Publications

2016
MEKHAZNIA T. Genetic algorithm for attack of image encryption scheme based chaotic map. International Conference on Information Technology for Organizations Development (IT4OD). 2016.
Ferradji M-A. A Collaborative Learning Environment of the Medical Diagnosis on the Basis of the Clinical Reasoning Theory. International Conference on Information and Communication Technologies for Ageing Well and e-Health . 2016.
Soumia SAHRAOUI. Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things. 2016.
Sedrati M. Adapting TCP protocol for wireless networks. International Conference on Computer Science’s Complex Systems and their Applications (ICCSA'2016). 2016.
Boubiche S, Boubiche DE, Azzedine B. Integrating Big data paradigm in WSNs. Proceedings of the International Conference on Big Data and Advanced Wireless Technologies (BDAW '16). 2016.Abstract

WSNs consist of large number of small sensors densely deployed to monitor a phenomenon. Most of the data generated from the WSNs represent events happening at time intervals. Sometimes and according to the nature of the applications, this data stream is continuous and can reach high speeds. Therefore, adopting new techniques, platforms and tools to deal with this large amount of sensory data became necessary. Therefore, the Big Data paradigm can represent a good solution for the extraction, analysis, viewing, sharing, storage and transfer of such volume of data. This paper presents a survey on integrating Big Data tools for gathering, storing and analyzing the data generated by WSNs.

Boubiche DE, Boubiche S, Bilami A, Toral-Cruz H. Toward Adaptive Data Aggregation Protocols in Wireless Sensor Networks. Proceedings of the International Conference on Internet of things and Cloud Computing(ICC '16). 2016.Abstract

Data aggregation has emerged as a basic concept in wireless sensor networks. By combining data and eliminating redundancy, this concept showed its effectiveness in terms of reducing resources consumption. The data aggregation problem is not new and has been widely studied in wireless sensor networks. However, most of the proposed solutions are based on a static data aggregation scheme and do not consider the network constraints evolution such as energy bandwidth, overhead and transmission delay. To dynamically optimize the tradeoff between the data aggregation process and the network constraints, a new paradigm has been introduced recently named the feedback control system. The main idea is to adapt the data aggregation degree to the environment changes and the sensor network applications. The feedback control for data aggregation remains relatively a new research area and only few works have introduced this concept. Therefore this work points out this research field by surveying the different existing protocols.

Maamar S, hafnaoui T. Impact of routing protocols on the quality of transmission for video streaming. Proceedings of the International Conference on Internet of things and Cloud Computing(ICC '16). 2016.Abstract
Mobile ad hoc networks are characterized by infrastructure less, dynamic topology, without any centralized administration, and limited resources witch make more difficult the stream of multimedia applications over wireless networks. Providing Quality of Service for video streaming is an important challenge. In this paper, firstly, we have reviewed many issues and different coding techniques for video streaming over MANET and secondly we propose to study two routing protocols (AODV and DSDV) to evaluate witch of them can improve QoS for real-time multimedia applications. Results show that AODV protocol performs better than DSDV in terms of throughput and network load with high mobility, but roles are reversed in terms of bit rate, loss rate and network load for large-scale networks.
Guezouli L, Azzouz I. ENHANCEMENT OF THE FUSION OF INCOMPATIBLE LISTS OF RESULTS. International Journal of Digital Information and Wireless Communications (IJDIWC) . 2016;6 (2) :78-86.Abstract

This work is located in the domain of distributed information retrieval (DIR). A simplified view of the DIR requires a multi-search in a set of collections, which forces the system to analyze results found in these collections, and merge results back before sending them to the user in a single list. Our work is to find a fusion method based on the relevance score of each result received from collections and the relevance of the local search engine of each collection, which is the main issue of our work.

Benhamouda S, Guezouli L. Selection of Relevant Servers in Distributed Information Retrieval System. International Journal of Computer and Information Engineering. 2016;10 (5).Abstract

Nowadays, the dissemination of information touches the distributed world, where selecting the relevant servers to a user request is an important problem in distributed information retrieval. During the last decade, several research studies on this issue have been launched to find optimal solutions and many approaches of collection selection have been proposed. In this paper, we propose a new collection selection approach that takes into consideration the number of documents in a collection that contains terms of the query and the weights of those terms in these documents. We tested our method and our studies show that this technique can compete with other state-of-the-art algorithms that we choose to test the performance of our approach.

Guezouli L, Essafi H. SEARCH OF INFORMATION BASED CONTENT IN SEMI-STRUCTURED DOCUMENTS USING INTERFERENCE WAVE. International Journal of Computational Science, Information Technology and Control Engineering . 2016;3 (3) :29-39.Abstract

This paper proposes a semi-structured information retrieval model based on a new method for calculation of similarity. We have developed CASISS (Calculation of Similarity of Semi-Structured documents) method to quantify how two given texts are similar. This new method identifies elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of descriptors for each element, which characterize the contents of elements.It can be used to increase the accuracy of the information retrieval process by taking into account not only the presence of query terms in the given document but also the topology (position continuity) of these terms.

Guezouli L, Essafi H. CAS-based information retrieval in semi-structured documents: CASISS model. Journal of Innovation in Digital Ecosystems. 2016;3 (2) :155-162.Abstract

 

This paper aims to address the assessment the similarity between documents or pieces of documents. For this purpose we have developed CASISS (CAlculation of SImilarity of Semi-Structured documents) method to quantify how two given texts are similar. The method can be employed in wide area of applications including content reuse detection which is a hot and challenging topic. It can be also used to increase the accuracy of the information retrieval process by taking into account not only the presence of query terms in the given document (Content Only search — CO) but also the topology (position continuity) of these terms (based on Content And Structure Search — CAS). Tracking the origin of the information in social media, copy right management, plagiarism detection, social media mining and monitoring, digital forensic are among other applications require tools such as CASISS to measure, with a high accuracy, the content overlap between two documents.

CASISS identify elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of elements descriptors, which characterize the content of the elements.

 

Hamza R, Titouna F. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective . 2016;25 (4) :6.Abstract

In this article, a novel sensitive encryption scheme to secure the digital images based on the Zaslavsky chaotic map is proposed. We employ the Zaslavsky chaotic map as a pseudo-random generator to produce the key encryption of the proposed image cryptosystem. The cipher structure has been chosen based on permutation-diffusion processes, where we adopt the classic permutation substitution network, which ensures both confusion and diffusion properties for the encrypted image. Our proposed algorithm has high sensitivity in plain image and the secret key. Moreover, the results show that the characteristics of our approach have excellent performance, with high scores (NPRC = 99.61%, UACI = 33.47%, entropy (CipherImage)  8, and correlation coefficient  0). Experimental results have been studied and analyzed in detail with various types of security analysis. These results demonstrate that our proposed cryptosystem has highly satisfactory security performance and can withstand various attacks compared to state-of-the-art methods.

Ferradji MA, Zidani A. Collaborative Environment for Remote Clinical Reasoning Learning. International Journal of E-Health and Medical Communications (IJEHMC). 2016;7 (4) :20.Abstract

Despite the significant advances achieved these recent last years in terms of technologies widespread use in medical education, clinical reasoning learning (CRL) remains an extremely hard task in which there are still many gray areas that should be enlightened to better understand it. Furthermore, while CRL is basically a collaborative task implying the participation of many students and tutors working simultaneously on a same case, it should be considered from a social perspective. The authors followed then a collaborative-based learning approach, which consists in designing a shared workspace to support collaboration and enable social clinical knowledge acquisition. They started with a deep analysis of the CRL process in order to understand the usual way under which students learn together and then, highlight the vital collaborative learning tasks that need to be supported. The resulting designed model allowed us to shift towards Collaborative CRL (CCRL).

Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, Athmani S. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication Systems. 2016;62 (2) :277–288.Abstract

Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.

Boubiche S, Boubiche DE, Bilami A, Toral-Cruz H. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks. Sensors. 2016;16 (4) : 525.Abstract

Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. 

Pages