limed-03.jpg

News

Publications internationales

2023


1. A. Brighen, H. Slimani, A. Rezgui and H. Kheddouci. A new distributed graph coloring algorithm for large graphs. Cluster Computing, Mars 2023. https://doi.org/10.1007/s10586-023-03988-x


2. J. Wang, S. Bin Zhou, Y. Li and H. El Bouhissi. From B2B Survivor to SAP's Swallow: SAP Ariba's SuccessInternational Journal of E-Entrepreneurship and Innovation (IJEEI), 2023, vol. 13, no 1, pp. 1-15. https://doi.org/10.4018/IJEEI.315295-15  


3. A. Dabba, A.K. Tari and S. Meftali. A new multi-objective binary Harris Hawks optimization for gene selection in microarray dataJournal of Ambient Intelligence and Humanized Computing, 2023, vol. 14, no 4, pp. 3157-3176. https://doi.org/10.1007/s12652-021-03441-0  


4. S. Mezzah and A. K. Tari. Practical hyperparameters tuning of convolutional neural networks for EEG emotional features classificationIntelligent Systems with Applications, 2023, vol. 18, pp. 200-212.https://doi.org/10.1016/j.iswa.2023.200212


5. A Dabba, A. K. Tari and S. Meftali. A novel grey wolf optimization algorithm based on geometric transformations for gene selection and cancer classificationThe Journal of Supercomputing, 2023, pp.1-33. https://doi.org/10.1007/s11227-023-05643-z


6. O.S. Mazari, A. Sebaa, J. L. Amaro-Mellado and F. Martínez-Álvarez. Creating a homogenized earthquake catalog for Algeria and mapping the main seismic parameters using a geographic information systemJournal of African Earth Sciences, 2023, vol. 201, pp. 104895. https://doi.org/10.1016/j.jafrearsci.2023.104895


7. D. Hadjout, A. Sebaa, J. F. Torres, and F. Martínez-Álvarez. Electricity consumption forecasting with outliers handling based on clustering and deep learning with application to the Algerian marketExpert Systems with Applications, 2023, vol. 227, pp. 120-123. https://doi.org/10.1016/j.eswa.2023.120123


 8. Z. Younsi, K. Amroun, F. Bouarab-Dahmani, S. Bennai. HSJ-Solver: a new method based on GHD for answering conjunctive queries and solving constraint satisfaction problemsApplied Intelligence. Volume 53. Issue 13. Jul 2023. pp 17226–17239 https://doi.org/10.1007/s10489-022-04361-y


9. S. Bennai, K. Amroun, S. Loudni, A. Ouali. An efficient heuristic approach combining maximal itemsets and area measure for compressing voluminous table constraintsThe Journal of Supercomputing. Volume 79, pp 650–676, (2023). https://doi.org/10.48550/arXiv.2203.11208


10. N. Elsakaan, K. Amroun. A novel privacy‑aware global infrastructure for ecological footprint calculator based on the Internet of thingsand blockchain.The Journal of Supercomputing. (2023).  https://doi.org/10.1007/s11227-023-05821-z.


11. N. Elsakaan, K. Amroun. A novel multi-level hybrid load balancing and tasks scheduling algorithm for cloud computing environmentThe Journal of Supercomputing. 2023 https://doi.org/10.21203/rs.3.rs-3088655/v1


12. M. A. Ouamri, M. Azni, D. Singh, W. Almughalles, M. S. A. Muthanna. Request delay and survivability optimization for software defined-wide area networking (SD-WAN) using multi-agent deep reinforcement learningTransactions on Emerging Telecommunications Technologies Volume 34, N°(7), 2023. https://doi.org/10.1002/ett.4776


13. A. Cherifi, M. E. Khanouche, Y. Amirat, Z. Farah. A parallel approach for user-centered QoS-aware services composition in the Internet of ThingsEngineering Applications of Artificial Intelligence. Volume 123, Part B, August 2023, 106277. https://doi.org/10.1016/j.engappai.2023.106277


14. H. Messaoudi, A. Belaid, D.Ben Salem, P-HConze. Cross-dimensional transfer learning in medical image segmentation with deep learningIn Medical Image Analysis, vol. 88, pp. 102868. Elsevier BV (2023). https://doi.org/10.1016/j.media.2023.102868


15. R. Zegour, A. Belaid, J. Ognard, D. Ben Salem. Convolutional neural networks-based method for skin hydration measurements in high resolution MRIBiomedical Signal Processing and Control 81, 104491, (2023).https://doi.org/10.1016/j.bspc.2022.104491Get rights and content


16. E. O. Belabbaci, M. Khammari, A. Chouchane, A Ouamane, M. Bessaoudi,Y. Himeur, M Hassaballah. High-order knowledge-based discriminant features for kinship verificationPattern Recognition Letters, 2023, vol. 175, pp. 30-37. https://doi.org/10.1016/j.patrec.2023.09.008


17. M. Ouchichi. Les dynamiques socio-économiques du Hirak Algérien : un facteur souvent ignoréExtractivism Policy Brief N°9/2023. https://kobra.unikassel.de/handle/123456789/15099


18. M. Ouchichi. Extractivism as an obstacle to innovation and technology transfer: The case of AlgeriaExtractivism Policy Brief N°8/2023. http://dx.doi.org/doi:10.17170/kobra-202309138765


19. A. Achroufene. RSSI-based Localization Using K-Nearest NeighborsAdhoc & Sensor Wireless Networks, volume 56, 2023. https://doi.org/10.32908/ahswn.v56.9363


20. A. Achroufene. RSSI-based Localization Using K-Nearest Neighbors. The Journal of Supercomputing, volume 79, N° (5), pp. 5615-5642, 2023. https://doi.org/10.1007/s11227-022-04887-5


21. A. Achroufene. RSSI-based Hybrid Centroid-K-Nearest Neighbors localization methodTelecommunication Systems, volume 82, N°(1), pp. 101-114, 2023.  https://doi.org/10.1007/s11235-022-00977-0


22. K. Bedjou, F. Azouaou. Detection of terrorism's apologies on Twitter using a new bi-lingual datasetInternational Journal of Data Mining, Modelling and Management, volume 15, N°(4), pp. 331-354, 2023. https://doi.org/10.1504/IJDMMM.2023.134581


23. F. Mir, F. Meziane. A distributed clustering based on objects performances aggregation for hierarchical communications in IoT applicationsCluster Computing: The Journal of Networks, Software Tools and Applications, volume 26, N°(2), pp.1077-1098 (2023). https://doi.org/10.1007/s10586-022-03741-w


24. A. Cherifi, M. H.  Khanouche, Y. Amirat, and Z. Farah. A parallel approach for user-centered QoS-aware services composition in the Internet of ThingsEngineering Applications of Artificial Intelligence, volume 123, pp. 106-277, 2023. https://doi.org/10.1016/j.engappai.2023.106277


25. M. Kihal, L. Hamza. A Robust Multimedia Spam Filtering based on Visual, Textual and Audio Deep Features fusion and Random ForestMultimedia Tools and Applications, Vol 82, Issue 26, pp. 40819–40837, 2023. https://doi.org/10.1007/s11042-023-15170-x


2022


1. O. Bentaleb, A. Sebaa, S. Kalli, A. S. Z. Belloum Deployment of a programming framework based on micro services and containers with application to the astrophysical domain. Astronomy and Computing, vol. 41, p. 100655, 2022. https://doi.org/10.1016/j.ascom.2022.100655.


2. A. Sebaa. Parallel Maintenance of Materialized Views in Large-Scale Analytic Platforms. International Journal of Organizational and Collective Intelligence (IJOCI),  vol. 12, num. (1), pp. 1-19, https://doi.org/10.4018/IJTD.300746.


3. A. Sebaa. View Materialization for Query Processing in IoT Systems. International Journal of Technology Diffusion (IJTD), vol. 13, num. (1), pp. 1-19, 2022. https://doi.org/10.4018/IJTD.300746.


4. D. Hadjout, J. F. Torres, A. Troncoso, A. Sebaa, F. Martínez-Álvarez. Electricity consumption forecasting based on ensemble deep learning with application to the Algerian market. Energy, Vol. 243, p.123060, 2022. https://doi.org/10.1016/j.energy.2021.123060.


5. O. Bentaleb, A. S. Belloum, A. Sebaa, A. El-Maouhab. Containerization technologies: Taxonomies, applications and challenges. The Journal of Supercomputing, vol. 78, num (1), pp.1144-1181, 2022. https://doi.org/10.1007/s11227-021-03914-1.


6. M. Kherbache, K. Amroun, D.Espes, A new wrapper feature selection model for anomaly based instrusion detection systems, International Journal of Security and Networks, Inderscience, pp 107-123, volume 17,  num. (2), 2022. https://doi.org/10.1504/ijsn.2022.123298.


7. F. Cherifi, O. Mawloud, T. Chenache, S. Radji. Efficient and lightweight protocol for anti-jamming communications in wireless body area networks. Computers & Electrical Engineeringn,  volume 98, March 2022. https://doi.org/10.1016/j.compeleceng.2022.107698.


8. D. Alkama, M. A Ouamri, M .S. Alzaidi, R. Nath Shaw, M. Azni S. M. Ghoneim. Downlink Performance Analysis in MIMO UAV-Cellular Communication with LOS/NLOS Propagation under 3D Beamforming. IEEE Access, vol 10, pp.6650-6659 (2022).https://doi.org/10.1109/ACCESS.2022.3142529.


9. K. Bouafia, L. Hamza, Game theory approach for analyzing attack graphs. International Journal of Information and Computer Security, vol. 19, num. 3/4, pp. 305-320, 2022. https://doi.org/10.1504/ijics.2022.127139.


10. D. Zamouche, M. Mohammedi, S. Aissani and M. Omar, Ultra-Safe and Reliable Enhanced Train-centric Communications-Based Train Control System. Computing, vol. 104, no. 3, pp. 533-552, 2022. https://doi.org/10.1007/s00607-021-01009-6


11. D. Zamouche, S. Aissani, M. Omar and M. Mohammedi, Highly efficient approach for discordant BSMs detection in connected vehicles environment. Wireless Networks, vol. 29, pp. 189-207, 2022. https://doi.org/10.1007/s11276-022-03104-8.


12. M. Mohammedi, M. Omar, A. Bouabdallah, Methods for detecting and removing ocular artifacts from EEG signals in drowsy driving warning systems: A survey.  Multimedia Tools and Applications, pp. 1-28, 2022. https://doi.org/10.1007/s11042-022-13822-y.


13. M. Nafi, M-L. Messai, S. Bouzefrane, M. Omar, IFKMS: Inverse Function-based Key Management Scheme for IoT networksJournal of Information Security and Applications, vol. 71, p. 103370, 2022. https://doi.org/10.1016/j.jisa.2022.103370.


14. N. Kendi, Y Hidra, N. Kaid Tlilane, Analyse macroéconomique de l’efficacité de la politique fiscale antitabac en Algérie. Santé Publique vol, 34, num. (1), pp. 141-155, (2022). https://doi.org/10.3917/spub.221.0141.


15. N. Amrouni, A. Benzaoui, R. Bouaouina, Y. Khaldi, I. Adjabi, O. Bouglimina, Contactless Palmprint Recognition Using Binarized Statistical Image Features-Based Multiresolution Analysis. Sensors, vol. 22, num. (24), p.9814, 2022. https://doi.org/10.3390/s22249814.


16. A. Achroufene, RSSI-based Hybrid Centroid-K-Nearest Neighbors localization methodTelecommunication vol. 82, pp.101–114, (2022). https://doi.org/10.1007/s11235-022-00977-0


17. A. Achroufene, RSSI-based geometric localization in wireless sensor networks. The Journal of Supercomputing volume 79, pp. 5615–5642 (2022). https://doi.org/10.1007/s11227-022-04887-5.


18. F. Mir, F. Meziane, DCOPA: a distributed clustering based on objects performances aggregation for hierarchical communications in IoT applications, Cluster Computing (2022). https://doi.org/10.1007/s10586-022-03741-w.


19. A Kouicem, M-E. Khanouche, A. Tari, Novel bat algorithm for QoS-aware services composition in large scale internet of things, Cluster Computing, vol. 25, pp. 3683–3697 (2022). https://doi.org/10.1007/s10586-022-03602-6.


20. A. Sebaa, N. Djebari, A. Tari, Healthcare services: applications, trend, and challenges, International Journal of Medical Engineering and Informatics, June 2022.https://doi.org/10.1504/IJMEI.2022.10048151.


21. A. Akilal and M-T Kechadi, An improved forensic-by-design framework for cloud computing with systems engineering standard compliance, Forensic Science International : Digital Investigation, vol. 40,  pp. 301—315, 2022. Elsevier. https://doi.org/10.1016/j.fsidi.2021.301315


22. R. Bekka, S. Kherbouche, H. El Bouhissi,  Distraction Detection to Predict Vehicle Crashes: A Deep Learning Approach, Computación y Sistemas, vol. 26, num.(1), pp. 373-387 (2022). https://doi.org/10.13053/cys-26-1-3871


23. M. Gagaoua, H. Ghilas, A. Tari, M. Cheriet, Histogram of Marked Background (HMB) Feature Extraction Method for Arabic Handwriting Recognition. International Journal of Image and Graphics. Vol. 22, No. 02, (2022), https://doi.org/10.1142/S0219467822500152


24. H. Ghilas, M. Gagaoua, A. Tari, M. Cheriet, Spatial Distribution of Ink at Keypoints (SDIK): A Novel Feature for Word Spotting in Arabic Documents. International Journal of Image and Graphics. Vol. 22, No. 04, (2022). https://doi.org/10.1142/S0219467822500358.


25. Z Younsi, K Amroun, F Bouarab-Dahmani, S Bennai, HSJ-Solver: a new method based on GHD for answering conjunctive queries and solving constraint satisfaction problems, Applied Intelligence, pp. 1-14. 2022. https://doi.org/10.1007/s10489-022-04361-y.


26. L. Allou, D. Zouache, K. Amroun & A. Got, A novel epsilon-dominance Harris Hawks optimizer for multi-objective optimization in engineering design problems. Neural Comput & Applic, vol. 34, pp.17007–17036 (2022). https://doi.org/10.1007/s00521-022-07352-9


2021


1.  M. Ayachi, H. Nacer and H. Slimani. Cooperative game approach to form overlapping cloud federation based on inter-cloud architecture. Cluster Computing 24, pp.1551–1577 (2021). https://doi.org/10.1007/s10586-021-03253-z


2. M. Ayachi, H. Nacer and H. Slimani. Correction to: Cooperative game approach to form overlapping cloud federation based on inter-cloud architecture. Cluster Computing 24, pp. 1579–1582 (2021). https://doi.org/10.1007/s10586-021-03273-9


3. S. Albane, H. Slimani and H. Kheddouci. A graph grammar and K4-type tournament based approach to detect conflicts of interest in a social network. Knowledge and Information Systems 63(2), pp. 497–539 (2021). https://doi/:10.1007/s10115-020-01525-5 


4. F. Bouchebbah and H. Slimani. 3D automatic levels propagation approach to breast MRI tumor segmentation. Expert Systems with Applications, vol.165, p.113965, (2021). https://doi.org/10.1016/j.eswa.2020.113965


5. S. Aissani, T. Fettioune, N. Maizia, M. Mohammedi, O. Mawloud. Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects. Wireless Personal Communication, Vol. 120, Num. 04, pp 2631-2652, (2021).


6. S. Belattaf, M. Mohammedi, O. Mawloud, R. Aoudjit. Reliable and Adaptive Distributed Public‑Key Management Infrastructure for the Internet of Things. Wireless Personal Communication, vol. 120, pp. 113–137, (2021). 


7. M. Mohammedi, O Mawloud, D. Zamouche, K. Louiba, S. Ouared, K. Hocini. Energy-aware key management and access control for the internet of things. World Wide Web, vol. 24, num. (4),  pp. 1089–1120, (2021).


8. F. Cherifi, K. Amroun, O Mawloud. Robust multimodal biometric authentication on IoT device through ear shape and arm gesture. Multimedia tools and applications, Vol 80, num. (10), pp. 14807-14827, 2021. https://doi.org/10.1007/s11042-021-10524-9


9. M. Kherbache, K.  Amroun, D. Espes. A new wrapper feature selection model for anomaly based instrusion detection systems. International Journal of Security and Networks, inderscience, 2021


10. F. Cherifi, O. Mawloud,  K. Amroun. An efficient biometric-based continuous authentication scheme with HMM prehensile movements modeling. Journal of Information Security and Applications, Volume 57, pages 102739, 2021  https://doi.org/10.1016/j.jisa.2020.102739


11. H. Ghilas, M. Gagaoua, A. K. Tari and M. Cheriet. Spatial Distribution of Ink at Keypoints (SDIK): A Novel Feature for Word Spotting in Arabic Documents. International Journal of Image and Graphics, 2021, doit: https://doi.org/10.1142 /S0219467822500358


12. M. Gagaoua, H. Ghilas, A. K Tari, M. CherietHistogram of Marked Background (HMB) Feature Extraction Method for Arabic Handwriting Recognition. International Journal of Image and Graphics, 2250015(2021).


13. P. Alizadeh, A. Osmani, M. E. Khanouche, A. Chibani, Y. Amirat. Reinforcement Learning for Interactive QoS-Aware Services Composition. IEEE System Journal, vol. 15, n°1, pp. 1098-1108, 2021


14. A. Achroufene, M. Chalik, N. Bouadem. Modified CSMA/CA protocol for real-time data fusion applications based on clustered WSN. Computer Networks, pp. 108243, 2021


15. M.A. Ouamri, M. Azni, M‑E. Oteşteanu. Coverage Analysis in Two‑tier 5G Hetnet Based on Stochastic Geometry with Interference Coordination Strategy.  Wireless Personal Communications, 2021 https://doi.org/10.1007/s11277-021-08870-w


16. D. Alkama, M.A. Ouamri, M.S. Alzaidi, R. Nath shaw ,  M. Aazni, D S. M. Ghoneim. Downlink Performance Analysis in MIMO UAV- Cellular Communication with LOS/NLOS. Propagation Under 3D Beamforming.


17. K. Allem, E.B Bourennane, Y. Khelfaoui. A Service-Oriented Component-Based Framework for Dynamic Reconfiguration Modeling Targeting System C/TLMInternational Journal of Reconfigurable Computing, Vol. 2021, pp. 31, https://doi.org/10.1155/2021/5584391, 2021.


18. J. F. Torres, D. Hadjout,  A. Sebaa, F. Martínez-Álvarez,. A Troncoso. Deep learning for time series forecasting: a surveyBig Data, vol. 9, num. (1), (2021), pp.3-21. https://doi.org/10.1089/big.2020.0159. 


19. D.Hadjout, JF.Torres, A.Troncoso, A. Sebaa, F. Martínez-Álvarez. Electricity consumption forecasting based on ensemble deep learning with application to the Algerian marketEnergy 243, 2021, 123060.


20. O. Bentaleb, ASZ. Belloum, A. Sebaa, A. El-Maouhab. Containerization technologies: Taxonomies, applications and challenges. The Journal of Supercomputing, vol. 78, num (1), 2021 1144-1181


21. B. Brahimi, M. Touahria, A. Tari. Improving sentiment analysis in Arabic: A combined approach. Journal of King Saud University-Computer and Information Sciences, vol. 33, num. (10), pp.1242-1250. (2021)


22. A. Dabba, A.Tari, S. Meftali. A new multi-objective binary Harris Hawks optimization for gene selection in microarray dataJournal of Ambient Intelligence and Humanized Computing, pp. 1-20. (2021). 


23. D. E. Salhi, A. Tari, M. T Kechadi. Email Classification for Forensic Analysis by Information Gain TechniqueInternational Journal of Software Science and Computationnel Intelligence (IJSSCI), vol.13, num. (4), pp. 40-53. (2021). https://doi.org/10.4018/IJSSCI.2021100103 


24. D. E. Salhi, A. Tari,M. T.Kechadi. Using e-reputation for sentiment analysis: Twitter as a case studyInternational Journal of Cloud Applications and Computing (IJCAC), vol. 11, num. (2), pp. 32-47. (2021)


25. A. Dabba, A. Tari, S. Meftali, R. Mokhtari, R. Gene selection and classification of microarray data method based on mutual information and moth flame algorithm. Expert Systems with Applications, vol. 166, p. 114012. (2021)


26. A. Dabba, A Tari,S.Meftali. Hybridization of Moth flame optimization algorithm and quantum computing for gene selection in microarray dataJournal of Ambient Intelligence and Humanized Computing, vol. 12, num. (2), pp. 2731-2750. (2021)


27. D. E Salhi, A. Tari, M T. Kechadi. Using clustering for forensics analysis on internet of thingsInternational Journal of Software Science and Computational Intelligence (IJSSCI), vol. 13, num. (1), pp. 56-71. (2021)


2020


1. K. Akilal, M. Omar and H. Slimani, Characterizing and using gullibility, competence, and reciprocity in a very fast and robust trust and distrust inference algorithm for weighted signed social networksKnowledge-Based Systems 192, 105345 (2020). https://doi.org/10.1016/j.knosys.2019.105345


2. K. Ouazine, H. Slimani, H. Nacer, N. Bermad and S. Zemmoudj, Reducing saturation and congestion in VANET networks: Alliance based approach and comparisonsInternational Journal of Communication Systems 33, e4245 2020. https://doi.org/10.1002/dac.4245.


3. N. Battat, A. MakhoulH. KheddouciTowards an Efficient Monitoring in Multi-hop Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks Vol. 48, No 1-2,  pp. 93-120 (2020).


4.M-A. Ouamri and M. Azni, New optimization method to minimize overshooting problem in LTE using genetic algorithms based on Laplace crossoverInt. J. Ultra Wideband Communications and Systems, Vol. 4, No. 2, 2020. pp. 49-56. DOI: https://doi.org/10.1504/ijuwbcs.2020.110544 .


5. M-A. Ouamri, M-E. Oteşteanu, A. Isar, M. Azni, Coverage, Handoff and cost optimization for 5G Heterogeneous NetworkPhysical Communication 39, pp.1-8. DOI: https://doi.org/10.1016/j.phycom.2020.101037 


6. N. Kadjouh, A. Bounceur, M. Bezoui, M-E Khanouche, R. Euler, M. Hammoudeh, L. Lagadec, S. Jabbar, and F. Al-Turjman, A Dominating Tree based Leader Election Algorithm for Smart Cities IoT Infrastructure. Mobile Networks and Applications, DOI: https://doi.org/10.1007/s11036-020-01599-z, Aug. 2020.


7. P. Alizadeh, A. Osmani, M-E. Khanouche, A. Chibani and Y. Amirat, Reinforcement Learning for Interactive QoS-Aware Services CompositionIEEE Systems Journal, DOI: https://doi.org/10.1109/JSYST.2020.2997069, Early Access, pp. 1–11, Jun. 2020.


8. M-E. Khanouche, N.  Atmani and A. Cherifi, Teaching Learning-based QoS-aware services composition for Internet of Things. IEEE Systems Journal, vol. 14, no. 3, pp. 4155–4164, DOI:https://doi.org/10.1109/JSYST.2019.2960677, Sep. 2020.


9. M- E. Khanouche, H. Gadouche, Z. Farah and A. Tari, Flexible QoS-aware services composition for Service Computing environments. Computer Networks, vol. 166, pp. 106982:1, 106982:12, https://doi.org/10.1016/j.comnet.2019.106982, Jan. 2020.


10. H. Gadouche, F. Zoubeyr and A. Tari, A correct-by-construction model for attribute-based access control. Cluster Computing vo. 23, no. 3pp. 1517-1528, https://doi.org/10.1007/s10586-019-02976-4, 2020.


11. H. Gadouche, Z. Farah, A. Tari, A Valid and Correct-by-Construction Formal Specification of RBACInternational Journal Information Security and Privacy, vol. 14, no.2, pp. 41-61, 2020. https://doi.org/10.4018/IJISP.202004013


12. L. Cheklat, M. Amad, M. Omar, and A. Boukerram, CHEARP: Chord-based Hierarchical Energy-Aware Routing Protocol for Wireless Sensor NetworksComputer Science and Information Systems, no. 00, pp. 43-43, https://doi.org/10.2298/CSIS200308043C, 2020   


13. M. SADI, M. AMAD, N. BADACHE, Hierarchical Trust and Fault Tolerant Group Key Agreement for MANETs. Ad Hoc & Sensor Wireless Networks (AHSWN), Vol. 47, N° 1: pp.199-225, Old City Publishing, 2020.


14. M. SADI, M. AMAD, N. BADACHE, Improving performance overhead of a trust-clustering key management protocol in ad hoc networks. Int. J. Electronic Security and Digital Forensics (IJESDF), Vol.12 (2), pp.214-228, http://doi.org/10.1504/IJESDF.2020.106319, InderScience, 2020.


15. L. Hamza, Intruder model for generating attack scenarios in computer systems. International Journal of Information and Computer Security, num.(3-4), Vol.13, https://doi.org/10.1504/IJICS.2019.10026017, 2020.


16. S. Bouchelaghem, M. Omar,  Secure and efficient pseudonymization for privacy-preserving vehicular communications in smart cities. Computers & Electrical Engineering, vol.82, https://doi.org/10.1016/J.compeleceng.2020.106557, 2020.


17.M. Nafi, S. Bouzefrane, M. Omar, Matrix-based key management scheme for IoT networks. Ad Hoc Networks, vol.97, https://doi.org/10.1016/jadhoc.2019.102003, 2020.


18. S. Zebboudj, H. Djoudi, D. Lalaoui, M. Omar. Authenticated semi-quantum key distribution without entanglement.  Quantum Information Processing, num.3, vol.19, https://doi.org/10.1007/s11128-019-2573-2, 2020.


19. S. Aissani, B. Abbache, Secure Key Management System Integrated in Cell-LEACH (SKMSI-CL). Wireless Personal Communications, Vol. 112, num. 04, pp. 2109-2129. https://doi.org/10.1007/s11277-020-07142-3, 2020.


20. M. Yaici, S. Sabri, W. Azni, F. Boudjemil. Contextual data classification for a ubiquitous intelligent environment. SN Applied Sciences, Vol. 2, Num. 4, pp. 1-10, https://doi.org/10.1007/s42452-020-2370-7, 2020.


21. A. Mansour, K. Amroun, Z. Habbas. Artificial Intelligence and Its Application in Insulin Bolus Calculators. Chapter in Advances in Multidisciplinary Medical Technologies─ Engineering, Modeling and Findings, Pages 55-76, https://doi.org/10.1007/978-3-030-57552-6, Springer 2020.


22. M. Bali, A. Tari, A. Almutawakel, & O. Kazar,  Smart Design for Resources Allocation in IoT Application Service based on multi-agent system and CSP. Informatica, Vol. 44, Num. (3), https://doi.org/10.31449/inf.v44i3.29622020


23. H.Gadouche, Z. Farah, A. Tari,  A correct-by-construction model for attribute-based access control. Cluster Comput Vol. 23, Num 03, pp. 1517–1528, https://doi.org/10.1007/s10586-019-02976-4,  2020.


24. A. Khiat, A. Tari, & T. Guérout,  MFHS: A modular scheduling framework for heterogeneous system. Software: Practice and Experience, Vol. 50, Num. (8), pp. 1463-1497. https://doi.org/10.1002/spe.2827, 2020.


25. Y. Sklab, S. Aknine, O. Shehory,  & A. Tari, Coalition formation with dynamically changing externalities. Engineering Applications of Artificial Intelligence, Vol. 91, https://doi.org/10.1016/j.engappai.2020.103577, 2020


26.  A. Dabba, A. Tari, & S. Meftali, Gene Selection and Classification Using Quantum Moth Flame Optimization Algorithm. American Journal of Innovation and Entrepreneurship, Vol. 1, Num (2), pp. 16-20, https://doi.org/10.15864/ajse.1204, 2020.


27. H. Gadouche, Z. Farah,  & A. Tari, A Valid and Correct-by-Construction Formal Specification of RBACInternational Journal of Information Security and Privacy (IJISP), Vol. 14; Num. (2), pp. 41-61, https://doi.org/10.4018/IJISP.2020040103, 2020.


28. B. Brahimi, M. Touahria, & A. Tari, Improving Arabic Sentiment Classification Using a Combined Approach. Computación y Sistemas, Vol. 24, Num. (4), pp. 1403–1414,  https://doi.org/10.13053/cys-24-4-31542020


29. M. E. Khanouche, H. Gadouche, Z. Farah, & A. Tari, A. Flexible QoS-aware services composition for service computing environments. Computer Networks, Vol. 166, Num C, pp. 106982, https://doi.org/10.1016/j.connect.2019.106982,  2020


30. A. Dabba, A. Tari, D. Zouache, Multiobjective artificial fish swarm algorithm for multiple sequence alignment. INFOR: Information Systems and Operational Research, Vol. 58, Num. (1), pp. 38-59. https://doi.org/10.1080/03155986.2019.1629782, 2020


31. S. Meftali, A. Dabba, & A. Tari, Gene Selection and Classification of Microarray Data Method Based on Mutual Information and Moth Flame Algorithm. Expert Systems with Applications, Vol. 166, pp.114012, https://doi.org/10.17632/fhx5zgx2zj.1, 2020


32. S. Medileh, A. Laouid, R. Euler, A. Bounceur, M. Hammoudeh, M.  AlShaikh,  & O. A. Khashan,  A flexible encryption technique for the internet of things environment.    Ad Hoc Networks, Vol. 106, pp. 102240, https://doi.org/10.1016/j.adhoc.2020.102240, 2020


33. K. Souadih, A. Belaid, D. Ben Salem, P-H. Conze,  Automatic Forensic Identification using 3D Sphenoid Sinus Segmentation and Deep Characterization. Medical & Biological Engineering & Computing, Vol. 58, Num. 02, pp. 291–306, https://doi.org/10.1007/s11517-019-02050-6 2020


34.  M. MESSAILI, N. KAID TLILANE,  Essai d’évaluation de la contribution de la santé à la croissance économique en Algérie. Revue de Recherches en Économie et Management Africain, Vol. 08, Num. 08, pp. 130-147, https://mpra.ub.uni-muenchen.de/id/eprint/88013Septembre 2020.


2019

 


1. A. Brighen, H. Slimani, A. Rezgui and H. Kheddouci. Listing all maximal cliques in large graphs on vertex centric model. The Journal of Supercomputing (2019). https://doi.org/10.1007/s11227-019-02770-4  


2. K. Akilal, H. Slimani and M. Omar.  A very fast and robust trust inference algorithm in weighted signed social networks using controversy, eclecticism, and reciprocity. Computers & Security 83, pp. 68-78 (2019). https://doi.org/10.1016/j.cose.2019.01.013


3. F. Bouchebbah and H. Slimani. Levels propagation approach to image segmentation: application to breast MR images. Journal of Digital Imaging (2019). https://doi.org/10.1007/s10278-018-00171-2


4. K. Akilal, H. Slimani and M. Omar.  A robust trust inference algorithm in weighted signed social networks based on collaborative filtering and agreement as a similarity metric.  Journal of Network and Computer Applications 126, pp. 123–132 (2019). https://doi.org/10.1016/j.jnca.2018.11.008


5. T. Antczak and H. Slimani. Nondifferentiable minimax programming problem with second-order (p,r)-invex functions. Journal of Nonlinear and Convex Analysis 20(2), pp. 229-249, 2019 (2019).


6. M. E. Khanouche, F. Attal, Y. Amirat, A. Chibani, and M. Kerkar. Lustering-based and QoS-aware services Composition Algorithm for ambient intelligence. Information Sciences, vol. 482, pp. 419-439, Jan. 2019.


7. M. Sadi, M. Amad, N. Badache. HiCo-MoG: Hierarchical consensus-based group membership service in mobile Ad Hoc Newroks. Journal of High Speed Networks, https://doi.org/10.3233/JHS-1906092019.


8. M. Sadi, M. Amad, N. Badache.  Improving performance overhead of a trust-clustering key management protocol in ad hoc networks. Int. J. Electronic Security and Digital Forensics.  In Press, InderScience, 2019.


9. B. Abbache, S. Aissani, M. Omar , F-S. Ouada , N. Yessad , M. Azni et A.k. Tari. "Dissimulation-based and load-balance-aware routing protocol for request and event oriented mobile wireless sensor networks". International Journal Electronic and Communications. (AEU) 264-283 (2019).


10. K. SOUADIH, A. Belaid, D. Ben Salem. Automatic segmentation of the sphenoid sinus in CT-scans volume with DeepMedics 3D CNN architecture. Medical Technologies Journal 1 (3), 334-346


11. F. Kacimi, A. Tari and H. Kheddouci. Business Process Graph Matching based on Vectorial Signatures. International Journal of Business Process Integration and Management, 9(2), pp. 76-89 (2019). https://doi.org/10.1504/IJBPIM.2019.099869 .


12. A. Sebaa, A. Nouicer, and A. Tari. Impact of Technology Evolution on the Materialised Views: Current Issues and Future Trends International Journal of Business Information Systems, 30(4), pp. 427-462 (2019). https://doi.org/10.1504/IJBIS.2019.099305.


13. S. Chibani Sadouki and A. Tari. Multi-objective and discrete Elephants Herding Optimization algorithm for QoS aware web service composition. RAIRO-Oper. Res., 53(2), 445-459 (2019). DOI: https://doi.org/10.1051/ro/2017049.


14. A. Sebaa, and A. Tari. Query optimization in cloud environments: challenges, taxonomy, and techniques. The Journal of Supercomputing, pp. 1-31 (2019). https://doi.org/10.1007/s11227-019-02806-9.


15. A. Sebaa, and A.Tari. Materialized View Maintenance: Issues, Classification, and Open Challenges.  International Journal of Cooperative Information Systems, 28 (1) (2019). https://doi.org/10.1142/S0218843019300018.


16. M. Naili, M. Bourahla, M. Naili and A. Tari. Stability-based Dynamic Bayesian Network method for dynamic data mining.  Engineering Applications of Artificial Intelligence, Volume 77, pp. 283-310 (2019). https://doi.org/10.1016/j.engappai.2018.09.016.


17. A. Ahmed Nacer, C. Godart, G. Rosinosky, A. Tari and S. Youcef. Business process outsourcing to the cloud: Balancing costs with security risks. Computers in Industry, Volume 104, pp. 59-74 (2019). https://doi.org/10.1016/j.compind.2018.10.003.


18. F. Boudries, S. Sadouki, A. Tari. A bio-inspired algorithm for dynamic reconfiguration with end-to-end constraints in web services composition. International Journal Service Oriented Computing and Applications, In Press (2019).


19. A. Khelaifa, S. Benharzallah, L. Kahloul, R. Euler, A. Laouid, and A. Bounceur. A comparative analysis of adaptive consistency approaches in cloud storage. Journal of Parallel and Distributed Computing, Volume 129, pp. 36-49 (2019). https://doi.org/10.1016/j.jpdc.2019.03.006.


20. K. Ouazine, H. Slimani, H. Nacer, N. Bermad and S. Zemmoudj. Reducing saturation and congestion in VANET networks: Alliance based approach and comparisons. https://doi.org/10.1002/dac.4245 


21. K. Mohamed, P. Mier, A.K.Tari, M. Andrade. Repeatability in protein sequences. Journal of structural biology: https://doi.org/10.1016/j.jsb.2019.08.003


22. H. Gaddouche, Z. Farah, A.K Tari. A correct-by-construction model for attribute-based access control: Illustration in web based healthcare services. https://doi.org/10.1007/s10586-019-02976-4


23. M. E. Khanouche, H. Gadouche, Z. Farah, A.K Tari. Flexible QoS-aware services composition for service computing environments. Computer Networks. https://doi.org/10.1016/j.comnet.2019.106982


24. B. Foudi, N. Kaid Tlilane. Défis et enjeux de la coordination à l’ère de la multiplicité des acteurs dans le système de santé algérien. Revue de l'innovation et marketing PP 253-272.https://www.asjp.cerist.dz/en/article/58572


25. M. Khammari. Robust face anti-spoofing using CNN with LBP and WLD. IET Image processing.https://doi.org/10.1049/iet-ipr.2018.5560


26. H. Khaled, P. Gregori, R. Couturier. Analysis of Bachelor's degree curricula through Item Response Theory and Association Rules. KEDI Journal of Educational Policy- ISSN 1739- 4341- KJEP 16:1 (2019), pp. 3-20. 


27. T. Antczak and H. Slimani. Higher-order duality results for a new class of nonconvex nonsmooth multiobjective programming problems. FILOMAT 33(6), pp. 1619–1639. 


28. K. Akilal, M.Omar and H. Slimani. Characterizing and using gullibility, competence, and reciprocity in a very fast and robust trust and distrust inference algorithm for weighted signed social networks. Knowledge-Based Systems, Volume 192. https://doi.org/10.1016/j.knosys.2019.105345


29. H Gadouche, Z. Farah, A. TARI. A Valid and Correct-by-Construction Formal Specification of RBAC. International Journal of Information Security and Privacy (IJISP), IGI Global, Vol. 14(2), Pages 41-61. https://www.igi-global.com/gateway/article/247426


2018

 


1. S. Albane, H. Slimani and H. Kheddouci. Graph grammars according to the type of input and manipulated data: A survey, Computer Science Review 28, pp. 178–203 (2018). https://doi.org/10.1016/j.cosrev.2018.04.001


2. S. Ait Taleb, H. Slimani and H. Kheddouci. (N, p)-equitable b-coloring of graphs. Discrete Applied Mathematics 235, pp. 1–15 (2018).  http://dx.doi.org/10.1016/j.dam.2017.09.004


3. N. Yousfi-Halimi, M.S. Radjef and H. Slimani, Refinement of pure Pareto Nash equilibria in finite multicriteria games using preference relations, Annals of Operations Research 267, pp 607–628 (2018). https://doi.org/10.1007/s10479-017-2570-8


4. K. Ouazine, H. Slimani and A-K. Tari, Alliances in graphs: parameters, properties and applications - a survey, AKCE International Journal of Graphs and Combinatorics 15, pp. 115–154 (2018). https://doi.org/10.1016/j.akcej.2017.05.002


5. H. Benkerrou, M. Omar, F. Bouchebbah, Y Ait-Mouhoub, A Dependable and Lightweight Trust Proliferation Approach for the Collaborative IoT Systems, International Journal of Internet Technology and Secured Transactions, 8 :277-293 (2018). htpps://doi.org/10.1504/IJITST.2018.093381    


6. A. Achroufene, Y. Amirat and A. Chibani, RSS-Based Indoor Localization Using Belief Function Theory. IEEE Transactions on Automation Science and Engineering, (2018). https://doi.org/10.1109/TASE.2018.2873800 


7. B. Abbache, S. Aissani, M. Omar, F-S. Ouada, N. Yessad, M. Azni, A.K Tari. “Dissimulation-based and load-balance-aware routing protocol for request and event oriented mobile wireless sensor networks”. Int. J. Electron. Commun. 99 (2019), pp. 264-283 (AEÜ). https://doi.org/10.1016/j.aeue.2018.12.003


8. L. Inouri, S. Tighidet, M. Azni, A.K. Khireddine, K. Harrar. ‘‘A Fast and Efficient Approach for Image Compression Using Curvelet Transform’’, Sensing and Imaging, vol. 19 (1) pp. 26-49, 2018.


9. M.A.Ouamri, S. Zenadji, S. Khellaf  and M. Azni ‘‘Optimal base station location in LTE heterogeneous network using non-dominated sorting genetic algorithm II’’. International journal of wireless and mobile computing, Vol. 14 (04), pp. 328-334, 2018


10. S. Aissani, M. Omar, A.K Tari, F. Bouakkaz: " uKMS : micro key management system for WSNs". IET Wireless Sensor Systems 8(2): 87-97 (2018).


11. A. Hammamouche, M. Omar, N. Djebari, A.K.Tari. Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. J. Inf. Sec. Appl. 43: 12-20 (2018).


12. M. Omar, I. Belalouache, S. Amrane and B. Abbache. Efficient and energy-aware key management framework for dynamic sensor networks. Computers & Electrical Engineering, 72 : 990-1005, 2018.


13. K. Adi, L. Hamza and L. Pene, Automatic security policy enforcement in computer systems. Computers & Security 73, pp. 156-171 (2018). https://doi.org/10.1016/j.cose.2017.10.012


14. N. Yessad and M. Omar. Reliable and efficient data communication protocol for BAN-based healthcare systems. International Journal of E-Health and Medical Communications (IGI-Global), Volume 9, Issue 2, Pages 19-3 7 (2018).


15. N . Yessad, M. Omar, A. Tari and A. Bouabdallah. QoS-based Routing in Wireless Body Area Networks: A Survey and Taxonomy. Computing (Springer), Volume 100, Number 3, Pages 245-275 (2018)


16. L. Ben Boudaoud, B. Solaiman, A.K. Tari. Modified ZS thinning algorithm by a hybrid approach. The Visual Computer 34(5): 689-706 (2018)


17.  K. Tamiti, M. Ourbih-Tari, A.O. Aloui, K. Idjis. The use of variance reduction, relative error and bias in testing the performance of M/G/1 retrial queues estimators in Monte Carlo simulation. Monte Carlo Methods and Applications 24:3, pages 165-178.


18. M. Ourbih-Tari, S. Guebli, A.O Aloui. Applying Refined Descriptive Sampling on the vibrating string model, International Journal of Computing Science and Mathematics


19. S. Sabri, A. Aloui. A new approach for the recognition of human activities, International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), 2018


20. Z Rachida, A Belaid, DB Salem.  A Segmentation Method of Skin MRI 3D High.  Resolution in vivo Medical Technologies Journal 2 (3), 255-261.


21. A Belaid, D Boukerroui.  Local maximum likelihood segmentation of echocardiographic images with Rayleigh distribution Signal, Image and Video Processing 12 (6), 1087–1096


22. R Zaouche, A Belaid, S Aloui, B Solaiman, L Lecornu, DB Salem, S Tliba. Semi-automatic method for low-grade gliomas segmentation in magnetic resonance imaging.  IRBM 39 (2), 116-128


23. N. Kendi, Y. Hidra. N. Kaïd-Tlilane.  La culture du tabac en Algérie : un coût d’opportunité important sur le développement durable. XXXIIIES journées sur le développement : «Agricultures, ruralités et développement», les cahiers de l'Association Tiers-Monde, n°33 – 2018 (pp 65-74).


24. S. Ould Abdeslam, N. Kaïd Tlilane.  La modélisation des déterminants des dépenses de santé en Algérie par l'approche ARDL. Les cahier du CEDIMES, Volume 12, n°2, 2018. pp. 649-662. http://www.cedimes.com/attachments/article/66/Cahiers%20n28_31iul.pdf


25. A. Sebaa, F. Chikh, A. Nouicer, and A. Tari, Medical Big Data Warehouse: Architecture and System Design, a Case Study: Improving Healthcare Resources Distribution, Journal of Medical Systems, 42(4), pp. 59 (2018). https://doi.org/10.1007/s10916-018-0894-9.


26. A. Ahmed Nacer, E. Goettelmann, S. Youcef, A. Tari and C. Godart, A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation. International Journal of Web Services Research (IJWSR), 15(4), pp. 61-81 (2018). https://doi.org/10.4018/IJWSR.2018100104 .


27. S. Ikken, E. Renault, A. Tari and M. T. Kechadi. Exact and heuristical data workflow placement algorithms for big data computing in cloud datacenters. Scalable Computing : Practice and Experience, 19 (3), pp. 223-244 (2018). htpps://doi.org/10.12694/scpe.v19i3.1365.


28. M. Bendechache, A. Tari and M. T. Kechadi, Parallel and distributed clustering framework for big spatial data mining, International. Journal of Parallel, Emergent and Distributed Systems , pp. 1-19 (2018). https://doi.org/10.1080/17445760.2018.1446210.


29. A. Laouid, A. Dahmani, A. Bounceur, R. Euler, F. Lalem, H-R. Hassan and A. Tari, A Self-managing Volatile Key Scheme for Wireless Sensor Networks, Journal of Ambient Intelligence and Humanized Computing, pp 1–16 (2018). https://doi.org/10.1007/s12652-018-0772-9.


30.  M. Naili, M. Naili and A. Tari, Uncertainty In The Pert’s Critical Path. MATTER: International Journal of Science and Technology, 4(1) (2018). https://dx.doi.org/10.20319/mijst.2018.41.0109.


31. A. Elci, S. Kedjar, A. Tari and P. Bertok, An official publication of the Information Resources Management Association. International Journal of Distance Education Technologies, 16(3), (2018).


32. I.Kertiou, S. Benharzallah, L. Kahloul, M. Beggas, R. Euler, A. Laouid, and A. Bounceur, A dynamic skyline technique for a context-aware selection of the best sensors in an IoT architecture. Ad Hoc Networks, Volume 81, pp. 183-196 (2018). https://doi.org/10.1016/j.adhoc.2018.08.011.


2017


1.  H. Nacer, N. Djebari, H. Slimani and D. Aissani, A distributed authentication model for composite web services, Computers & Security 70, pp 144-178 (2017). https://doi.org/10.1016/j.cose.2017.05.008


2. K. Bouibed, H. Slimani and M.S. Radjef. Global efficiency for multiobjective bilevel programming problems under generalized invexity. Journal of Applied Mathematics and Computing 53(1), 507-530 (2017), https://doi.org/10.1007/s12190-015-0979-2 

3. A. Sebaa, A. Nouicer, A. Tari, R. Tarik and A. Ouhab. Decision support system for health care resources allocation. Electronic physician 9(6), pp. 4661-4668, 2017. http://dx.doi.org/10.19082/4661  

4. Z. Farah, Y.  Aït Ameur, M. Ouederni, K. Tari: A correct-by-construction model for asynchronously communicating systems. STTT 19(4): 465-485 (2017).

5. L. Cheklat, M. Amad, and A. Boukerram. A Limited Energy Consumption Model for P2P Wireless Sensor Networks. Wireless Personal Communications (Springer Publisher), 96(4), pp. 6299-6324, 2017. 

6. L. Cheklat, M. Amad, and A. Boukerram. Wireless Sensor Networks, State of Art and Recent Challenges: A survey. Sensor Letters (American Scientific Publishers), 15(9), pp. 697-719, 2017.

7. R. Boudjadja, M. Azni, A. Dahmani and M. N. Zennir. ‘‘Efficient Mobile Video Transmission based on a Joint Coding Scheme’’. Journal of Information and Communication Technology, Vol. 16, No. 2 (Dec) 2017, pp: 336–353.

8. N. Yessad, S. Bouchelaghem, F.S. Ouada and M. Omar. "Secure and reliable patient body motion based authentication approach for medical body area networks", Pervasive and Mobile Computing - Journal. 42, 351-370.

9. M. Mohammedi, M. Omar, and A. Bouabdallah. Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments. Journal of Ambient Intelligence and Humanized Computing (Springer Publisher), DOI: https://doi.org/10.1007/s12652-017-0574-5, 2017.

10. S. Zebboudj, F. Cherifi, M. Mohammedi, and M. Omar. Secure and efficient ECG- based authentication scheme for medical body area sensor networks. Smart Health (Elsevier Publisher), DOI: https://doi.org/10.1016/j.smhl.2017.07.001, 2017.

11. K. GHIDOUCHE, A. SIDER, R. COUTURIER, and C.GUYEUX. "Efficient high degree polynomial root finding using GPU." in Journal of Computational Science. Vol 18, pp :46-56. doi: http://10.1016/j.jocs2016.12.004. January 2017.

12. M. Ourbih-Tari, A. Zioui & A.O. Aloui,  Variance reduction in the simulation of a stationary M/G/1 queuing system using refined descriptive sampling,Communications in Statistics - Simulation and Computation Volume 46, 2017 - Issue 5

13. Y. Hidra.N. Kaid Tlilane. Evaluation du cadre juridique et réglementaire en termes de lutte contre l’insécurité routière en Algérie. Publication dans l’ouvrage “Sécurité routière : état des lieux et initiatives dans le monde", dirigé par Sandrine Gaymard et Teodor Tiplica. Edition l'Harmattan  logique sociale. Décembre 2017, ISBN : 978-2-343-13076-7, pp 167-196. 

14. Y. Hidra. Y, Kaid Tlilane. Analyse des déterminants comportementaux des usagers de la route dans les accidents en Algérie. Publication dans  l'ouvrage "sécurité routière: un défi à l'aube du XXI siècle" dirigé par Sandrine Gaymard et Teodor Tiplica Edition l'Harmattan  logique sociale février 2017, ISBN:978-2-343-10404-1 pp 233 – 252.

15. B. Idres, N. Kaid Tlilane. Évolution du parc automobile et des infrastructures routières : quelles incidences sur la sécurité routière en Algérie ? In : Gaymard S., Tiplica T Sécurité routière : Un défi à l'aube Du XXIème Siècle. Ed,  L'harmattan. France. (2017). PP 89 – 120. ISBN : 978-2-343-10404-1

16. M. Messaïli, N. Kaïd Tlilane, Dépenses publiques de santé et santé de la population en Algérie : une analyse économétrique. Recherche Originale. Revue Santé Publique (France), volume 29 / n° 3 mai – juin 2017. PP. 383-392. ISSN : 0995-3914. Revue indexée : Thomson Reuters et Scopus 2017.

17. A. Sebaa, A. Nouicer, A. Tari, T.Ramtani, and A. Ouhab, Decision support system for health care resources allocation, Electronic Physician, 9(6), pp. 4661-4668 (2017). https://doi.org/10.19082/4661. 

18. A. Laouid, A. Dahmani, A. Bounceur, R. Euler, F. Lalem and A. Tari, A distributed multi-path routing algorithm to balance energy consumption in wireless sensor networks, Ad Hoc Networks, Volume 64, pp. 53-64 (2017). https://doi.org/10.1016/j.adhoc.2017.06.006.

19. S. Sadouki-Chibani and A. Tari, Elephant herding optimization for service selection in QoS-aware web service composition, Int. J. Comput. Electr. Autom. Control Inf. Eng, Volume 11, pp. 1063-1067 (2017).

20. A. Sebaa, F. Chick, A. Nouicer and A. Tari, Research in big data warehousing using Hadoop, Journal of Information Systems Engineering & Management, 2(2), pp. 10 (2017). https://doi.org/10.20897/jisem.201710.

21. A. Laouid, A. Dahmani, A. Bounceur, R. Euler, F. Lalem and A. Tari, A distributed multi-path routing algorithm to balance energy consumption in wireless sensor networks. Ad Hoc Networks, Volume 64, pp. 53-64 (2017). https://doi.org/10.1016/j.adhoc.2017.06.006.

22. M. Saoudi, F. Lalem, A. Bounceur, R. Euler, M-T. Kechadi, A. Laouid, M. Bezoui, and M. Sevaux, D-LPCN: A distributed least polar-angle connected node algorithm for finding the boundary of a wireless sensor network, Ad Hoc Networks, Volume 56, pp. 56-71 (2017). https://doi.org/10.1016/j.adhoc.2016.11.010.

 

2016


1. H. Slimani and M.S. Radjef. Weak pseudo-invexity and characterizations of solutions in multiobjective programming. Applied Mathematics & Information Sciences: An International Journal, 10, No. 3 pp. 949-959 (2016). http://dx.doi.org/10.18576/amis/100313


2. M. Naili, A. Achroufene, M. Naili, Election-based method for fault tolerance in a hierarchical sensor network (EFTOHSN): a case study of an indoor localisation system. IJSNet 22(3): 158-165 (2016). https://www.inderscienceonline.com/doi/abs/10.1504/IJSNET.2016.080202


3. M. E. Khanouche, Y. Amirat, A. Chibani, M. Kerkar and A. Yachir, Energy-centered and QoS-aware services selection for Internet of Things, IEEE Tran. On Automation Science and Engineering, vol. 13, no. 3, pp. 1256–1269, Jul. 2016.


4. F.S. Ouada, M. Omar, A. Bouabdallah and A. Tari. Lightweight identity-based authentication protocol for wireless sensor networks. International Journal of Information and Computer Security", Inderscience, Volume 8, Number 2, Pages 121-138, 2016.


5. K. Amroun, Z. Habbas, W. Aggoune-Mtalaa, A compressed Generalized Hypertree Decomposition-based solving technique for non binary Constraint Satisfaction problems. AI COMMUNICATIONS journal, Volume 29, issue 2, pp 371-392, (2016).


7. Z. Habbas, K. Amroun, D. Singer, Generalized Hypertree Decomposition for solving non binary CSP with compressed table constraints. Rairo - Operations Research, Volume 50, issue 2, pp 241-267, (2016).


8. Foudi B., Kaïd Tlilane N. Les acteurs publics et privés dans le système de santé algérien : de la concurrence à la complémentarité.  Revue des Régions Arides (Tunisie), n° 40 (2/2016) – Numéro spécial. Editions Institut des Régions Arides Médenine. PP 301 – 311. ISSN : 0330 – 7956


9. N. Bouadem, R. Kacimi And A. Tari, Impact of  Duty-Cycling: Towards Mostly-Off Sensor Networks, International Journal of Business Data Communications and Networking, 12(1) , pp. 16-34 (2016). https://doi.org/10.4018/IJBDCN.2016010102 .


10. R. Houari, A. Bounceur, M-T. Kechadi, A. Tari, R. Euler, Dimensionality reduction in data mining: A Copula approach, Expert Systems with Applications, Volume 64, pp. 247-260 (2016), https://doi.org/10.1016/j.eswa.2016.07.041 .


11. F. Bouakkaz, M. Omar, S. Laib, L. Guermouz, A. Tari and A. Bouabdallah. Lightweight Sharing Scheme for Data Integrity Protection in WSNs, Wireless Pers Commun, Volume 89, pp. 211-226 (2016). https://doi.org/10.1007/s11277-016-3261-5.


12. B. Brahimi, M. Touahria, and A. Tari, Data and Text Mining Techniques for Classifying Arabic Tweet Polarity, Journal of Digital Information Management, vol. 14, num. (1), pp. 15-25 (2016).


13. M. Omar, H. Boufaghes, L. Mammeri, A. Taalba and A. Tari, Secure and reliable certificate chains recovery protocol for mobile ad hoc networks, Journal of Network and Computer Applications, Volume 62, pp. 153-162, (2016). https://doi.org/10.1016/j.jnca.2016.01.007.


14. S. Kedjar, A. Tari and P. Bertok, Access Control and Information Flow Control for Web Services Security, International Journal of Information Technology and Web Engineering (IJITWE), 11(1), pp. 44-76 (2016). https://doi.org/10.4018/IJITWE.2016010103.


15. T. Iggui, H. Nacer, Y. Sklab and T-A. Radi, Web Application for User Profiling, International Journal of Information Systems in the Service Sector (IJISSS), 8(2), pp. 44-56 (2016). https://doi.org/10.4018/IJISSS.2016040104.


2015

 


1. H. Slimani and M.S. Radjef. Generalized Fritz John optimality in nonlinear programming in the presence of equality and inequality constraints. Operational Research: An International Journal, 16(2), pp 349–364 (2015). https://doi.org/10.1007/s12351-015-0206-9


2. H. Slimani and H. Kheddouci. Saturated boundary k-alliances in graphs. Discrete Applied Mathematics 185 pp. 192–207 (2015). https://doi.org/10.1016/j.dam.2014.11.030


3. H. Slimani and M.S. Radjef. Fritz John type optimality and duality in nonlinear programming under weak pseudo-invexity. RAIRO-Operations Research 49, pp. 451–472 (2015). https://doi.org/10.1051/ro/2014046


4. A. Sebaa, A. Tari, T. Ramtani and A. Ouhab. DW RHSB: A framework for optimal allocation of health resources. International Journal of Computer Science, Communication & Information Technology (CSCIT), 2(1). pp. 12-17, 2015.


5. M. Naili, A. Boubetra, A. Tari, Y. Bouguezza, A. Achroufene, Brain-inspired method for solving fuzzy multi-criteria decision making problems (BIFMCDM). Expert Syst. Appl. 42(4): 2173-2183 (2015). https://doi.org/10.1016/j.eswa.2014.07.047


6. M. Omar, S. Hedjaz, S. Rebouh, K. Aouchar, B. Abbache and A. Tari. On-demand source routing with reduced packets protocol in mobile ad-hoc networks. AEU-International Journal of Electronics and Communications, vol. 69, num. (10) :1429–1436, 2015.


7. A. Aloui, A. Zioui, Ourbih-Tari, M. et A. Alioui. A general purpose module using refined descriptive sampling for installation in simulation systems; June 2015, Volume 30, Issue 2, pp 477–490


8. Z. Habbas, K. Amroun,D. Singer, A forward Checking algorithm based on a Generalised Hypertree Decomposition for solving non-binary Constraint Satisfaction Problems. Journal of experimental and theoretical Artificial Intelligence. Volume 27, issue 5, pp 649-671, 2015. http://dx.doi.org/10.1080/0952813X.2014.993507


9. M. Khammari, Y.Tlili, C.Bencheriet, Robust Face Detection using Haar Features with Weber Local Descriptor and Local Binary Pattern, International Journal of Knowledge-Based and Intelligent Engineering Systems, IOS Press, Vol 19, pp 117–123, 2015


10. M. Naili, A. Boubetra, A. Tari, Y. Bouguezza and A. Achroufene, Brain-inspired method for solving fuzzy multi-criteria decision making problems (BIFMCDM), Expert Systems with Applications, 42(4), pp. 2173-2183 (2015). https://doi.org/10.1016/j.eswa.2014.07.047.


11. D. E. Salhi, A.Tari, M-T. Kechadi, Clustering of optimized data for email forensics, RAIRO-Oper. Res. Volume 50, pp. 951-963 (2016). https://doi.org/10.1051/ro/2015057.


 

2014

 


1. H. Slimani and S.K. Mishra. Multiobjective fractional programming involving generalized semilocally V-type I-preinvex and related functions . International Journal of Mathematics and Mathematical Sciences, vol. 2014, Article ID 496149, 12 pages, (2014). https://doi.org/10.1155/2014/496149


2. N. Battat, H. Sebaa and H. Kheddouci. Monitoring in mobile ad hoc networks: A survey. Computer Networks 69 pp. 82-100 (2014). https://doi.org/10.1016/j.comnet.2014.04.013


3. A Belaid, D Boukerroui. A new generalised α scale spaces quadrature filters.  Pattern Recognition 47 (10), 3209-3224


4. H. EL Bouhissi, M. Malki and M. A. Sidi Ali. Cherif, From User’s Goal to Semantic Web Services Discovery: Approach Based on Traceability, International Journal of Information Technology and Web Engineering (IJITWE), 9(3), 15-39 (2014). https://doi.org/10.4018/ijitwe.2014070102


 

2013

 


1. H. El Bouhissi, M. Malki, D. Berramdane and R-E. Al-Qutaish, Using the Semantic Web Services to build a virtual medical analysis laboratory. American Journal of Software Engineering and Applications, 2(2) (2013). https://doi.org/10.11648/j.ajsea.20130202.17 


2. H. El Bouhissi, M. Malki and D. Berramdane, Applying Semantic Web Services. International Journal of Computer and Technology (IJCTE), IAEME. https://www.iaeme.com/ijca/issues.asp?JType=IJCA&VType=1&IType=2


 

 

MAP