Skip to main content
Once a company is located on several sites, the communication between these sites would be critical for its activity, regardless of its size. VPN technology allows the connection between these different sites, while giving the user the... more
Once a company is located on several sites, the communication between these sites would be critical for its activity, regardless of its size. VPN technology allows the connection between these different sites, while giving the user the benefit of the security. New Generation VPN technologies allow to create multiple virtual tunnels between various devices in a fast, automatic and dynamic manner. However, existing technologies represent limitations of reliability, which means, the security policy deployed in a domain or a cloud, will be applied on all sorts of traffic whatever its type. This paper proposes a new model of adaptive security that we have called Smart Security Management for New Generation VPN. This model allows to generate security policies in an automatic, intelligent and adapted way to the performances of the transported applications and the network status. That is, if the network is overloaded and the flow to be transported is of real-time type, then generate a policy of medium, low security level or even not secure if the organization allows it in the contract.
Production activities is generating a large amount of data in different types (i.e., text, images), that is not well exploited. This data can be translated easily to knowledge that can help to predict all the risks that can impact the... more
Production activities is generating a large amount of data in different types (i.e., text, images), that is not well exploited. This data can be translated easily to knowledge that can help to predict all the risks that can impact the business, solve problems, promote efficiency of the manufacture to the maximum, make the production more flexible and improving the quality of making smart decisions, however, implementing the Smart Manufacturing(SM) concept provides this opportunity supported by the new generation of the technologies. Internet Of Things (IoT) for more connectivity and getting data in real time, Big Data to store the huge volume of data and Deep Learning algorithms(DL) to learn from the historical and real time data to generate knowledge, that can be used, predict all the risks, problem solving, and better decision-making. In this paper, we will introduce SM and the main technologies to success the implementation, the benefits, and the challenges.
Today, learning methods and approaches are experiencing great development through technology. Among these methods, we found mobile learning. This type of learning is based on mobile learners who learn in many contexts and environments.... more
Today, learning methods and approaches are experiencing great development through technology. Among these methods, we found mobile learning. This type of learning is based on mobile learners who learn in many contexts and environments. Hence the name of context-aware mobile learning systems. In addition, flipped learning is also a new method of learning that consists of inverting the classroom tasks with those done at home. In this paper, we present a context-aware mobile learning approach that provides learners with an adapted course content format. This approach is applied in the context of the flipped classroom.
IP Multimedia Subsystem (IMS) is a standardized Next Generation Network (NGN) architecture, used to provide users access to different services even in case of roaming. Although this architecture is deployed in cellular (mobile) networks,... more
IP Multimedia Subsystem (IMS) is a standardized Next Generation Network (NGN) architecture, used to provide users access to different services even in case of roaming. Although this architecture is deployed in cellular (mobile) networks, the latter represents several limitations, notably in terms of security. To overcome this inadequacy, IPsec protocol can be deployed between user equipment (UE) and Proxy Call Session Control Functions (P-CSCF). This solution has certain limitations in terms of reliability, i.e. the same security policy deployed between UE and P-CSCF will be applied to any type of the client traffic. In other words, if network performances are critical and the security policy deployed requires high processing, the transported traffic of real-time characteristic will suffer from a quality deterioration. In this work, we propose a new approach for the adaptive management of the IPsec protocol for IMS architectures, called Smart Adaptive Security for IMS, an acronym for SAS-IMS.
The world currently has a strong trend towards homogeneous wireless networks, thanks to the mobility service that they offer, unlike wired networks. However, in homogeneous wireless networks several limits are required, like the... more
The world currently has a strong trend towards homogeneous wireless networks, thanks to the mobility service that they offer, unlike wired networks. However, in homogeneous wireless networks several limits are required, like the transition from one network to another. This transition was often accompanied by a short connection failure due to the change of IPv4 addresses. However, in the presence of real-time applications, this network change delay is not accepted. The MIPv6 solution mitigates this deficiency by maintaining the same IPv6 address when moving from one network to another. In this paper, we will study MIPv6, and we will evaluate the Voice over IP (VOIP) performance with its two SIP and H.323 architectures. The study will be performed in a homogeneous 802.11e network in the context of a horizontal handover taking into account the MIPv6 technology. The evaluation criteria are: the call set-up time, the end-to-end delay, the loss rate and the jitter.
Our challenge has two dimensions: social and technological. We want to solve a serious problem that is assessing the air quality in cities. To inform and sensitize people to the air pollution problem, our project will bring the locals in... more
Our challenge has two dimensions: social and technological. We want to solve a serious problem that is assessing the air quality in cities. To inform and sensitize people to the air pollution problem, our project will bring the locals in participatory situation and actor for the improvement of air quality. We hear more and more talk about the Internet of Things, connected objects, or even connected world, or even intelligent home; new concepts that invade the world and enhance our way of life. Internet of Things called the third industrial revolution will profoundly change the lives of people with home automation, health and recreation, energy, distribution and our environment with intelligent cities or transport connected. The collection of information remains a major challenge without the participation of a large group of people or partners. The Crowdsourcing allows obtaining information due to a large group of people by the internet.
The quality of service (QoS) is one of the major concerns for most of the network administrators. However, QoS requires an implementation of policies, which are said to be static. This approach is not flexible with the diversity of users’... more
The quality of service (QoS) is one of the major concerns for most of the network administrators. However, QoS requires an implementation of policies, which are said to be static. This approach is not flexible with the diversity of users’ services and their varying needs in terms of network resources.
Intelligent transport systems offer effective solutions for the management of road, air and sea traffic. Despite their great success, these systems have several constraints and the multiple challenges that are not limited only to the... more
Intelligent transport systems offer effective solutions for the management of road, air and sea traffic. Despite their great success, these systems have several constraints and the multiple challenges that are not limited only to the security of the exchanges but also in the optimization of the routing. Autonomous vessels are currently in the interest of the researchers, several works were dealing with collision avoidance or improved routing. However, few works have been conducted related to the telecommunication between different autonomous vessels or between the same vessels and a centralized management point located in the port using WiMax technology. In this paper, we conduct an evaluation of the performances of inter-vessels communications provided by WiMax technology. The evaluation study was performed using OPNET modeler simulator. The evaluation parameters measures WiMax network performances (Queuing delay and transmission rate), VoIP performances (Jitter, latency, and loss ...
Our challenge has two dimensions: social and technological. We want to solve a serious problem that is assessing the air quality in cities and traffic management according to the air quality indices. To inform and sensitize people to the... more
Our challenge has two dimensions: social and technological. We want to solve a serious problem that is assessing the air quality in cities and traffic management according to the air quality indices. To inform and sensitize people to the air pollution problem, our project will bring the locals in participatory situation and actor for the improvement of air quality by managing the urban traffic. We hear more and more talk about the Internet of Things, connected objects, or even connected world, or even intelligent home; new concepts that invade the world and enhance our way of life. Internet of Things called the third industrial revolution will profoundly change the lives of people with home automation, health and recreation, energy, distribution and our environment with intelligent cities or transport connected. The collection of information remains a major challenge without the participation of a large group of people or partners. The Crowdsourcing allows obtaining information due ...
Companies primarily use tools based on information systems such as ERP, WMS, APS, TMS or other similar existing systems to keep their logistics flows under control. The Internet of Things arrival (IoT) was a revolution in the field of... more
Companies primarily use tools based on information systems such as ERP, WMS, APS, TMS or other similar existing systems to keep their logistics flows under control. The Internet of Things arrival (IoT) was a revolution in the field of Information and Communication Technologies (ICT), with the aim of extracting, transferring, storing, processing and sharing the necessary information at every logistics activity. In addition, for a better collaboration and interoperability improvement in the Supply Chain, it is important to automatically communicate and share each operation related to the logistics flows to the actors involved. In this paper we give a general overview of the use of IoT in the supply Chain Management to ensure the convenience of its activities and that it is thus collaborative and communicative.
The quality of service in heterogeneous wireless networks is increasingly demanded by customers and by Internet access providers. This paper studies and evaluates the impact of quality of service and the improvements induced on... more
The quality of service in heterogeneous wireless networks is increasingly demanded by customers and by Internet access providers. This paper studies and evaluates the impact of quality of service and the improvements induced on web-oriented services. The heterogeneous wireless networks studied in this paper are: 802.11e and 802.16e. Several scientific research work has been conducted evaluating the performance of heterogeneous wireless networks taking into account the quality of service. According to our research, no work has been done taking into account the convergence of two networks with mobility constraints. This study carried out under OPNET Modeler 14.5, varying the 802.11e QoS mechanisms (DCF, PCF, HCCA, EDCA) and 802.16e (Best Effort, nRTPS). The criteria of evaluation are: TCP delay, TCP retransmission count, HTTP Response and Database Page Response Time.
Communicate anywhere and at any time is a requirement of great importance for mobile users. Future mobile networks will consist of a set of heterogeneous systems where the user can access multiple networks at the same time and be able to... more
Communicate anywhere and at any time is a requirement of great importance for mobile users. Future mobile networks will consist of a set of heterogeneous systems where the user can access multiple networks at the same time and be able to enjoy a seamless transfer between multiple access network technologies. Fundamentally, the vertical handover (VHO) will be the essential part in a heterogeneous network for future generations. In this article, we propose an overview on the process, types and bases of a vertical handover. We also present a summary of the criteria for choosing a vertical handover. We focus on the description of the standard IEEE 802.21, to highlight the services and the basic functions to ensure the management of vertical handover process.