35 results on '"Laouid, Abdelkader"'
Search Results
2. A comprehensive Review of Floating Photovoltaic Systems: Tech Advances, Marine Environmental Influences on Offshore PV Systems, and Economic Feasibility Analysis
- Author
-
Djalab, Aicha, Djalab, Zohra, El Hammoumi, Aboubakr, Marco TINA, Giuseppe, Motahhir, Saad, and Laouid, Abdelkader Azzeddine
- Published
- 2024
- Full Text
- View/download PDF
3. Rule-Based Arabic Sentiment Analysis using Binary Equilibrium Optimization Algorithm
- Author
-
Rahab, Hichem, Haouassi, Hichem, and Laouid, Abdelkader
- Published
- 2023
- Full Text
- View/download PDF
4. Integrating Homomorphic Encryption in IoT Healthcare Blockchain Systems.
- Author
-
Aissaoua, Habib, Laouid, Abdelkader, Kara, Mostefa, Bounceur, Ahcène, Hammoudeh, Mohammad, and Chait, Khaled
- Subjects
INTERNET exchange points ,BLOOD sugar ,INTERNET of things ,DATA warehousing ,ENERGY consumption - Abstract
The Internet of Things (IoT) has recently been implemented in various applications. An IoT network is a group of Internet-connected computing devices embedded in everyday objects. Usually, those devices can interact with each other via the Internet by exchanging data. Because of privacy and security requirements, users of IoT-connected objects need measures to secure corresponding data during storage and transmission. This work presents an architecture that integrates IoT devices, blockchain technology, and embedded homomorphic encryption to ensure high computation speed and security levels in IoT systems. The ultralight linear encryption technique enhances computation speed, making it possible to obtain homomorphic addition over the encrypted data. Using this technique, each administrator gains specific access to the encrypted data. Security, stability, traceability, and anonymity are provided through blockchain technology, which is used to store data. The proposed architecture is demonstrated via a use case from the healthcare sector. The experimental analysis shows our technique's effectiveness in energy consumption reduction and privacy preservation with minimal computation and communication costs. By using five fields per record, name, ID, age, gender, and blood glucose level, we achieved an encryption time equals 0,19 ms and decryption time equals 0,98 ms vs. 15,7 and 1,6 respectively in the best comparison technique. In communication cost, we achieved 1KB vs. 5KB. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. An intelligent system for energy management in smart cities based on big data and ontology
- Author
-
Sayah, Zaoui, Kazar, Okba, Lejdel, Brahim, Laouid, Abdelkader, and Ghenabzia, Ahmed
- Published
- 2021
- Full Text
- View/download PDF
6. A Nature-Inspired Partial Distance-Based Clustering Algorithm.
- Author
-
El Habib Kahla, Mohammed, Beggas, Mounir, Laouid, Abdelkader, and Hammoudeh, Mohammad
- Subjects
FISH locomotion ,CLASSIFICATION algorithms ,ARTIFICIAL intelligence ,COLLECTIVE behavior ,HIERARCHICAL clustering (Cluster analysis) - Abstract
In the rapidly advancing landscape of digital technologies, clustering plays a critical role in the domains of artificial intelligence and big data. Clustering is essential for extracting meaningful insights and patterns from large, intricate datasets. Despite the efficacy of traditional clustering techniques in handling diverse data types and sizes, they encounter challenges posed by the increasing volume and dimensionality of data, as well as the complex structures inherent in high-dimensional spaces. This research recognizes the constraints of conventional clustering methods, including sensitivity to initial centroids, dependence on prior knowledge of cluster counts, and scalability issues, particularly in large datasets and Internet of Things implementations. In response to these challenges, we propose a K-level clustering algorithm inspired by the collective behavior of fish locomotion. K-level introduces a novel clustering approach based on greedy merging driven by distances in stages. This iterative process efficiently establishes hierarchical structures without the need for exhaustive computations. K-level gives users enhanced control over computational complexity, enabling them to specify the number of clusters merged simultaneously. This flexibility ensures accurate and efficient hierarchical clustering across diverse data types, offering a scalable solution for processing extensive datasets within a reasonable timeframe. The internal validation metrics, including the Silhouette Score, Davies–Bouldin Index, and Calinski–Harabasz Index, are utilized to evaluate the K-level algorithm across various types of datasets. Additionally, comparisons are made with rivals in the literature, including UPGMA, CLINK, UPGMC, SLINK, and K-means. The experiments and analyses show that the proposed algorithm overcomes many of the limitations of existing clustering methods, presenting scalable and adaptable clustering in the dynamic landscape of evolving data challenges. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. A flexible encryption technique for the internet of things environment
- Author
-
Medileh, Saci, Laouid, Abdelkader, Nagoudi, El Moatez Billah, Euler, Reinhardt, Bounceur, Ahcène, Hammoudeh, Mohammad, AlShaikh, Muath, Eleyan, Amna, and Khashan, Osama Ahmed
- Published
- 2020
- Full Text
- View/download PDF
8. A comparative analysis of adaptive consistency approaches in cloud storage
- Author
-
Khelaifa, Abdennacer, Benharzallah, Saber, Kahloul, Laid, Euler, Reinhardt, Laouid, Abdelkader, and Bounceur, Ahcène
- Published
- 2019
- Full Text
- View/download PDF
9. Intelligent Image Text Detection via Pixel Standard Deviation Representation.
- Author
-
Guia, Sana Sahar, Laouid, Abdelkader, Hammoudeh, Mohammad, and Kara, Mostafa
- Subjects
ARTIFICIAL intelligence ,PIXELS ,STANDARD deviations ,MACHINE learning ,DATA analysis - Abstract
Artificial intelligence has been involved in several domains. Despite the advantages of using artificial intelligence techniques, some crucial limitations prevent them from being implemented in specific domains and locations. The accuracy, poor quality of gathered data, and processing time are considered major concerns in implementing machine learning techniques, certainly in low-end smart devices. This paper aims to introduce a novel pre-treatment technique dedicated to image text detection that uses the images' pixel divergence and similarity to reduce the image size. Mitigating the image size while keeping its features improves the model training time with an acceptable accuracy rate. The mitigation is reached by gathering similar image pixels in one pixel based on calculated values of the standard deviation σ, where we consider that two pixels are similar if they have approximately the same σ values. The work proposes a new pipeline approach that reduces the size of the image in the input and intermediate layers of a deep learning model based on merged pixels using standard deviation values instead of the whole image. The experimental results prove that this technique significantly improves the performance of existing text detection methods, particularly in challenging scenarios such as using low-end IoT devices that offer low contrast or noisy backgrounds. Compared with other techniques, the proposed technique can potentially be exploited for text detection in IoT-gathered multimedia data with reasonable accuracy in a short computation time. Evaluation of the MSRA-TD500 dataset demonstrates the remarkable performance of our approach, Standard Deviation Network (σNet), with precision and recall values of 93.8% and 85.6%, respectively, that outperform recent research results. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications.
- Author
-
Kebache, Romaissa, Laouid, Abdelkader, Bounceur, Ahcene, Kara, Mostefa, Karampidis, Konstantinos, Papadourakis, Giorgos, and Hammoudeh, Mohammad
- Subjects
DATA encryption ,INTERNET of things ,CLOUD computing ,DISEASE management ,PRIVACY - Abstract
Internet cloud services come at a price, especially when they provide top-tier security measures. The cost incurred by cloud utilization is directly proportional to the storage requirements. Companies are always looking to increase profits and reduce costs while preserving the security of their data by encrypting them. One of the offered solutions is to find an efficient encryption method that can store data in a much smaller space than traditional encryption techniques. This article introduces a novel encryption approach centered on consolidating information into a single ciphertext by implementing Multi-Key Embedded Encryption (MKEE). The effectiveness of MKEE scales in tandem with the volume of information encapsulated within the ciphertext. MKEE substantially reduced the size of the ciphertext, achieving an 88% decrease when incorporating ten plaintext values. To further reduce the size of the ciphertext in our proposal, a Modular Multiplicative Inverse method (MMI) is introduced. MMI experiments were conducted, demonstrating that we achieved a commendable 50% reduction in the ciphertext size. To validate the practicality of the proposed method, a case study was conducted on a diabetes dataset. By integrating MKEE and MMI, this study showed a data storage reduction of 94%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. The Impact of Robotic Automation on Industrial and Productive Enterprises in Achieving Entrepreneurship.
- Author
-
Djalab, Zohra, Djalab, Aicha, Laouid, Abdelkader Azzeddine, Said, Ali Naas, and Abdelli, Mohammed El Amine
- Subjects
ROBOTICS ,AUTOMATION ,ENTREPRENEURSHIP ,MANUFACTURING industries ,EMPLOYMENT - Abstract
A corporation or company's production velocity and efficiency are essential. It is necessary to use robotic automation to create a successful organization in a competitive business environment. Recent investments have been made in robots across a wider range of manufacturing sectors. In this era of industry, recent advances in robotics technology are dramatically transforming the business and entrepreneurial landscape. Today, robotics is already well established in many areas of our professional, personal, and even daily lives. This technology can develop and modernize commercial processes, innovative ideas, services, and products and solve complex tasks by producing new results for the massive growth of entrepreneurial activities. This study aims to outline the significance of the impact of investment in robotic automation on business performance and employment at the enterprise level and its further perspectives. Following the review of the most important international articles on exploiting this technology, we conducted a brief study on an Algerian factory to learn about the level of use of robotics technology and its future prospects. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. A dynamic skyline technique for a context-aware selection of the best sensors in an IoT architecture
- Author
-
Kertiou, Ismail, Benharzallah, Saber, Kahloul, Laid, Beggas, Mounir, Euler, Reinhardt, Laouid, Abdelkader, and Bounceur, Ahcène
- Published
- 2018
- Full Text
- View/download PDF
13. A self-managing volatile key scheme for wireless sensor networks
- Author
-
Laouid, Abdelkader, Dahmani, Abdelnasser, Hassen, Hani Ragab, Bounceur, Ahcène, Euler, Reinhardt, Lalem, Farid, and Tari, Abdelkamel
- Published
- 2019
- Full Text
- View/download PDF
14. A distributed multi-path routing algorithm to balance energy consumption in wireless sensor networks
- Author
-
Laouid, Abdelkader, Dahmani, Abdelnasser, Bounceur, Ahcène, Euler, Reinhardt, Lalem, Farid, and Tari, Abdelkamel
- Published
- 2017
- Full Text
- View/download PDF
15. D-LPCN: A distributed least polar-angle connected node algorithm for finding the boundary of a wireless sensor network
- Author
-
Saoudi, Massinissa, Lalem, Farid, Bounceur, Ahcène, Euler, Reinhardt, Kechadi, M-Tahar, Laouid, Abdelkader, Bezoui, Madani, and Sevaux, Marc
- Published
- 2017
- Full Text
- View/download PDF
16. A Secure Multi-Agent-Based Decision Model Using a Consensus Mechanism for Intelligent Manufacturing Tasks †.
- Author
-
Kara, Mostefa, Laouid, Abdelkader, Hammoudeh, Mohammad, Karampidis, Konstantinos, Papadourakis, Giorgos, and Bounceur, Ahcène
- Subjects
MULTIAGENT systems ,DECISION support systems ,PRODUCTION planning ,PRODUCTION control ,SUPPLY chain management - Abstract
Multi-agent systems (MASs) have gained a lot of interest recently, due to their ability to solve problems that are difficult or even impossible for an individual agent. However, an important procedure that needs attention in designing multi-agent systems, and consequently applications that utilize MASs, is achieving a fair agreement between the involved agents. Researchers try to prevent agreement manipulation by utilizing decentralized control and strategic voting. Moreover, emphasis is given to local decision making and perception of events occurring locally. This manuscript presents a novel secure decision-support algorithm in a multi-agent system that aims to ensure the system's robustness and credibility. The proposed consensus-based model can be applied to production planning and control, supply chain management, and product design and development. The algorithm considers an open system; i.e., the number of agents present can be variable in each procedure. While a group of agents can make different decisions during a task, the algorithm chooses one of these decisions in a way that is logical, safe, efficient, fast, and is not influenced by factors that might affect production. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments.
- Author
-
Kertiou, Ismail, Laouid, Abdelkader, Saber, Benharzallah, Hammoudeh, Mohammad, and Alshaikh, Muath
- Subjects
ROUTING algorithms ,AGGREGATION operators ,WIRELESS sensor networks ,TELECOMMUNICATION systems ,INTERNET of things ,HEALTH care industry - Abstract
The integration of Internet of Things (IoT) technologies, particularly the Internet of Medical Things (IoMT), with wireless sensor networks (WSNs) has revolutionized the healthcare industry. However, despite the undeniable benefits of WSNs, their limited communication capabilities and network congestion have emerged as critical challenges in the context of healthcare applications. This research addresses these challenges through a dynamic and on-demand route-finding protocol called P2P-IoMT, based on LOADng for point-to-point routing in IoMT. To reduce congestion, dynamic composite routing metrics allow nodes to select the optimal parent based on the application requirements during the routing discovery phase. Nodes running the proposed routing protocol use the multi-criteria decision-making Skyline technique for parent selection. Experimental evaluation results show that P2P-IoMT protocol outperforms its best rivals in the literature in terms of residual network energy and packet delivery ratio. The network lifetime is extended by 4% while achieving a comparable packet delivery ratio and communication delay compared to LRRE. These performances are offered on top of the dynamic path selection and configurable route metrics capabilities of P2P-IoMT. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
18. A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity †.
- Author
-
Medileh, Saci, Laouid, Abdelkader, Hammoudeh, Mohammad, Kara, Mostefa, Bejaoui, Tarek, Eleyan, Amna, and Al-Khalidi, Mohammed
- Subjects
- *
DATA integrity , *ADDITION (Mathematics) , *REAL-time control , *IMAGE encryption , *ELECTRONIC data processing , *FAULT tolerance (Engineering) , *CLOUD computing - Abstract
In today's hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time control/monitoring, scalability, fault tolerance, and numerous security services. Hardware and software limitations of IoT devices can be mitigated using the massive on-demand cloud resources. However, IoT cloud-based solutions pose some security and privacy concerns, specifically when an untrusted cloud is used. This calls for strong encryption schemes that allow operations on data in an encrypted format without compromising the encryption. This paper presents an asymmetric multi-key and partially homomorphic encryption scheme. The scheme provides the addition operation by encrypting each decimal digit of the given integer number separately using a special key. In addition, data integrity processes are performed when an untrusted third party performs homomorphic operations on encrypted data. The proposed work considers the most widely known issues like the encrypted data size, slow operations at the hardware level, and high computing costs at the provider level. The size of generated ciphertext is almost equal to the size of the plaintext, and order-preserving is ensured using an asymmetrical encryption version. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques.
- Author
-
Lalem, Farid, Laouid, Abdelkader, Kara, Mostefa, Al-Khalidi, Mohammed, and Eleyan, Amna
- Subjects
DIGITAL signatures ,DATA integrity ,COMPUTATIONAL complexity ,DATA encryption ,FORGERY - Abstract
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove their robustness, but are unsuitable in several domains due to their computational complexity. Other asymmetric encryption schemes have been proposed to provide a cloud homomorphic encryption service, where the researchers focused only on how to ensure the homomorphic property. This paper proposes a new digital signature scheme dedicated to a family of encryption techniques. The proposal consists of two parts: the first focused on the secret key, and the second focused on the public key. Signature validity checking was performed by multiplying these two parts to reform again the sender's public key, then comparing the result with the decrypted message. The validation of the decrypted message guarantees data integrity, where the signer public key is used to ensure authenticity. The proposed scheme takes a shorter execution time for the entire signature operation, including signing and verification, compared to other modern techniques. The analysis showed its robustness against private key recovery and forgery attacks. The implementation results of the proposed scheme showed promising performance in terms of complexity and robustness. The results confirmed that the proposed scheme is efficient and effective for signature generation and verification. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using OTP With a Single Pre-Shared Key.
- Author
-
KARA, MOSTEFA, LAOUID, ABDELKADER, BOUNCEUR, AHCÈNE, HAMMOUDEH, MOHAMMAD, and ALSHAIKH, MUATH
- Subjects
BLOCK ciphers ,CONFIDENTIAL communications ,COMPUTATIONAL complexity ,CRYPTOGRAPHY ,CIPHERS ,PRIVACY - Abstract
Unconditional security means that knowledge of an encrypted text does not provide any information about the corresponding plaintext: or more. regardless of the number of ciphertexts available to an attacker. no amount of cryptanalysis can break the cipher. Until now. only the One-Time Pad (OTP) method meets this condition with well-defined assumptions. The design of a Homomorphic Encryption scheme that allows operations over the encrypted data is required in current applications to reach the highest possible level of privacy. However. existing symmetric solutions that use OTP have a key management problem: they are not linear encryption. which means that they have high computational complexity. and some of them do not meet all homomorphic properties. This article simulates the 0TP taking into consideration these issues and achieving the maximum resistance to cryptanalysis, even when the attacker has great computing power. The first major advantage of the proposed OTP-based method is that it only uses a single pre-shared key, The key is composed of two sections, a fixed number of bits followed by random bits, the size of each section is dependent on the robustness of the system. Analysis of the proposed technique shows that it provides perfect privacy by using a different key for each message to be encrypted. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. Efficient Leader Election in Wireless Sensor and IoT Networks
- Author
-
Euler, Reinhardt, Bounceur, Ahcène, Bezoui, Madani, Hammoudeh, Mohammad, Lagadec, Loïc, Laouid, Abdelkader, Equipe DECIDE (Lab-STICC_DECIDE), Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT), Equipe Software/HArdware and unKnown Environment inteRactions (Lab-STICC_SHAKER), Equipe Hardware ARchitectures and CAD tools (Lab-STICC_ARCAD), École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne), and Euler, Reinhardt
- Subjects
IoT ,Leader Election ,[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] ,Wireless Sensor Network - Abstract
International audience; Leader Election is a classical problem in distributed systems in which one of the processes is chosen to organize a common task. In wireless sensor networks a leader is often a node of minimum or maximum value such as its identifier, remaining battery life, level of trust or its x- or y- coordinate in the plane which allows to start an algorithm to find the network’s boundary. We present and discuss the Dominating Tree Routing algorithm (DoTRo) which starts from local leaders, running as a root, the process of flooding (distributed BFS) to determine a spanning tree of the underlying graph. During this process, the value of the local leader will be routed and if two trees meet, the tree routing the better value will continue its process while the other one will stop. The root of the final spanning tree will be the leader of the network. We conclude with a performance evaluation and some applications.
- Published
- 2021
22. Proof of Chance: A Lightweight Consensus Algorithm for the Internet of Things.
- Author
-
Kara, Mostefa, Laouid, Abdelkader, Hammoudeh, Mohammad, AlShaikh, Muath, and Bounceur, Ahcene
- Abstract
This article is to propose a consensus algorithm, called Proof of Chance (PoCh), which is designed for the industrial Internet of Things (IIoT). The PoCh protocol is designed to be scalable and extensible, with a controllable conformance delay and low hardware and computation requirements. To reach a consensus, PoCh uses chance rather than computing power: “if condition $_{1}$ , I am a candidate; if condition $_{2}$ , I am the miner.” During every consensus iteration, the condition $_{1}$ is updated, and a single miner is chosen using condition $_{2}$. Those conditions are randomized without the node generating any value and without assigning any weight to such value. The fault tolerance of PoCh is $5f/3 + 1$ , meaning that PoCh can successfully achieve consensus as long as more than 40% of nodes are functioning properly, compared to 50% in the Proof of Stake (PoS) protocol. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use case.
- Author
-
Kara, Mostefa, Laouid, Abdelkader, Yagoub, Mohammed Amine, Euler, Reinhardt, Medileh, Saci, Hammoudeh, Mohammad, Eleyan, Amna, and Bounceur, Ahcène
- Subjects
- *
SMART cities , *URBAN growth , *MAGIC , *ELECTRONIC data processing , *CLOUD computing , *MEDICAL care , *PRIVACY - Abstract
Nowadays, cloud computing offers a digital infrastructure for smart city development. Cognitive cities are steadily automating daily urban processes. The ever expanding objective‐driven communities gather and share sensitive data that must be stored securely. Cloud computing offers a suitable platform that allows cognitive smart cities to access and re‐access data to learn from their past to adapt its current behaviour. However, the cloud is an untrusted entity that may expose data when decrypted for processing by systems. In this paper, we treat the issue of encrypted data processing. Often, the data is encrypted prior to transferring it to the cloud, where the cloud must have the data in clear to be able to make calculations which raises security and privacy threats if the cloud is considered untrusted. The scenario of asking users to make the calculations after decrypting the received cloud data and encrypting the obtained results before sending them back to the cloud is not a practical solution in distributed multi‐tenant architectures. Homomorphic encryption allows offers a solution for processing encrypted data. Many existing homomorphic encryption schemes suffer from limitations that hinder their usability. This paper presents an efficient fully homomorphic encryption scheme using twin key encryption and magic number fragmentation. The details of the scheme are presented along with cryptanalytic attacks to assess its effectiveness. The proposed scheme exhibits strong resilience against brute‐force attacks compared to its rivals from the literature. Finally, we illustrate the applicability of the proposed scheme using a cognitive smart city application. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. Co-Simulation of Multiple Vehicle Routing Problem Models.
- Author
-
Guia, Sana Sahar, Laouid, Abdelkader, Hammoudeh, Mohammad, Bounceur, Ahcène, Alfawair, Mai, and Eleyan, Amna
- Subjects
VEHICLE routing problem ,COMPUTATIONAL complexity - Abstract
Complex systems are often designed in a decentralized and open way so that they can operate on heterogeneous entities that communicate with each other. Numerous studies consider the process of components simulation in a complex system as a proven approach to realistically predict the behavior of a complex system or to effectively manage its complexity. The simulation of different complex system components can be coupled via co-simulation to reproduce the behavior emerging from their interaction. On the other hand, multi-agent simulations have been largely implemented in complex system modeling and simulation. Each multi-agent simulator's role is to solve one of the VRP objectives. These simulators interact within a co-simulation platform called MECSYCO, to ensure the integration of the various proposed VRP models. This paper presents the Vehicle Routing Problem (VRP) simulation results in several aspects, where the main goal is to satisfy several client demands. The experiments show the performance of the proposed VRP multi-model and carry out its improvement in terms of computational complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms
- Author
-
Kazar, Okba, Euler, Reinhardt, Yagoub, Mohammed Amine, Laouid, Abdelkader, Bounceur, Ahcène, AlShaikh, Muath, Laboratoire d'Informatique Intelligente (LINFI), Université Mohamed Khider de Biskra (BISKRA), Lab-STICC_UBO_CID_DECIDE, Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), Université d'El-Oued, Université de Brest (UBO), Lab-STICC_UBS_CACS_MOCS, École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT), Institut Mines-Télécom [Paris] (IMT)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-Institut Mines-Télécom [Paris] (IMT)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), and Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)
- Subjects
Cloud computing security ,business.industry ,Computer science ,Homomorphic encryption ,020206 networking & telecommunications ,020207 software engineering ,Cloud computing ,Cryptography ,02 engineering and technology ,Enterprise information security architecture ,Encryption ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,User interface ,business ,Algorithm ,ComputingMilieux_MISCELLANEOUS - Abstract
In last decade, cloud computing has been envisioned as the next generation architecture of Information Technology (IT). This advent motivates the data owners to outsource their complex systems from local sites to the cloud for great flexibility and economic savings. However, the protected data should to be encrypted before outsourcing. The main objective of this paper is to implement properly this approach. The solution must provide an encryption scheme such that the user may maintain some functions such as arithmetic operations, research, update requests and preserving order, i.e., the homomorphism, on the encrypted cloud data. Moreover, even if another tenant can access to the stored data, all the stored data will appear is gibberish to the unknown users. We look to propose a strong solution that combines obfuscation technique for securing user interface, hybrid encryption algorithms for securing transport, communication operations and fully homomorphic encryption approach for securing storage operations. Then, this work is a new security architecture based on multi-agent system for cloud computing communications and storage environment that considers the intelligent various security gaps as much as possible.
- Published
- 2019
- Full Text
- View/download PDF
26. A Compute and Wait in PoW (CW-PoW) Consensus Algorithm for Preserving Energy Consumption.
- Author
-
Kara, Mostefa, Laouid, Abdelkader, AlShaikh, Muath, Hammoudeh, Mohammad, Bounceur, Ahcene, Euler, Reinhardt, Amamra, Abdelfattah, and Laouid, Brahim
- Subjects
DATA integrity ,ALGORITHMS ,ENERGY consumption ,DISTRIBUTED algorithms - Abstract
Several trusted tasks use consensus algorithms to solve agreement challenges. Usually, consensus agreements are used to ensure data integrity and reliability in untrusted environments. In many distributed networking fields, the Proof of Work (PoW) consensus algorithm is commonly used. However, the standard PoW mechanism has two main limitations, where the first is the high power consumption and the second is the 51% attack vulnerability. In this paper, we look to improve the PoW consensus protocol by introducing several proof rounds. Any given consensus node should resolve the game of the current round R o u n d i before participating in the next round R o u n d i + 1 . Any node that resolves the game of R o u n d i can only pass to the next round if a predetermined number of solutions has been found by other nodes. The obtained evaluation results of this technique show significant improvements in terms of energy consumption and robustness against the 51% and Sybil attacks. By fixing the number of processes, we obtained an energy gain rate of 15.63% with five rounds and a gain rate of 19.91% with ten rounds. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
27. A Lightweight Only Receiver Clock Synchronization Technique for Wireless Sensor Networks
- Author
-
Aissaoua, Habib, Bounceur, Ahcène, Aliouat, Makhlouf, Euler, Reinhardt, Laouid, Abdelkader, Lalem, Farid, Université Ferhat-Abbas Sétif 1 [Sétif] (UFAS1), Université de Brest (UBO), Lab-STICC_UBO_CACS_MOCS, Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université de Brest (UBO)-Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT), Lab-STICC_UBO_CID_DECIDE, Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), LIMED Laboratory, University A-Mira of Bejaia (LIMED), Université de Brest (UBO)-Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Bounceur, Ahcène, Institut Mines-Télécom [Paris] (IMT)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-Institut Mines-Télécom [Paris] (IMT)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), and Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-Institut Brestois du Numérique et des Mathématiques (IBNM)
- Subjects
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 2018
28. An Adaptive and Efficient Fully Homomorphic Encryption Technique
- Author
-
Yagoub, Mohamed-Lamine, Bounceur, Ahcène, Kazar, Okba, Laouid, Abdelkader, Euler, Reinhardt, Université de Brest (UBO), Lab-STICC_UBO_CACS_MOCS, Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université de Brest (UBO)-Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT), Laboratoire d'Informatique Intelligente (LINFI), Université Mohamed Khider de Biskra (BISKRA), LIMED Laboratory, University A-Mira of Bejaia (LIMED), Lab-STICC_UBO_CID_DECIDE, Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), Institut Mines-Télécom [Paris] (IMT)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-Institut Mines-Télécom [Paris] (IMT)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), and Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-Institut Brestois du Numérique et des Mathématiques (IBNM)
- Subjects
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 2018
29. A Distributed Security Protocol Designed for the Context of Internet of Things
- Author
-
Laouid, Abdelkader, Muath, Alshaikh, Lalem, Farid, Bounceur, Ahcène, Euler, Reinhardt, Bezoui, Madani, Aissaoua, Habib, LIMED Laboratory, University A-Mira of Bejaia (LIMED), Lab-STICC_UBO_CID_SFIIS, Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), Lab-STICC_UBO_CACS_MOCS, Université de Brest (UBO)-Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO), Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université de Brest (UBO)-Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT), Lab-STICC_UBO_CID_DECIDE, Université M'Hamed Bougara Boumerdes (UMBB), Université Ferhat-Abbas Sétif 1 [Sétif] (UFAS1), Université M'Hamed Bougara Boumerdes, Institut Mines-Télécom [Paris] (IMT)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-Institut Mines-Télécom [Paris] (IMT)-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), and Institut Mines-Télécom [Paris] (IMT)-École Nationale d'Ingénieurs de Brest (ENIB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Centre National de la Recherche Scientifique (CNRS)-Université Bretagne Loire (UBL)-Institut Brestois du Numérique et des Mathématiques (IBNM)
- Subjects
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 2018
30. A multi-objective grey wolf optimizer (GWO)-based multi-layer perceptrons (MLPs) trainer for optimal PMUs placement.
- Author
-
Laouid, Abdelkader Azzeddine, Mohrem, Abdelkrim, and Djalab, Aicha
- Subjects
- *
MULTILAYER perceptrons , *PHASOR measurement , *ELECTRIC power distribution grids - Abstract
Purpose: This paper aims to find the minimum possible number of phasor measurement units (PMUs) to achieve maximum and complete observability of the power system and improve the redundancy of measurements, in normal cases (with and without zero injection bus [ZIB]), and then in conditions of a single PMU failure and outage of a single line. Design/methodology/approach: An efficient approach operates adequately and provides the optimal solutions for the PMUs placement problem. The finest function of optimal PMUs placement (OPP) should be mathematically devised as a problem, and via that, the aim of the OPP problem is to identify the buses of the power system to place the PMU devices to ensure full observability of the system. In this paper, the grey wolf optimizer (GWO) is used for training multi-layer perceptrons (MLPs), which is known as Grey Wolf Optimizer (GWO) based Neural Network ("GW-NN") to place the PMUs in power grids optimally. Findings: Following extensive simulation tests with MATLAB/Simulink, the results obtained for the placement of PMUs provide system measurements with less or at most the same number of PMUs, but with a greater degree of observability than other approaches. Practical implications: The efficiency of the suggested method is tested on the IEEE 14-bus, 24-bus, New England 39-bus and Algerian 114-bus systems. Originality/value: This paper proposes a new method for placing PMUs in the power grids as a multi-objective to reduce the cost and improve the observability of these grids in normal and faulty cases. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
31. A New Algorithm for Finding a Dominating Set in Wireless Sensor and IoT Networks Based on the Wait-Before-Starting Concept
- Author
-
Laouid Abdelkader, Madani Bezoui, Farid Lalem, Reinhardt Euler, Ahcène Bounceur, Laboratoire de Recherche Opérationnelle et Mathématiques de la Décision - LAROMAD (Alger, Algérie), Lab-STICC_UBS_CACS_MOCS, Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (Lab-STICC), École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-École Nationale d'Ingénieurs de Brest (ENIB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Université européenne de Bretagne - European University of Brittany (UEB)-École Nationale Supérieure de Techniques Avancées Bretagne (ENSTA Bretagne)-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), Lab-STICC_UBO_CID_DECIDE, LIMED Laboratory, University A-Mira of Bejaia (LIMED), ANR-14-CE24-0017,PERSEPTEUR,PlateformE viRtuelle 3D pour la Simulation des rEseaux de caPTEURs(2014), Bounceur, Ahcène, and Appel à projets générique - PlateformE viRtuelle 3D pour la Simulation des rEseaux de caPTEURs - - PERSEPTEUR2014 - ANR-14-CE24-0017 - Appel à projets générique - VALID
- Subjects
[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,business.industry ,Computer science ,Wireless ad hoc network ,Node (networking) ,010401 analytical chemistry ,Approximation algorithm ,020206 networking & telecommunications ,02 engineering and technology ,[INFO] Computer Science [cs] ,01 natural sciences ,0104 chemical sciences ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Dominating set ,Distributed algorithm ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science::Networking and Internet Architecture ,Wireless ,[INFO]Computer Science [cs] ,Routing (electronic design automation) ,Cluster analysis ,business ,Wireless sensor network ,Computer network - Abstract
International audience; Finding a dominating set in a Wireless Sensor Network can be used for the clustering or the routing. There is an abundant literature on methods, centralized or distributed, for detecting these sets. In this work, we propose a new distributed algorithm for the search of the nodes forming a dominating set in a wireless sensor network, which uses a new concept called Wait-Before-Starting that allows to each dominating node to declare itself according to the number of its neighbors. The proposed method guarantees the generation of a dominating set with low energy consumption.
- Published
- 2017
32. Optimal PMUs Placement to ensure Power System Observability under Various Contingencies.
- Author
-
LAOUID, Abdelkader Azzeddine, MOHAMMEDI, Ridha Djamal, REZAOUI, Mohamed Mounir, and KOUZOU, Abdellah
- Subjects
PHASOR measurement ,GLOBAL Positioning System ,SEARCH algorithms ,BUS transportation - Abstract
The PMUs are high-precision devices used to monitor the operation of the power system. These devices provide synchronized measurement of AC voltage and current phasors at the same time by the global positioning system (GPS). Due to the high costs of these devices, they cannot be placed on all network buses. Therefore this paper aims to find the lowest possible number of PMUs to ensure a complete observability of the power system and improve the measurement redundancy, During normal cases (with and without ZIBs), Then in conditions of failure of single PMUs and outage of single line, by using gravitational search algorithm (GSA). The suggested GSA has been applied to the IEEE 14-bus, 24-bus, 30-bus, 57-bus, New England 39-bus, and Algerian 114-bus. To check the effectiveness and robustness of this technique, a comparison of results is made with some of the methods recently reported. Comparison results show that the proposed technique has succeeded in significantly reducing the number of PMUs and improving the redundancy of measurements. [ABSTRACT FROM AUTHOR]
- Published
- 2020
33. A Dynamic Multipath Routing Algorithm for Energy Balancing in WSNs
- Author
-
Laouid, Abdelkader, Bounceur, Ahcène, Abdelnasser, Dahmani, Tari, Abdelkamel, Université d'El-Oued, Université de Brest (UBO), Université Abderrahmane Mira [Béjaïa], and Bounceur, Ahcène
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 2016
34. A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks.
- Author
-
Laouid, Abdelkader, Messai, Mohamed-Lamine, Bounceur, Ahcène, Euler, Reinhardt, Dahmani, Abdelnasser, and Tari, Abdelkamel
- Published
- 2016
- Full Text
- View/download PDF
35. A distributed localization protocol for wireless sensor networks.
- Author
-
Laouid, Abdelkader, Moumen, Hamouma, and Chait, Khaled
- Published
- 2013
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.