2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017
Schroedinger Eigenmap Projections (SEP) is a well-established dimensionality reduction technique ... more Schroedinger Eigenmap Projections (SEP) is a well-established dimensionality reduction technique for hyperspectral images; it is the linear approximation of Schroedinger Eigenmap (SE) method indeed. The SEP approach is based on Locality Preserving Projections (LPP) algorithm in which the adjacency graph is created in advance without taking in consideration the number of data points in ground objects. This is can negatively affect on hyperspectral reduction and classification process. In this paper, to resolve the problem, we adopted a variant of LPP termed modified LPP (MLPP) instead of original LPP. MLPP adopts an adaptive strategy to create the adjacency graph in which the number of neighbors for each data point can be chosen adaptively. The proposed feature extraction technique uses the Schroedinger operator in the MLPP framework. Indian Pines scene was used for this study. The classification results show effective classification accuracies according to the SEP and other dimensio...
Journal of Computational and Theoretical Nanoscience
The IEEE 802.15.6 standard is become an essential wireless access technology for the WBAN network... more The IEEE 802.15.6 standard is become an essential wireless access technology for the WBAN networks, with an objective to adapt wireless communications to the recent applications. This paper proposes an improvement of the well known CSMA/CA procedure with an idea to give a new size of its contention window length. Simulation results show that, compared with standard IEEE 802.15.6, the delay time, packet loss rate of the improved CSMA/CA are be significantly reduced.
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), 2021
For better supply chain management, it is necessary to think about better managing its cost sourc... more For better supply chain management, it is necessary to think about better managing its cost sources. Inventory is considered the most important element of the supply chain that generates the different logistics costs, mainly the inventory holding cost and the transportation cost. One of the most widely used models to jointly solve these two problems is the Inventory Routing Problem (IRP), which will be the focus of this study. The proposed model in this work deals with a two-tier supply network. The first level contains the supplier with a single vehicle to serve a set of customers with a deterministic and periodic demand that are located at the second level. Our work consists in studying the effect of the increase of the replenishment lead time on the different logistic costs. In addition, we introduced the Lateral Transshipment (LT) technique as an option for inventory transfer if it is economical. New mathematical models corresponding to the above-mentioned problems have been developed and solved by an exact method. The obtained results show that the variation of the replenishment lead time leads to an increase of the different logistics costs and that LT can improve the total network cost and balance the customers' inventory level.
Lecture Notes in Business Information Processing, 2018
Business Process modelling is a key element in the management of organizations. It allows to buil... more Business Process modelling is a key element in the management of organizations. It allows to build an analytical representation of ‘as-is’ processes in an organization and compared it with ‘to-be’ processes for improving their efficiency. Besides, although, risk is an element that can affect business process negatively, it is still managed independently. A necessary link is missing between business process and risk models. To better manage risk related to business process, it should be integrated and evaluated dynamically within the business process models. Currently, there are different meta-models allowing business process modelling. Nevertheless, there are few meta-models allowing risk modelling and even fewer ones that integrate both concepts related to risks and business processes. Based on this need and these observations, we propose, in this work, a risk-aware business process modelling tool using the ADOxx meta-modelling platform.
2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), 2018
The Internet of things (IoT) is defined as connected devices that can communicate with consumers,... more The Internet of things (IoT) is defined as connected devices that can communicate with consumers, transmit data back to companies, and compile data for third parties such as researchers, health care providers, or even other consumers [1]. Wireless Body Area Networks (WBAN) is an emerging category of IoT where the QoS is key to the functioning and performance of the network. In WBAN applications are very sensitive and need mechanisms to respect the requirement of their sensed data. IEEE 802.15.6 [2] - is a BAN management protocol that provides mechanisms for multiple accesses to shared medium - supported QoS-based channel access models. In this paper we focus on CSMA/CA and slotted Aloha algorithms. These two algorithms are compared in terms of delay performance and total drop throughout. The simulation results are clearly showing that under heavily-loaded network conditions both algorithms is underperforming with respect to various QoS parameters. Most importantly, our simulations have proven that CSMA/CA provides shorter end-to-end delay. This preliminary evaluation suggests that CSMA/CA is more suitable for BAN networks aiming to optimize the communication delay
As an important security measures in Intrusion Detection System (IDS), Data Collection process mo... more As an important security measures in Intrusion Detection System (IDS), Data Collection process monitors data in the network and supports network performance evaluation. Therefore, Data Collection plays an essential and a crucial role in distributed IDSs. Accordingly, the key idea of our proposed approach is to implement an effective and an adaptive data collection mechanism that could enhance the efficiency of the detection and identification of malicious nodes. In addition, we propose an efficient in-depth collection and analysis of data in mobile networks for intrusion detection system based on a uniform set of evaluation criteria. We note that the uncertainty present in the data collected represents a major challenge. Our proposed solution enhances intrusion detection efficiency by tacking into consideration incomplete information about occurring malicious nodes. This paper focuses on Denial of Service (DoS) attack scenarios within labeled datasets and specially the detection of ...
2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017
Efficient and reliable fingerprint matching is crucial for many civilian and forensic application... more Efficient and reliable fingerprint matching is crucial for many civilian and forensic applications. Fingerprints are characterized by large intra-class variations (i.e. variability in different impressions from the same finger). This variability manifests itself by the missing or the displacement of genuine minutiae and the detection of spurious minutiae. Displaced, missing and spurious minutiae make fingerprint matching a very challenging pattern recognition problem.Although significant improvements have been made in minutiae-based matching, most of minutiae matching algorithms lack of robustness with respect to displaced, missing and spurious minutiae [4]. This paper introduces EDT-C, a new fingerprint matcher based on minutiae triplets. The proposed matcher uses an extended form of Delaunay Triangulation that allows to take into account, not only genuine minutiae, but also spurious, displaced and missing ones. EDT-C characterizes minutiae triplets by a set of innovative geometric features that help in tolerating linear and non-linear distortions. Finally, EDT-C includes some optimizations that allows to quickly consolidate local matchings and filter non-matching minutia triplets. Experiments show that EDT-C has a reasonable computational cost and is far more accurate than its main competitors.
The security of the Internet of Things (IoT) is now at the embryonic stage. In fact, unrelenting ... more The security of the Internet of Things (IoT) is now at the embryonic stage. In fact, unrelenting innovation has slowed down the implementation of security and made user privacy an easy target. Through this work, we propose a secure architecture dedicated to an IoT-based drone in a LoRa context. For this purpose, we focused on the drone’s authentication process by deploying an Id-Based Signcryption method and temporary identities.
RESUME : Devant la frequence et l'ampleur des evenements indesirables medicamenteux, les etab... more RESUME : Devant la frequence et l'ampleur des evenements indesirables medicamenteux, les etablissements de sante ont tout interet a mettre en place une demarche de gestion des risques dans le but d'assurer la securite du patient et, en particulier, de diminuer le risque de survenue des Erreurs medicamenteuses (EMs) liees au processus complexe de la Prise En Charge Medicamenteuse (PECM) du patient. Afin de les accompagner dans leurs demarches, nous proposons d'utiliser une methode de gestion integree des risques et des processus. La litterature suggere diverses approches pour representer l'information liee au risque dans les modeles de processus metiers, repertories sous le paradigme « Risk-aware Business Process Management ». La diversite de ces methodes rend difficile le choix du langage et la methode la plus adaptee au besoin d'une gestion efficace. Dans ce papier, nous proposons d'etudier le potentiel de ce paradigme pour la securisation du processus de la...
2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), 2018
The Internet is known for its ability to scale and adapt its routes to every change. These routes... more The Internet is known for its ability to scale and adapt its routes to every change. These routes are made by every Autonomous System (AS) peering with each other as neighbors with the Border Gateway Protocol (BGP). Unfortunately, this amount of trust, between all these Autonomous Systems allowing protocols like the BGP to function properly, is not found in the Physical world between logistic service providers. The Physical Internet, however, with its standardized PI-Containers and Internet-derived protocols, has every promising aspect to face this challenge. We propose in this paper a new routing approach based on the PI-BGP (Physical Internet-Border Gateway Protocol) equivalent of the BGP in the Internet. We developed this new protocol to offer a new perspective to tackle the problem of routing the PI-containers in the Physical Internet.
Frontiers in Artificial Intelligence and Applications, 2021
Vehicle routing problem (VRP) is a hard combinatorial problem. In practice, specificities of conc... more Vehicle routing problem (VRP) is a hard combinatorial problem. In practice, specificities of concepts (vehicles and networks transportation) related to VRP must be explicitly considered in modeling to obtain accurate cost and feasible solutions. Each of these concepts is represented in literature for a specific purpose. In this study, we present an ontology for modeling VRP as a unified representation based on road and vehicle classification. The approach proposed aims at providing decision-makers in transport companies a consistent understanding of the field based on ontology. Moreover, it aims at generating parameters of classification of VRPs, and at facilitating later on solving these problems, in the academic or industrial context.
In a supply chain, inventory is the single largest source of costs for a company. This is due to ... more In a supply chain, inventory is the single largest source of costs for a company. This is due to the various physical and informational activities that accompany inventory management, primarily the holding and transportation of inventory. Companies are looking to streamline these activities and minimize the associated costs. One of the most coveted models to jointly solve these two problems is the Inventory Routing Problem (IRP), which will be the focus of this study. This paper addresses the case of a deterministic replenishment demand in a distribution network consisting of a supplier and a number of customers to be served by a single vehicle over a finite planning horizon. We will first study the impact of increasing supplier lead times on network costs. Then, we will study the effects of the Lateral Transshipment (LT) technique on the overall network cost. A mathematical model is developed and solved by an exact method. The results obtained will show that LT is an effective tool...
Transactions of the Institute of Measurement and Control, 2018
Process monitoring is an integral part of chemical process, required higher product quality and s... more Process monitoring is an integral part of chemical process, required higher product quality and safety operation. Therefore, the objective of this paper is to ensure the suitable functioning and to improve the fault detection performance of conventional kernel Principal Components Analysis (KPCA). Thus, an online Reduced Rank KPCA (OnRR-KPCA) with adaptive model has been developed to monitor a dynamic nonlinear process. The developed method is proposed. Firstly, to extract the useful observations, from large amount of training data registered in normal operating conditions, in order to construct the reduced reference model. Secondly, to monitor the process online and update the reference model if a new useful observation is available and satisfies the condition of independencies between variables in feature space. To demonstrate the effectiveness of the OnRR-KPCA with adaptive model over the conventional KPCA and the RR-KPCA, the fault detection performances are illustrated through ...
2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017
Schroedinger Eigenmap Projections (SEP) is a well-established dimensionality reduction technique ... more Schroedinger Eigenmap Projections (SEP) is a well-established dimensionality reduction technique for hyperspectral images; it is the linear approximation of Schroedinger Eigenmap (SE) method indeed. The SEP approach is based on Locality Preserving Projections (LPP) algorithm in which the adjacency graph is created in advance without taking in consideration the number of data points in ground objects. This is can negatively affect on hyperspectral reduction and classification process. In this paper, to resolve the problem, we adopted a variant of LPP termed modified LPP (MLPP) instead of original LPP. MLPP adopts an adaptive strategy to create the adjacency graph in which the number of neighbors for each data point can be chosen adaptively. The proposed feature extraction technique uses the Schroedinger operator in the MLPP framework. Indian Pines scene was used for this study. The classification results show effective classification accuracies according to the SEP and other dimensio...
Journal of Computational and Theoretical Nanoscience
The IEEE 802.15.6 standard is become an essential wireless access technology for the WBAN network... more The IEEE 802.15.6 standard is become an essential wireless access technology for the WBAN networks, with an objective to adapt wireless communications to the recent applications. This paper proposes an improvement of the well known CSMA/CA procedure with an idea to give a new size of its contention window length. Simulation results show that, compared with standard IEEE 802.15.6, the delay time, packet loss rate of the improved CSMA/CA are be significantly reduced.
2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA), 2021
For better supply chain management, it is necessary to think about better managing its cost sourc... more For better supply chain management, it is necessary to think about better managing its cost sources. Inventory is considered the most important element of the supply chain that generates the different logistics costs, mainly the inventory holding cost and the transportation cost. One of the most widely used models to jointly solve these two problems is the Inventory Routing Problem (IRP), which will be the focus of this study. The proposed model in this work deals with a two-tier supply network. The first level contains the supplier with a single vehicle to serve a set of customers with a deterministic and periodic demand that are located at the second level. Our work consists in studying the effect of the increase of the replenishment lead time on the different logistic costs. In addition, we introduced the Lateral Transshipment (LT) technique as an option for inventory transfer if it is economical. New mathematical models corresponding to the above-mentioned problems have been developed and solved by an exact method. The obtained results show that the variation of the replenishment lead time leads to an increase of the different logistics costs and that LT can improve the total network cost and balance the customers' inventory level.
Lecture Notes in Business Information Processing, 2018
Business Process modelling is a key element in the management of organizations. It allows to buil... more Business Process modelling is a key element in the management of organizations. It allows to build an analytical representation of ‘as-is’ processes in an organization and compared it with ‘to-be’ processes for improving their efficiency. Besides, although, risk is an element that can affect business process negatively, it is still managed independently. A necessary link is missing between business process and risk models. To better manage risk related to business process, it should be integrated and evaluated dynamically within the business process models. Currently, there are different meta-models allowing business process modelling. Nevertheless, there are few meta-models allowing risk modelling and even fewer ones that integrate both concepts related to risks and business processes. Based on this need and these observations, we propose, in this work, a risk-aware business process modelling tool using the ADOxx meta-modelling platform.
2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), 2018
The Internet of things (IoT) is defined as connected devices that can communicate with consumers,... more The Internet of things (IoT) is defined as connected devices that can communicate with consumers, transmit data back to companies, and compile data for third parties such as researchers, health care providers, or even other consumers [1]. Wireless Body Area Networks (WBAN) is an emerging category of IoT where the QoS is key to the functioning and performance of the network. In WBAN applications are very sensitive and need mechanisms to respect the requirement of their sensed data. IEEE 802.15.6 [2] - is a BAN management protocol that provides mechanisms for multiple accesses to shared medium - supported QoS-based channel access models. In this paper we focus on CSMA/CA and slotted Aloha algorithms. These two algorithms are compared in terms of delay performance and total drop throughout. The simulation results are clearly showing that under heavily-loaded network conditions both algorithms is underperforming with respect to various QoS parameters. Most importantly, our simulations have proven that CSMA/CA provides shorter end-to-end delay. This preliminary evaluation suggests that CSMA/CA is more suitable for BAN networks aiming to optimize the communication delay
As an important security measures in Intrusion Detection System (IDS), Data Collection process mo... more As an important security measures in Intrusion Detection System (IDS), Data Collection process monitors data in the network and supports network performance evaluation. Therefore, Data Collection plays an essential and a crucial role in distributed IDSs. Accordingly, the key idea of our proposed approach is to implement an effective and an adaptive data collection mechanism that could enhance the efficiency of the detection and identification of malicious nodes. In addition, we propose an efficient in-depth collection and analysis of data in mobile networks for intrusion detection system based on a uniform set of evaluation criteria. We note that the uncertainty present in the data collected represents a major challenge. Our proposed solution enhances intrusion detection efficiency by tacking into consideration incomplete information about occurring malicious nodes. This paper focuses on Denial of Service (DoS) attack scenarios within labeled datasets and specially the detection of ...
2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017
Efficient and reliable fingerprint matching is crucial for many civilian and forensic application... more Efficient and reliable fingerprint matching is crucial for many civilian and forensic applications. Fingerprints are characterized by large intra-class variations (i.e. variability in different impressions from the same finger). This variability manifests itself by the missing or the displacement of genuine minutiae and the detection of spurious minutiae. Displaced, missing and spurious minutiae make fingerprint matching a very challenging pattern recognition problem.Although significant improvements have been made in minutiae-based matching, most of minutiae matching algorithms lack of robustness with respect to displaced, missing and spurious minutiae [4]. This paper introduces EDT-C, a new fingerprint matcher based on minutiae triplets. The proposed matcher uses an extended form of Delaunay Triangulation that allows to take into account, not only genuine minutiae, but also spurious, displaced and missing ones. EDT-C characterizes minutiae triplets by a set of innovative geometric features that help in tolerating linear and non-linear distortions. Finally, EDT-C includes some optimizations that allows to quickly consolidate local matchings and filter non-matching minutia triplets. Experiments show that EDT-C has a reasonable computational cost and is far more accurate than its main competitors.
The security of the Internet of Things (IoT) is now at the embryonic stage. In fact, unrelenting ... more The security of the Internet of Things (IoT) is now at the embryonic stage. In fact, unrelenting innovation has slowed down the implementation of security and made user privacy an easy target. Through this work, we propose a secure architecture dedicated to an IoT-based drone in a LoRa context. For this purpose, we focused on the drone’s authentication process by deploying an Id-Based Signcryption method and temporary identities.
RESUME : Devant la frequence et l'ampleur des evenements indesirables medicamenteux, les etab... more RESUME : Devant la frequence et l'ampleur des evenements indesirables medicamenteux, les etablissements de sante ont tout interet a mettre en place une demarche de gestion des risques dans le but d'assurer la securite du patient et, en particulier, de diminuer le risque de survenue des Erreurs medicamenteuses (EMs) liees au processus complexe de la Prise En Charge Medicamenteuse (PECM) du patient. Afin de les accompagner dans leurs demarches, nous proposons d'utiliser une methode de gestion integree des risques et des processus. La litterature suggere diverses approches pour representer l'information liee au risque dans les modeles de processus metiers, repertories sous le paradigme « Risk-aware Business Process Management ». La diversite de ces methodes rend difficile le choix du langage et la methode la plus adaptee au besoin d'une gestion efficace. Dans ce papier, nous proposons d'etudier le potentiel de ce paradigme pour la securisation du processus de la...
2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), 2018
The Internet is known for its ability to scale and adapt its routes to every change. These routes... more The Internet is known for its ability to scale and adapt its routes to every change. These routes are made by every Autonomous System (AS) peering with each other as neighbors with the Border Gateway Protocol (BGP). Unfortunately, this amount of trust, between all these Autonomous Systems allowing protocols like the BGP to function properly, is not found in the Physical world between logistic service providers. The Physical Internet, however, with its standardized PI-Containers and Internet-derived protocols, has every promising aspect to face this challenge. We propose in this paper a new routing approach based on the PI-BGP (Physical Internet-Border Gateway Protocol) equivalent of the BGP in the Internet. We developed this new protocol to offer a new perspective to tackle the problem of routing the PI-containers in the Physical Internet.
Frontiers in Artificial Intelligence and Applications, 2021
Vehicle routing problem (VRP) is a hard combinatorial problem. In practice, specificities of conc... more Vehicle routing problem (VRP) is a hard combinatorial problem. In practice, specificities of concepts (vehicles and networks transportation) related to VRP must be explicitly considered in modeling to obtain accurate cost and feasible solutions. Each of these concepts is represented in literature for a specific purpose. In this study, we present an ontology for modeling VRP as a unified representation based on road and vehicle classification. The approach proposed aims at providing decision-makers in transport companies a consistent understanding of the field based on ontology. Moreover, it aims at generating parameters of classification of VRPs, and at facilitating later on solving these problems, in the academic or industrial context.
In a supply chain, inventory is the single largest source of costs for a company. This is due to ... more In a supply chain, inventory is the single largest source of costs for a company. This is due to the various physical and informational activities that accompany inventory management, primarily the holding and transportation of inventory. Companies are looking to streamline these activities and minimize the associated costs. One of the most coveted models to jointly solve these two problems is the Inventory Routing Problem (IRP), which will be the focus of this study. This paper addresses the case of a deterministic replenishment demand in a distribution network consisting of a supplier and a number of customers to be served by a single vehicle over a finite planning horizon. We will first study the impact of increasing supplier lead times on network costs. Then, we will study the effects of the Lateral Transshipment (LT) technique on the overall network cost. A mathematical model is developed and solved by an exact method. The results obtained will show that LT is an effective tool...
Transactions of the Institute of Measurement and Control, 2018
Process monitoring is an integral part of chemical process, required higher product quality and s... more Process monitoring is an integral part of chemical process, required higher product quality and safety operation. Therefore, the objective of this paper is to ensure the suitable functioning and to improve the fault detection performance of conventional kernel Principal Components Analysis (KPCA). Thus, an online Reduced Rank KPCA (OnRR-KPCA) with adaptive model has been developed to monitor a dynamic nonlinear process. The developed method is proposed. Firstly, to extract the useful observations, from large amount of training data registered in normal operating conditions, in order to construct the reduced reference model. Secondly, to monitor the process online and update the reference model if a new useful observation is available and satisfies the condition of independencies between variables in feature space. To demonstrate the effectiveness of the OnRR-KPCA with adaptive model over the conventional KPCA and the RR-KPCA, the fault detection performances are illustrated through ...
Uploads
Papers by Ouajdi Korbaa