">Behloul Ali</style></author><author><style face="normal" font="default" size="100%">Seghir Rachid</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards large-scale face-based race classification on spark framework</style></title><secondary-title><style face="normal" font="default" size="100%">Multimedia Tools and Applications </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">78</style></volume><pages><style face="normal" font="default" size="100%">26729–26746</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Recently, the identification of an individual race has become an important research topic in face recognition systems, especially in large-scale face images. In this paper, we propose a new large-scale race classification method which combines Local Binary Pattern (LBP) and Logistic Regression (LR) on Spark framework. LBP is used to extract features from facial images, while spark’s logistic regression is used as a classifier to improve the accuracy and speedup the classification system. The race recognition method is performed on Spark framework to process, in a parallel way, a large scale of data. The evaluation of our proposed method has been performed on two large face image datasets CAS-PEAL and Color FERET. Two major races were considered for this work, including Asian and Non-Asian races. As a result, we achieve the highest race classification accuracy (99.99%) compared to Linear SVM, Naive Bayesian (NB), Random Forest(RF), and Decision Tree (DT) Spark’s classifiers. Our method is compared against different state-of-the-art methods on race classification, the obtained results show that our approach is more efficient in terms of accuracy and processing time.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">18</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author><author><style face="normal" font="default" size="100%">Fateh Layachi</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A multi-agent system for distributed maintenance scheduling</style></title><secondary-title><style face="normal" font="default" size="100%">https://www.sciencedirect.com/science/article/pii/S004579061832620X#!</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">77</style></volume><pages><style face="normal" font="default" size="100%">1-11</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Due to the intrinsically geo-distributed subcontracting maintenance activity practice, the maintenance scheduling has for a long time been a major challenge in the industry. This research work presents a methodology to schedule the maintenance activities of geo-distributed assets. A multi-agent system based approach is proposed to enable the decision-making for the subcontractors in a distributed industrial environment under uncertainty. An auction based negotiation mechanism is designed to promote competition and cooperation among the different agents, and to obtain global good schedule.Compared to the&amp;nbsp;Weighted Shortest Processing Time first–Heuristic–Earliest Due Date (&lt;em&gt;WSPT-H-EDD&lt;/em&gt;) method,&amp;nbsp;the experimental results show that the proposed approach is able to provide scheduling scheme with good performances in terms of Global Cost, Total Weighted Tardiness Cost and makespan.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Samir Gourdache</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Kamel Barka</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A framework for spectrum harvesting in heterogeneous wireless networks integration</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of King Saud University - Computer and Information Sciences</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Today’s, and near future, communication networks rely heavily on capacity expansion to keep pace with the massive number of mobile devices and ever-increasing mobile traffic. This expansion can be achieved through three major ingredients, namely, adding more wireless-spectrum, efficient usage of this spectrum, and adequate networks’ architectures. In this paper, a proposition for integrating these three ingredients in a cognitive-radio-inspired framework is presented. The focus is on the integration of the idle spectrum resources of different&amp;nbsp;wireless networks&amp;nbsp;into a single mobile heterogeneous wireless network. This framework is based on a conceptual network-architecture articulated with a generic and cooperative spectrum-harvesting scheme. The former brings the necessary agility for such heterogeneous environments, the latter keeps the network supplied with the vital spectrum resources. In our proposal, we make use of cross-correlated sequences (CCSs) for context-aware events’ signaling purposes. This choice is motivated by the particularly interesting characteristics of CCSs, namely, duration shortness, robustness to bad radio conditions, detection rather than decoding, and&amp;nbsp;low probability&amp;nbsp;of&amp;nbsp;collision. As an illustration, we propose a reporting and detection scheme, in the context of OFDMA systems, and provide performance results from simulations to validate our proposal.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author><author><style face="normal" font="default" size="100%">Fateh Layachi</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A multi-agent system for distributed maintenance scheduling</style></title><secondary-title><style face="normal" font="default" size="100%">Computers &amp; Electrical Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">77</style></volume><pages><style face="normal" font="default" size="100%">1-11</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Due to the intrinsically geo-distributed subcontracting maintenance activity practice, the maintenance scheduling has for a long time been a major challenge in the industry. This research work presents a methodology to schedule the maintenance activities of geo-distributed assets. A multi-agent system based approach is proposed to enable the decision-making for the subcontractors in a distributed industrial environment under uncertainty. An auction based negotiation mechanism is designed to promote competition and cooperation among the different agents, and to obtain global good schedule.Compared to the&amp;nbsp;Weighted Shortest Processing Time first–Heuristic–Earliest Due Date (&lt;em&gt;WSPT-H-EDD&lt;/em&gt;) method,&amp;nbsp;the experimental results show that the proposed approach is able to provide scheduling scheme with good performances in terms of Global Cost, Total Weighted Tardiness Cost and makespan.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Samir Athmani</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs</style></title><secondary-title><style face="normal" font="default" size="100%">Future Generation Computer Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">92</style></volume><pages><style face="normal" font="default" size="100%">789-799</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Securing the network communication represents one of the most important challenges in&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/wireless-sensor-networks&quot; title=&quot;Learn more about Wireless Sensor Networks from ScienceDirect's AI-generated Topic Pages&quot;&gt;wireless sensor networks&lt;/a&gt;. The key distribution problem has been widely discussed in classical wireless sensor networks contrarily to heterogeneous ones. HWSNs (Heterogeneous Wireless Sensor Networks) have optimized the network capability and opened new security opportunities by introducing high resource capacity&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/sensor-node&quot; title=&quot;Learn more about Sensor Node from ScienceDirect's AI-generated Topic Pages&quot;&gt;sensor nodes&lt;/a&gt;&amp;nbsp;in the network. In this paper, an efficient dynamic&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/authentication&quot; title=&quot;Learn more about Authentication from ScienceDirect's AI-generated Topic Pages&quot;&gt;authentication&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/key-management-scheme&quot; title=&quot;Learn more about Key Management Scheme from ScienceDirect's AI-generated Topic Pages&quot;&gt;key Management scheme&lt;/a&gt;&amp;nbsp;is proposed for heterogeneous WSN. The main idea is to provide a single lightweight protocol for both authentication and key establishment while optimizing the security level. The key distribution algorithm is based on preexisting information to generate dynamic keys and does not require any secure channel and sharing phase which improves the security, energy efficiency and reduces the memory consumption. Experimental results have confirmed the performances of our mechanism compared to some of the existing security protocols.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ayoub Benayache</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Sami Barkat</style></author><author><style face="normal" font="default" size="100%">Pascal Lorenz</style></author><author><style face="normal" font="default" size="100%">Hafnaoui Taleb</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">MsM: A microservice middleware for smart WSN-based IoT application</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Network and Computer Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">144</style></volume><pages><style face="normal" font="default" size="100%">138-154</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p id=&quot;abspara0010&quot; style=&quot;text-align: justify;&quot;&gt;
	Actually, wireless sensor networks represent a substantial part in IoT. However, their limitation requires a special consideration in IoT applications. For their integration with the internet, it is necessary to adapt such networks using different middleware, with taking into account various challenges such as heterogeneity and interoperability.
&lt;/p&gt;

&lt;p id=&quot;abspara0015&quot; style=&quot;text-align: justify;&quot;&gt;
	Previously Service Oriented Architecture (SOA) was the suitable design, but with a better practice, a new design called microservice becomes the leader due to its high performance and its suitability for IoT applications.
&lt;/p&gt;

&lt;p id=&quot;abspara0020&quot; style=&quot;text-align: justify;&quot;&gt;
	In this paper, we first survey the most important middleware that have been proposed to handle WSN through IoT. Also, we discuss the most crucial microservices that handle different integration factors by making them supported by the proposed middleware. Our proposal is inspired from artificial neural network architecture to allow dynamic service interaction; it supports unlimited services with a regard to various device capabilities separately of the cloud technologies. Moreover, the evaluation of our design clearly shows that our middleware allows a lightweight WSN integration with IoT regarding to their limitations and requirements.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sedat Akleylek</style></author><author><style face="normal" font="default" size="100%">Meryem Soysaldı</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Homero Toral-Cruz</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT</style></title><secondary-title><style face="normal" font="default" size="100%">Sensors (Basel)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">903</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Identification schemes based on multivariate polynomials have been receiving attraction in different areas due to the quantum secure property. Identification is one of the most important elements for the IoT to achieve communication between objects, gather and share information with each other. Thus, identification schemes which are post-quantum secure are significant for Internet-of-Things (IoT) devices. Various polar forms of multivariate quadratic and cubic polynomial systems have been proposed for these identification schemes. There is a need to define polar form for multivariate&amp;nbsp;&lt;i&gt;d&lt;/i&gt;th degree polynomials, where d ≥ 4 . In this paper, we propose a solution to this need by defining constructions for multivariate polynomials of degree d ≥ 4 . We give a generic framework to construct the identification scheme for IoT and RFID applications. In addition, we compare identification schemes and curve-based cryptoGPS which is currently used in RFID applications.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Muhammad Imran</style></author><author><style face="normal" font="default" size="100%">Aneela Maqsood</style></author><author><style face="normal" font="default" size="100%">Muhammad Shoaib</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Mobile crowd sensing &amp;ndash; Taxonomy, applications, challenges, and solutions</style></title><secondary-title><style face="normal" font="default" size="100%">Computers in Human Behavior</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><volume><style face="normal" font="default" size="100%">101</style></volume><pages><style face="normal" font="default" size="100%">352-370</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Recently, mobile crowd sensing (MCS) is captivating growing attention because of their suitability for enormous range of new types of context-aware applications and services. This is attributed to the fact that modern smartphones are equipped with unprecedented sensing, computing, and communication capabilities that allow them to perform more complex tasks besides their inherent calling features. Despite a number of merits, MCS confronts new challenges due to network dynamics, the huge volume of data, sensing task coordination, and the user privacy problems. In this paper, a comprehensive review of MCS is presented. First, we highlight the distinguishing features and potential advantages of MCS compared to conventional&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/social-sciences/remote-sensing&quot; title=&quot;Learn more about Remote Sensing from ScienceDirect's AI-generated Topic Pages&quot;&gt;sensor&lt;/a&gt;&amp;nbsp;networks. Then, a&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/taxonomies&quot; title=&quot;Learn more about Taxonomies from ScienceDirect's AI-generated Topic Pages&quot;&gt;taxonomy&lt;/a&gt;&amp;nbsp;of MCS is devised based on sensing scale, level of user involvement and responsiveness, sampling rate, and underlying network infrastructure. Afterward, we categorize and classify prominent applications of MCS in environmental, infrastructure, social, and behavioral domains. The core architecture of MCS is also described. Finally, we describe the potential advantages, determine and reiterate the open research challenges of MCS and illustrate possible solutions.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lyamine Guezouli</style></author><author><style face="normal" font="default" size="100%">Kamel Barka</style></author><author><style face="normal" font="default" size="100%">Souheila Bouam</style></author><author><style face="normal" font="default" size="100%">Abdelmadjid Zidani</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A variant of random way point mobility model to improve routing in wireless sensor networks</style></title><secondary-title><style face="normal" font="default" size="100%"> International Journal of Information and Communication Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">13</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The mobility of nodes in a wireless sensor network is a factor affecting the quality of service offered by this network. We think that the mobility of the nodes presents an opportunity where the nodes move in an appropriate manner. Therefore, the routing algorithms can benefit from this opportunity. Studying a model of mobility and adapt it to ensure an optimal routing in an agitated network is the purpose of our work. We are interested in applying a variant of the mobility model RWP (named routing-random waypoint 'R-RWP') on the whole network in order to maximise the coverage radius of the base station (which will be fixed in our study) and thus to optimise the data delivery end-to-end delay.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Constructing collective competence: a new CSCW-based approach</style></title><secondary-title><style face="normal" font="default" size="100%"> International Journal of Information and Communication Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">12</style></volume><pages><style face="normal" font="default" size="100%">4</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Within the majority of contexts, it is persons that are considered to be competent or incompetent. However, in many cases it is the performance of groups and teams that is most important. This implies a concept of collective competence that integrates the set of skills in a group. In addition, the collective competence construction process is also enriched through collaboration which implies exchanges, confrontations, negotiations and interpersonal interactions. This paper presents our CSCW-based approach supporting collective competence construction. As a case of study, the industrial maintenance workspace is fundamentally a collaborative context. Our contribution in this area led us first, to analyse the related task in order to highlight collaborative maintenance vital needs and design the appropriate required group awareness supports which will be used to support collective competence. Finally, the experimentation study identifies the highly effective group awareness tools.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Somia Sahraoui</style></author><author><style face="normal" font="default" size="100%">Sofiane Sahraoui</style></author><author><style face="normal" font="default" size="100%">Oussama Benbousa</style></author><author><style face="normal" font="default" size="100%">Ahmed-Sami Berkani</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Sensor-based wearable system for the detection and automatic treatment of nocturnal hypoglycaemia</style></title><secondary-title><style face="normal" font="default" size="100%"> Healthcare Technology Letters </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">239 - 241</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Diabetic patients are prone to daily and severe health-related risks, namely hyper and hypoglycaemia. Hypoglycaemia phenomenon happens when the glucose level in patient's blood is lower than a well-determined sill. It may induce serious impacts, such as functional brain failure or even the death. Hypoglycaemia is especially dangerous when it occurs during the night while the patient is asleep because it becomes difficult to be detected by the patient itself or other persons around him. While all existing sensor-based solutions are detection-only driven, the proposed solution goes beyond and attempts to treat autonomously, and at low cost, the nocturnal hypoglycaemia. The presented system detects the nocturnal hypoglycaemia phenomenon based on accelerated heart-rate symptom and a progressive detection algorithm. The system treats then the detected nocturnal hypoglycaemia throughout safe and automatic injection of glucagon.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">6</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yasmine Djebaili</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Cross-Layer Fault Tolerant Protocol with Recovery Mechanism for Clustered Sensor Networks</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Distributed Systems and Technologies (IJDST) </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">9</style></volume><pages><style face="normal" font="default" size="100%">22</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	This article describes how fault tolerance is an essential issue for many WSN (Wireless Sensor Network) applications such as wildlife monitoring, battlefield surveillance and health monitoring. It represents a great challenge for researchers regarding to the characteristics of sensor nodes which are prone to failures due essentially to their limited resources. Faults may occur, not only when sensor nodes exhaust their energy, but also when the congestion phenomenon emerges, because of a high traffic in the network and limited storage capacity of the sensor nodes. In order to support fault tolerance in WSNs, the authors propose a new scheme which incorporates a link quality estimation algorithm and a congestion detection mechanism to enable nodes that present high quality links to be chosen for routing in a non-congested area in case of faults. Evaluations through simulations under NS2 show that our proposed protocol tolerates faults with a minimum cost relatively to HEEP protocol and improves network's performances comparatively to other fault tolerant protocols such as EF-LEACH.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Abdesselem Beghriche</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Intelligent Computing and Cybernetics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks (MANETs). In such systems, the cooperation between nodes is one of the important principles being followed in the current research works to formulate various security protocols. Many existing works assume that mobile nodes will follow prescribed protocols without deviation. However, this is not always the case, because these networks are subjected to a variety of malicious attacks. Since there are various models of attack, trust routing scheme can guarantee security and trust of the network. The purpose of this paper is to propose a novel trusted routing model for mitigating attacks in MANETs.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Samir Gourdache</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Kamel Barka</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Spectrum harvesting for heterogeneous wireless networks integration</style></title><secondary-title><style face="normal" font="default" size="100%">Wireless Networks</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">26</style></volume><pages><style face="normal" font="default" size="100%">431–447</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Massive capacity demand is a major impetus behind the advances, in various ways, of today and near future wireless communication networks. To face this challenge, more wireless spectrum is needed, efficient usage of this spectrum is necessary, and adequate architectures are required. In this paper, we present a conceptual solution based on a cognitive-radio-inspired cellular network, for integrating idle spectrum resources of different wireless networks into a single mobile heterogeneous wireless network. We describe the conceptual architecture of this integrating network, referred to as Integrating cognitive-radio-inspired cellular network (I-CRICNet), and present a cooperative spectrum-harvesting scheme that keeps the former supplied with spectrum resources. In the latter scheme, we make extensive use of cross-correlated sequences (CSSs), for events signaling purposes. This choice is motived by the particularly interesting characteristics of the CSSs, namely, duration shortness, robustness to bad radio conditions, detection rather than decoding, and low probability of collision. As an illustration, we propose a reporting and detection scheme, in the context of OFDMA systems, and provide performance results from simulations to validate our proposal.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Abderrezak Benyahia</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Maamar Sedrati</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CARTEE: congestion avoidance with reliable transport and energy efficiency for multimedia applications in wireless sensor networks</style></title><secondary-title><style face="normal" font="default" size="100%">Wireless Networks</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">26</style></volume><pages><style face="normal" font="default" size="100%">1–20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Reliable data transport is an essential requirement for many multimedia applications in wireless sensor networks. Actually, an efficient transport protocol for these applications must take into account not only reliability and energy consumption factors but also memory occupancy and data delivery delay. Recently, many research works have been conducted in this area, however the proposed protocols treat some of these aspects and neglect others. Contrarily, in this paper we present a novel transport solution designed to provide 100% reliability without making light of other factors. Through different mechanisms, we attempt to reach this objective with congestion avoidance and good performances in terms of energy consumption, delivery delay, and memory storage. The proposed protocol, called congestion avoidance with reliable transmission and energy efficiency (CARTEE), attains these goals through several mechanisms, namely: fixed sliding window transmission, alternative implicit/explicit acknowledgement, a new congestion detection technique, and distributed transmission rate adjustment. To evaluate the proposed protocol, we have conducted simulations using ns-3. The obtained results confirm the efficiency and scalability of CARTEE and demonstrate that it outperforms the recent proposed transport protocols in terms of reliability, congestion avoidance, data cache occupancy, and latency.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">167</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nour El Houda Bahloul</style></author><author><style face="normal" font="default" size="100%">Saadi Boudjit</style></author><author><style face="normal" font="default" size="100%">Marwen Abdennebi</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Flocking-Based on Demand Routing Protocol for Unmanned Aerial Vehicles</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Computer Science and Technology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">263–276</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The interest shown by some community of researchers to autonomous drones or UAVs (unmanned aerial vehicles) has increased with the advent of wireless communication networks. These networks allow UAVs to cooperate more efficiently in an ad hoc manner in order to achieve specific tasks in specific environments. To do so, each drone navigates autonomously while staying connected with other nodes in its group via radio links. This connectivity can deliberately be maintained for a while constraining the mobility of the drones. This will be suitable for the drones involved in a given path of a given transmission between a source and a destination. This constraint could be removed at the end of the transmission process and the mobility of each concerned drone becomes again independent from the others. In this work, we proposed a flocking-based routing protocol for UAVs called BR-AODV. The protocol takes advantage of a well known ad hoc routing protocol for on-demand route computation, and the Boids of Reynolds mechanism for connectivity and route maintaining while data is being transmitted. Moreover, an automatic ground base stations discovery mechanism has been introduced for a proactive drones and ground networks association needed for the context of real-time applications. The performance of BR-AODV was evaluated and compared with that of classical AODV routing protocol and the results show that BR-AODV outperforms AODV in terms of delay, throughput and packet loss.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Djallel-Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Al-Sakib Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Jaime Lloret</style></author><author><style face="normal" font="default" size="100%">Huiyu Zhou</style></author><author><style face="normal" font="default" size="100%">Seongik Hong</style></author><author><style face="normal" font="default" size="100%">Syed Obaid Amin</style></author><author><style face="normal" font="default" size="100%">Mohamed Ali Feki</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Advanced Industrial Wireless Sensor Networks and Intelligent IoT</style></title><secondary-title><style face="normal" font="default" size="100%"> IEEE Communications Magazine </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">56</style></volume><pages><style face="normal" font="default" size="100%">14 - 15</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Examines the market for wireless sensor networks in the era and expansion of the Internet of Things. Over the past decade, the fast expansion of the Internet of Things (IoT) paradigm and wireless communication technologies has raised many scientific and engineering challenges that call for ingenious research efforts from both academia and industry. The IoT paradigm now covers several technologies beyond RFID and wireless sensor networks (WSNs). In fact, the number of potential application fields has already exceeded expectations. According to Cisco IBSG, more than 50 billion devices are expected to be connected to the Internet by 2020, with around 20 percent from the industry sector. Therefore, integrating the IoT concept and industrial WSNs (IWSNs) is an attractive choice for industrial processes, which may optimize operational efficiency, automation, maintenance, and rationalization. Moreover, IoT ensures large-scale interconnection between machines, computers, and people, enabling intelligent industrial operations. This emergent technological evolution has led to what has become the Industrial IoT (IIoT). IIoT will bring promising opportunities, along with new challenges.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sabrina Boubiche</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Azzedine Bilami</style></author><author><style face="normal" font="default" size="100%">Homero Toral-Cruz</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Big Data Challenges and Data Aggregation Strategies in Wireless Sensor Networks</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Access</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year></dates><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">20558 - 20571</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The emergence of new data handling technologies and analytics enabled the organization of big data in processes as an innovative aspect in wireless sensor networks (WSNs). Big data paradigm, combined with WSN technology, involves new challenges that are necessary to resolve in parallel. Data aggregation is a rapidly emerging research area. It represents one of the processing challenges of big sensor networks. This paper introduces the big data paradigm, its main dimensions that represent one of the most challenging concepts, and its principle analytic tools which are more and more introduced in the WSNs technology. The paper also presents the big data challenges that must be overcome to efficiently manipulate the voluminous data, and proposes a new classification of these challenges based on the necessities and the challenges of WSNs. As the big data aggregation challenge represents the center of our interest, this paper surveys its proposed strategies in WSNs.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mohamed-Abderraouf Ferradji</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modeling collaborative learning: case of clinical reasoning</style></title><secondary-title><style face="normal" font="default" size="100%">International conference of E-Health and Medical Communications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mohamed-Abderraouf Ferradji</style></author><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Towards virtual collaborative learning of clinical skills</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sedrati Maamar</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluation of QoS parameters with RPL protocol in the Internet of Things</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the International Conference on Computing for Engineering and Sciences (ICCES '17)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The objective of this work is to present an analysis of RPL Routing protocol for Low-Power and Lossy Networks (LLNs) in the Internet of Things (IoT) and to determine the adequate working mode between storing and non-storing. Objects in LLNs networks have limited processing power such as battery and memory. The study examined the behavior of RPL towards some number of quality of service parameters in Wireless Sensor Networks (WSNs). Simulations are conducted under ContikiCooja Simulator. Results show that non-storing mode has better results in terms of delay and loss rate, but the storing mode consumes less energy.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nour El Houda Bahloul</style></author><author><style face="normal" font="default" size="100%">Saadi Boudjit</style></author><author><style face="normal" font="default" size="100%">Marwen Abdennebi</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bio-Inspired on Demand Routing Protocol for Unmanned Aerial Vehicles</style></title><secondary-title><style face="normal" font="default" size="100%">2017 26th International Conference on Computer Communication and Networks (ICCCN)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><pub-location><style face="normal" font="default" size="100%">Vancouver, BC, Canada</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The interest shown by some community of researchers to autonomous drones or UAVs (Unmanned Aerial Vehicles) has increased with the advent of wireless communication networks. These networks allow UAVs to cooperate more efficiently in an ad hoc manner in order to achieve specific tasks in specific environments. To do so, each drone navigates autonomously while staying connected with other nodes in its group via radio links. This connectivity can deliberately be maintained for a while constraining the mobility of the drones. This will be suitable for the drones involved in a given path of a given transmission between a source and a destination. This constraint could be removed at the end of the transmission process and the mobility of each concerned drone becomes again independent from the others. In this work, we have proposed a bio-inspired routing protocol for UAVs called BR- AODV. The protocol takes advantage of a well known ad hoc routing protocol for on-demand route computation, and the Boids of Reynolds mechanism for connectivity and route maintaining while data is being transmitted. The performances of BR-AODV were evaluated and compared to those of classical AODV routing protocol and the results show that BR-AODV outperforms AODV in terms of delay, throughput and packet loss.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bendjehich Romaissa</style></author><author><style face="normal" font="default" size="100%">Boubiche Djallel Eddine</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">In-Body Routing Protocols for Wireless Body Sensor NetworksPublisher: IEEECite ThisPDF</style></title><secondary-title><style face="normal" font="default" size="100%">2017 10th International Conference on Developments in eSystems Engineering (DeSE)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><pub-location><style face="normal" font="default" size="100%">Paris, France</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Recent advances in wireless communication have led to the introduction of a novel network of miniaturized, low power, intelligent sensors that can be placed in, on, or around the body. This network is referred to as Wireless Body Area Network (WBAN). The main purpose of WBAN is to physiologically monitor patient's vital signs and consequently route the related data towards a base station. Since the environment of such a network is principally the human body, data routing mechanisms used in traditional wireless networks (e.g. WSN, WANET) need to be revised, and more restrictions have to be addressed in order to adapt it to WBAN routing challenges. Compared to those dedicated to on-body WBAN, in-body WBAN routing protocols have more constrains and restrictions and are expected to be efficient and robust. As better as we know, only few routing protocols have been proposed in literature and the research field stills underexplored. Therefore, in this paper we present an overview of the main existing routing protocols proposed for wireless in-body sensor networks (WIBSN).
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hafnaoui Taleb</style></author><author><style face="normal" font="default" size="100%">Sofiane Hamrioui</style></author><author><style face="normal" font="default" size="100%">Pascal Lorenz</style></author><author><style face="normal" font="default" size="100%">Azzedine Bilami</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integration of energy aware WSNs in cloud computing using NDN approach</style></title><secondary-title><style face="normal" font="default" size="100%">2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><pub-location><style face="normal" font="default" size="100%">Milan, Italy</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Nowadays, wireless sensor networks (WSNs) are becoming challenging issue and used in many fields and applications. WSNS are characterized by many constraints as low energy, low computation capability and weak transmission range. The cloud computing is promising technology that can provide a flexible storage and processing infrastructure to process WSN's data in large scale. The two technologies (i.e.: WSNs, Cloud Computing) have gained significant research interest and their combining is a fundamental challenge that certainly will resolve many issues related to WSNs. In this paper we discuss firstly the idea of integrating WSNs in Cloud Computing starting with a state of the art analysis of existing approaches in this field. The second part of this paper is devoted to a comparative study between two efficient energy protocols that are proposed for WSNs.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Larbi Guezouli</style></author><author><style face="normal" font="default" size="100%">Hanane Belhani</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Motion Detection of Some Geometric Shapes in Video Surveillance</style></title><secondary-title><style face="normal" font="default" size="100%">American Journal of Data Mining and Knowledge Discovery</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">2</style></volume><pages><style face="normal" font="default" size="100%"> 8-14 </style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Motion detection is a live issue. Moving objects are an important clue for smart video surveillance systems. In this work we try to detect the motion in video surveillance systems. The aim of our work is to propose solutions for the automatic detection of moving objects in real time with a surveillance camera. We are interested by objects that have some geometric shape (circle, ellipse, square, and rectangle). Proposed approaches are based on background subtraction and edge detection. Proposed algorithms mainly consist of three steps: edge detection, extracting objects with some geometric shapes and motion detection of extracted objects.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yassmina Saadna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An overview of traffic sign detection and classification methods</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Multimedia Information Retrieval</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">193–210</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Over the last few years, different traffic sign recognition systems were proposed. The present paper introduces an overview of some recent and efficient methods in the traffic sign detection and classification. Indeed, the main goal of detection methods is localizing regions of interest containing traffic sign, and we divide detection methods into three main categories: color-based (classified according to the color space), shape-based, and learning-based methods (including deep learning). In addition, we also divide classification methods into two categories: learning methods based on hand-crafted features (HOG, LBP, SIFT, SURF, BRISK) and deep learning methods. For easy reference, the different detection and classification methods are summarized in tables along with the different datasets. Furthermore, future research directions and recommendations are given in order to boost TSR’s performance.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Toufik Baroudi</style></author><author><style face="normal" font="default" size="100%">Rachid Seghir</style></author><author><style face="normal" font="default" size="100%">Vincent Loechner</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Optimization of Triangular and Banded Matrix Operations Using 2d-Packed Layouts</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Transactions on Architecture and Code Optimization (TACO)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">14</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Over the past few years, multicore systems have become increasingly powerful and thereby very useful in high-performance computing. However, many applications, such as some linear algebra algorithms, still cannot take full advantage of these systems. This is mainly due to the shortage of optimization techniques dealing with irregular control structures. In particular, the well-known polyhedral model fails to optimize loop nests whose bounds and/or array references are not affine functions. This is more likely to occur when handling sparse matrices in their packed formats. In this article, we propose using 2d-packed layouts and simple affine transformations to enable optimization of triangular and banded matrix operations. The benefit of our proposal is shown through an experimental study over a set of linear algebra benchmarks.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Rafik Hamza</style></author><author><style face="normal" font="default" size="100%">Khan Muhammad</style></author><author><style face="normal" font="default" size="100%">Zhihan Lv</style></author><author><style face="normal" font="default" size="100%">Faiza Titouna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Secure video summarization framework for personalized wireless capsule endoscopy</style></title><secondary-title><style face="normal" font="default" size="100%">Pervasive and Mobile Computing </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">41</style></volume><pages><style face="normal" font="default" size="100%">436-450</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Wireless capsule&amp;nbsp;endoscopy&amp;nbsp;(WCE) has several benefits over traditional endoscopy such as its portability and ease of usage, particularly for remote&amp;nbsp;internet of things&amp;nbsp;(IoT)-assisted&amp;nbsp;healthcare services. During the WCE procedure, a significant amount of redundant video data is generated, the transmission of which to healthcare centers and gastroenterologists securely for analysis is challenging as well as wastage of several resources including energy, memory, computation, and bandwidth. In addition to this, it is inherently difficult and time consuming for gastroenterologists to analyze this huge volume of gastrointestinal video data for desired contents. To surmount these issues, we propose a secure video summarization framework for outdoor patients going through WCE procedure. In the proposed system,&amp;nbsp;keyframes&amp;nbsp;are extracted using a light-weighted video summarization scheme, making it more suitable for WCE. Next, a&amp;nbsp;cryptosystem&amp;nbsp;is presented for security of extracted keyframes based on 2D Zaslavsky chaotic map. Experimental results validate the performance of the proposed cryptosystem in terms of robustness and high-level security compared to other recent image encryption schemes during dissemination of important keyframes to healthcare centers and gastroenterologists for personalized WCE.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mohamed Abderraouf Ferradji</style></author><author><style face="normal" font="default" size="100%">Djalal Hedjazi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Modeling collaborative learning: case of clinical reasoning</style></title><secondary-title><style face="normal" font="default" size="100%">Medical Technologies Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">19</style></volume><pages><style face="normal" font="default" size="100%">52-53</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	&amp;nbsp;
&lt;/p&gt;

&lt;p&gt;
	&lt;strong&gt;Background:&amp;nbsp;&lt;/strong&gt;Collaborative learning is an important pedagogical strategy which gained a huge interest in critical domains such as the medical field. However, to ensure the quality of this learning method, it is necessary to focus intention not only on the cognitive aspect but also on the social activities that represent an essential issue during collaborative learning sessions. Our objective in this study is to highlight the collaborative aspect in the group learning method of clinical reasoning.
&lt;/p&gt;

&lt;p&gt;
	&lt;strong&gt;Methods:&lt;/strong&gt;&amp;nbsp;In this work, we have focused on cognitive studies that are interested in the clinical reasoning processes, while proposing a model dedicated to the design of collaborative clinical reasoning learning environment in synchronous mode. This model is primarily interested in social activities that have a strong influence on the collaborative learning effectiveness, and they are generally treated implicitly by basing on the improvisation and spontaneity of the learners group.
&lt;/p&gt;

&lt;p&gt;
	&lt;strong&gt;Results:&lt;/strong&gt;&amp;nbsp;The research idea was embodied through a collaborative learning clinical reasoning environment based on Web 2.0 technologies. We chose this technology to benefit from its ease of use and from its technical performances that can significantly contribute to the development of the cognitive and social aspects in the collaborative learning environment.
&lt;/p&gt;

&lt;p&gt;
	&lt;strong&gt;Conclusion:&lt;/strong&gt;&amp;nbsp;Our first contact with medical students showed us that they are appreciating this learning method. Indeed, to evaluate objectively our choices reliability, we plan to accomplish this research with a quantitative study based on real experiences with clinicians and medical students. The suggested study will allow us to collect the necessary lessons to work in depth on the relevant questions concerning the cognitive and social activities in the collaborative clinical reasoning learning.
&lt;/p&gt;

&lt;p style=&quot;text-align: justify;&quot;&gt;
	&amp;nbsp;
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Lyamine Guezouli</style></author><author><style face="normal" font="default" size="100%">Kamel Barka</style></author><author><style face="normal" font="default" size="100%">Souheila Bouam</style></author><author><style face="normal" font="default" size="100%">Abdelmadjid Zidani</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Implementation and Optimization of RWP Mobility Model in WSNs Under TOSSIM Simulator</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Commu9nication Networks and Information Security (IJCNIS)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">9</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Mobility has always represented a complicated phenomenon in the network routing process. This complexity is mainly facilitated in the way that ensures reliable connections for efficient orientation of data. Many years ago, different studies were initiated basing on routing protocols dedicated to static environments in order to adapt them to the mobile environment. In the present work, we have a different vision of mobility that has many advantages due to its 'mobile' principle. Indeed, instead of searching to prevent mobility and testing for example to immobilize momentarily a mobile environment to provide routing task, we will exploit this mobility to improve routing. Based on that, we carried out a set of works to achieve this objective. For our first contribution, we found that the best way to make use of this mobility is to follow a mobility model. Many models have been proposed in the literature and employed as a data source in most studies. After a careful study, we focused on the Random Waypoint mobility model (RWP) in order to ensure routing in wireless networks. Our contribution involves a Random Waypoint model (in its basic version) that was achieved on the TOSSIM simulator, and it was considered as a platform for our second (and main) contribution, in which we suggested an approach based RWP where network nodes can collaborate and work together basing on our recommended algorithm. Such an approach offers many advantages to ensure routing in a dynamic environment. Finally, our contributions comprise innovative ideas for suggesting other solutions that will improve them.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maamar Sedrati</style></author><author><style face="normal" font="default" size="100%">Hafnaoui Taleb</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating QoS parameters for video streaming transmission in mobile ad hoc networks</style></title><secondary-title><style face="normal" font="default" size="100%"> International Journal of Autonomic Computing </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Recently, multimedia streaming applications are deployed anywhere (homes, campuses, etc.). Delivering these applications over mobile ad hoc networks is a challenging task: first, mobile ad hoc networks are infrastructure less, with dynamic topology, and limited resources. Secondly these applications have strict quality of service (QoS) requirements given with delay, jitter, bandwidth, loss rate, etc. Several architectures have been developed. However, an important part like QoS in routing level is still omitted. In this paper, many different coding techniques for video streaming are reviewed and two routing protocols (reactive and proactive) are used to evaluate which of them can improve QoS for multimedia streaming applications. Results show that reactive protocol performs better than proactive protocol in terms of throughput and network load in high mobility, but roles are reversed in terms of loss rate and network load for large-scale networks. PNSR and Jitter are influenced by nodes numbers independently of used protocol.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Amal Bourmada</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cross-layer energy efficient protocol for QoS provisioning in wireless sensor network</style></title><secondary-title><style face="normal" font="default" size="100%"> International Journal of Systems, Control and Communications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">8</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Ensuring (QoS) in wireless sensor networks (WSNs) is a challenging issue due to the lack of resources and energy exhausting of sensor nodes. In this paper we propose a new QoS aware routing protocol for multi-hop wireless sensor networks based on cross-layer interaction between the network, MAC and physical layers. At physical layer, a link quality estimator is studied for the purpose of evaluating link quality. At MAC layer, a differentiated services mechanism is used to distinguish between real time and non-real time packets and to allocate more channel resources for real time traffic; TDMA slots also have been modified to allocate more and earlier slots to real time packets. At network layer, a routing path selection algorithm is introduced for QoS optimisation. Simulation results show that our proposed protocol improves network's performances in terms of energy efficiency and QoS.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kamel Barka</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Samir Gourdache</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">MONet: A framework for self-adaptive energy-aware middleware for dynamic wireless sensor network</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Pervasive Computing and Communications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	The purpose of this paper is to ensure power efficiency in wireless sensor networks (WSNs) through a new framework-oriented middleware, based on a biologically inspired mechanism that uses an evolutionary multi-objective optimization algorithm. The authors call this middleware framework multi-objective optimization for wireless sensor networks (MONet).
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Miloud Naidja</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A dynamic self-organising heterogeneous routing protocol for clustered WSNs</style></title><secondary-title><style face="normal" font="default" size="100%"> International Journal of Wireless and Mobile Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">12</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Many self-adaptation routing schemes have been proposed for sensor networks. The most relevant of them consider a hierarchical topology and aim to meet energy conservation and QoS requirements in a homogeneous environment. In such networks, one specific algorithm is commonly applied by all nodes inside clusters. Contrarily, in this paper, we propose a heterogeneous routing by applying different strategies according to specific parameters at the same time inside different clusters. Moreover, each cluster can adopt different strategies at different moments under different conditions. This approach leads to a new self-adaptation protocol based on heterogeneity of the routing process in a multi-hop clustering WSN. The proposal uses a set of mechanisms that have been adopted in well-known protocols (HEEP, APTEEN, LEACH, PEGASIS, etc.) taking into account their strengths and weaknesses. Simulations under NS2 show that our proposal, based on heterogeneous routing protocol, prolongs the network lifetime with different ratios compared to HEEP, PEGASIS and others.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maamar Sedrati</style></author><author><style face="normal" font="default" size="100%">Abderrezak Benyahia</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Multipath Routing to Improve Quality of Service for Video Streaming Over Mobile Ad Hoc Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Wireless Personal Communications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">99</style></volume><pages><style face="normal" font="default" size="100%">999–1013</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Providing quality of service (QoS) for real-time multimedia applications such as video streaming in mobile ad hoc networks (MANETs) is an important challenge. MANETs are characterized by lack of fixed infrastructure, dynamic topology, and limited resources that make more difficult multimedia applications transport and run on this networks. To overcome this challenge, video coding techniques combined to multiple routing paths (multipath) is a promising technique for supporting transmission of multiple video streams with appropriate QoS over mobile ad hoc networks. In this paper, firstly, many issues and different techniques for video streaming over MANET have been reviewed and secondly two multi paths routing protocols (M-AODV and MDSDV) have been evaluated in order to improve QoS for real-time multimedia applications. Results show that none of these two protocols is better than the other. In certain situations (throughput and load network with high mobility) is M-AODV but in others (network load and reliability for large-scale network) is MDSDV protocol which displays good performance. It is also noted that these two protocols provide between acceptable and good quality and a small jitter regardless of nodes number in medium mobility.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Faouzi Hidoussi</style></author><author><style face="normal" font="default" size="100%">Homero Toral-Cruz</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Rafael Martínez-Peláez</style></author><author><style face="normal" font="default" size="100%">Pablo Velarde Alvarado</style></author><author><style face="normal" font="default" size="100%">Romeli Barbosa</style></author><author><style face="normal" font="default" size="100%">Chan Freddy</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">PEAL: Power Efficient and Adaptive LatencyHierarchical Routing Protocol for Cluster-Based WSN</style></title><secondary-title><style face="normal" font="default" size="100%">Wireless Personal Communications </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">96</style></volume><pages><style face="normal" font="default" size="100%">4929–4945</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In wireless sensor networks, one of the most important constraints is the low power consumption requirement. For that reason, several hierarchical or cluster-based routing methods have been proposed to provide an efficient way to save energy during communication. However, their main challenge is to have efficient mechanisms to achieve the trade-off between increasing the network lifetime and accomplishing acceptable transmission latency. In this paper, we propose a novel protocol for cluster-based wireless sensor networks called PEAL (Power Efficient and Adaptive Latency). Our simulation results show that PEAL can extend the network lifetime about 47% compared to the classic protocol LEACH (Low-Energy Adaptive Clustering Hierarchy) and introduces an acceptable transmission latency compared to the energy conservation gain.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">7</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tahar MEKHAZNIA</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Genetic algorithm for attack of image encryption scheme based chaotic map</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Information Technology for Organizations Development (IT4OD)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mohamed-Abderraouf Ferradji</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Collaborative Learning Environment of the Medical Diagnosis on the Basis of the Clinical Reasoning Theory</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Information and Communication Technologies for Ageing Well and e-Health					</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">SAHRAOUI Soumia</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><pub-location><style face="normal" font="default" size="100%">Constantine, Algérie </style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maamar Sedrati</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Adapting TCP protocol for wireless networks</style></title><secondary-title><style face="normal" font="default" size="100%"> International Conference on Computer Science’s Complex Systems and their Applications (ICCSA'2016)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><pub-location><style face="normal" font="default" size="100%">Oum El Bouaghi, Algeria</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sabrina Boubiche</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Bilami Azzedine</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Integrating Big data paradigm in WSNs</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the International Conference on Big Data and Advanced Wireless Technologies (BDAW '16)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	WSNs consist of large number of small sensors densely deployed to monitor a phenomenon. Most of the data generated from the WSNs represent events happening at time intervals. Sometimes and according to the nature of the applications, this data stream is continuous and can reach high speeds. Therefore, adopting new techniques, platforms and tools to deal with this large amount of sensory data became necessary. Therefore, the Big Data paradigm can represent a good solution for the extraction, analysis, viewing, sharing, storage and transfer of such volume of data. This paper presents a survey on integrating Big Data tools for gathering, storing and analyzing the data generated by WSNs.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Sabrina Boubiche</style></author><author><style face="normal" font="default" size="100%">Azeddine Bilami</style></author><author><style face="normal" font="default" size="100%">Homero Toral-Cruz</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Toward Adaptive Data Aggregation Protocols in Wireless Sensor Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the International Conference on Internet of things and Cloud Computing(ICC '16)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Data aggregation has emerged as a basic concept in wireless sensor networks. By combining data and eliminating redundancy, this concept showed its effectiveness in terms of reducing resources consumption. The data aggregation problem is not new and has been widely studied in wireless sensor networks. However, most of the proposed solutions are based on a static data aggregation scheme and do not consider the network constraints evolution such as energy bandwidth, overhead and transmission delay. To dynamically optimize the tradeoff between the data aggregation process and the network constraints, a new paradigm has been introduced recently named the feedback control system. The main idea is to adapt the data aggregation degree to the environment changes and the sensor network applications. The feedback control for data aggregation remains relatively a new research area and only few works have introduced this concept. Therefore this work points out this research field by surveying the different existing protocols.
&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sedrati Maamar</style></author><author><style face="normal" font="default" size="100%">Taleb hafnaoui</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Impact of routing protocols on the quality of transmission for video streaming</style></title><secondary-title><style face="normal" font="default" size="100%"> Proceedings of the International Conference on Internet of things and Cloud Computing(ICC '16)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Mobile ad hoc networks are characterized by infrastructure less, dynamic topology, without any centralized administration, and limited resources witch make more difficult the stream of multimedia applications over wireless networks. Providing Quality of Service for video streaming is an important challenge. In this paper, firstly, we have reviewed many issues and different coding techniques for video streaming over MANET and secondly we propose to study two routing protocols (AODV and DSDV) to evaluate witch of them can improve QoS for real-time multimedia applications. Results show that AODV protocol performs better than DSDV in terms of throughput and network load with high mobility, but roles are reversed in terms of bit rate, loss rate and network load for large-scale networks.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Larbi Guezouli</style></author><author><style face="normal" font="default" size="100%">Imane Azzouz</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">ENHANCEMENT OF THE FUSION OF INCOMPATIBLE LISTS OF RESULTS</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Digital Information and Wireless Communications (IJDIWC) </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">78-86</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	This work is located in the domain of distributed information retrieval (DIR). A simplified view of the DIR requires a multi-search in a set of collections, which forces the system to analyze results found in these collections, and merge results back before sending them to the user in a single list. Our work is to find a fusion method based on the relevance score of each result received from collections and the relevance of the local search engine of each collection, which is the main issue of our work.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sara Benhamouda</style></author><author><style face="normal" font="default" size="100%">Larbi Guezouli</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Selection of Relevant Servers in Distributed Information Retrieval System</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Computer and Information Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">10</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Nowadays, the dissemination of information touches the distributed world, where selecting the relevant servers to a user request is an important problem in distributed information retrieval. During the last decade, several research studies on this issue have been launched to find optimal solutions and many approaches of collection selection have been proposed. In this paper, we propose a new collection selection approach that takes into consideration the number of documents in a collection that contains terms of the query and the weights of those terms in these documents. We tested our method and our studies show that this technique can compete with other state-of-the-art algorithms that we choose to test the performance of our approach.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">5</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Larbi Guezouli</style></author><author><style face="normal" font="default" size="100%">Hassane Essafi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">SEARCH OF INFORMATION BASED CONTENT IN SEMI-STRUCTURED DOCUMENTS USING INTERFERENCE WAVE</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Computational Science, Information Technology and Control Engineering </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">29-39</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	This paper proposes a semi-structured information retrieval model based on a new method for calculation of similarity. We have developed CASISS (Calculation of Similarity of Semi-Structured documents) method to quantify how two given texts are similar. This new method identifies elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of descriptors for each element, which characterize the contents of elements.It can be used to increase the accuracy of the information retrieval process by taking into account not only the presence of query terms in the given document but also the topology (position continuity) of these terms.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Larbi Guezouli</style></author><author><style face="normal" font="default" size="100%">Hassane Essafi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">CAS-based information retrieval in semi-structured documents: CASISS model</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Innovation in Digital Ecosystems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">155-162</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	&amp;nbsp;
&lt;/p&gt;

&lt;p id=&quot;sp000050&quot;&gt;
	This paper aims to address the assessment the similarity between documents or pieces of documents. For this purpose we have developed CASISS (CAlculation of SImilarity of Semi-Structured documents) method to quantify how two given texts are similar. The method can be employed in wide area of applications including content reuse detection which is a hot and challenging topic. It can be also used to increase the accuracy of the information&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/retrieval-process&quot; title=&quot;Learn more about Retrieval Process from ScienceDirect's AI-generated Topic Pages&quot;&gt;retrieval process&lt;/a&gt;&amp;nbsp;by taking into account not only the presence of query terms in the given document (Content Only search — CO) but also the topology (position continuity) of these terms (based on Content And Structure Search — CAS). Tracking the origin of the information in social media, copy right management,&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/plagiarism-detection&quot; title=&quot;Learn more about Plagiarism Detection from ScienceDirect's AI-generated Topic Pages&quot;&gt;plagiarism detection&lt;/a&gt;, social media mining and monitoring,&amp;nbsp;&lt;a href=&quot;https://www.sciencedirect.com/topics/computer-science/digital-forensics&quot; title=&quot;Learn more about Digital Forensics from ScienceDirect's AI-generated Topic Pages&quot;&gt;digital forensic&lt;/a&gt;&amp;nbsp;are among other applications require tools such as CASISS to measure, with a high accuracy, the content overlap between two documents.
&lt;/p&gt;

&lt;p id=&quot;sp000055&quot;&gt;
	CASISS identify elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of elements descriptors, which characterize the content of the elements.
&lt;/p&gt;

&lt;ul id=&quot;issue-navigation&quot;&gt;
&lt;/ul&gt;

&lt;p style=&quot;text-align: justify;&quot;&gt;
	&amp;nbsp;
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Rafik Hamza</style></author><author><style face="normal" font="default" size="100%">Faiza Titouna</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map</style></title><secondary-title><style face="normal" font="default" size="100%"> Information Security Journal: A Global Perspective  </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">25</style></volume><pages><style face="normal" font="default" size="100%">6</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this article, a novel sensitive encryption scheme to secure the digital images based on the Zaslavsky chaotic map is proposed. We employ the Zaslavsky chaotic map as a pseudo-random generator to produce the key encryption of the proposed image cryptosystem. The cipher structure has been chosen based on permutation-diffusion processes, where we adopt the classic permutation substitution network, which ensures both confusion and diffusion properties for the encrypted image. Our proposed algorithm has high sensitivity in plain image and the secret key. Moreover, the results show that the characteristics of our approach have excellent performance, with high scores (NPRC = 99.61%, UACI = 33.47%, entropy (CipherImage)&amp;nbsp;&lt;img alt=&quot;&quot; data-formula-source=&quot;{&amp;quot;type&amp;quot; : &amp;quot;image&amp;quot;, &amp;quot;src&amp;quot; : &amp;quot;/na101/home/literatum/publisher/tandf/journals/content/uiss20/2016/uiss20.v025.i04-06/19393555.2016.1212954/20161205/images/uiss_a_1212954_ilm0001.gif&amp;quot;}&quot; src=&quot;https://www.tandfonline.com/na101/home/literatum/publisher/tandf/journals/content/uiss20/2016/uiss20.v025.i04-06/19393555.2016.1212954/20161205/images/uiss_a_1212954_ilm0001.gif&quot;&gt;&amp;nbsp;8, and correlation coefficient&amp;nbsp;&lt;img alt=&quot;&quot; data-formula-source=&quot;{&amp;quot;type&amp;quot; : &amp;quot;image&amp;quot;, &amp;quot;src&amp;quot; : &amp;quot;/na101/home/literatum/publisher/tandf/journals/content/uiss20/2016/uiss20.v025.i04-06/19393555.2016.1212954/20161205/images/uiss_a_1212954_ilm0002.gif&amp;quot;}&quot; src=&quot;https://www.tandfonline.com/na101/home/literatum/publisher/tandf/journals/content/uiss20/2016/uiss20.v025.i04-06/19393555.2016.1212954/20161205/images/uiss_a_1212954_ilm0002.gif&quot;&gt;&amp;nbsp;0). Experimental results have been studied and analyzed in detail with various types of security analysis. These results demonstrate that our proposed cryptosystem has highly satisfactory security performance and can withstand various attacks compared to state-of-the-art methods.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mohamed Abderraouf Ferradji</style></author><author><style face="normal" font="default" size="100%">Abdelmadjid Zidani</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Collaborative Environment for Remote Clinical Reasoning Learning</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of E-Health and Medical Communications (IJEHMC)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">7</style></volume><pages><style face="normal" font="default" size="100%">20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Despite the significant advances achieved these recent last years in terms of technologies widespread use in medical education, clinical reasoning learning (CRL) remains an extremely hard task in which there are still many gray areas that should be enlightened to better understand it. Furthermore, while CRL is basically a collaborative task implying the participation of many students and tutors working simultaneously on a same case, it should be considered from a social perspective. The authors followed then a collaborative-based learning approach, which consists in designing a shared workspace to support collaboration and enable social clinical knowledge acquisition. They started with a deep analysis of the CRL process in order to understand the usual way under which students learn together and then, highlight the vital collaborative learning tasks that need to be supported. The resulting designed model allowed us to shift towards Collaborative CRL (CCRL).
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Sabrina Boubiche</style></author><author><style face="normal" font="default" size="100%">Homero Toral-Cruz</style></author><author><style face="normal" font="default" size="100%">Al-Sakib Khan Pathan</style></author><author><style face="normal" font="default" size="100%">Azzedine Bilami</style></author><author><style face="normal" font="default" size="100%">Samir Athmani</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs</style></title><secondary-title><style face="normal" font="default" size="100%">Telecommunication Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">62</style></volume><pages><style face="normal" font="default" size="100%">277–288</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Sabrina Boubiche</style></author><author><style face="normal" font="default" size="100%">Djallel Eddine Boubiche</style></author><author><style face="normal" font="default" size="100%">Azzedine Bilami</style></author><author><style face="normal" font="default" size="100%">Homero Toral-Cruz</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Sensors</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%"> 525</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.&amp;nbsp;
&lt;/p&gt;
</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue></record></records></xml>