INNOVCOM Laboratory

Ariana, Tunisia

INNOVCOM Laboratory

Ariana, Tunisia

Time filter

Source Type

Bannour A.,InnovCom Laboratory | Ammari M.L.,InnovCom Laboratory | Sun Y.,University of Hertfordshire | Bouallegue R.,InnovCom Laboratory
Wireless Personal Communications | Year: 2013

Algebraic Space-Time Codes (ASTC) for Multiple Input Multiple Output (MIMO) systems are based on quaternion algebras. Thanks to their algebraic construction, the ASTC codes are full-rank, full-rate and have the non-vanishing determinant property. These codes have been proposed for MIMO flat fading channels in order to increase the spectral efficiency and to maximize the coding gain. The purpose of this work is to analyze the performance of the ASTC in a frequency selective Rayleigh channel. To deal with the frequency selectivity, we use the OFDM modulation. The capacity performances of an ASTC-MIMO-OFDM system, under correlated Rayleigh frequency-selective channel, have been evaluated. © 2012 Springer Science+Business Media, LLC.


Saoud S.,INNOVCOM Laboratory | Cherif A.,INNOVCOM Laboratory
International Review on Computers and Software | Year: 2013

This paper presents a novel system for Arabic speech recognition of Arabic isolated words with mono-locutor and a small vocabulary. We have used a database consisting of eleven isolated Arabic words each of them was repeated twenty five times by the same -locutor. Mel Frequency Cepstral Coefficient (MFCC) and Bionic Wavelet Transform (BWT) are used for feature extraction from each recorded word. The obtained coefficients were then concatenated to construct one input node of a Multi-Layer Perceptual (MLP) used for features classification and recognition. We describe in this paper the use of Genetic Algorithm (GA) for optimizing the topology of each Multi-Layer Perceptron (MLP). So, the GA is utilized to find the optimal number of neurons in input layer and in hidden layer, the training epochs and the learning goal of network. From the results, it was observed that the integration of the GA with feed forward network can improve classification rate to 100%. © 2013 Praise Worthy Prize S.r.l. - All rights reserved.


Khedher O.,InnovCom Laboratory | Jarraya M.,University of Dammam
Proceedings of the 2015 International Conference on High Performance Computing and Simulation, HPCS 2015 | Year: 2015

Cloud Computing has empowered the academic communities by reducing the IT infrastructure administration and cost. As one of several cloud computing solutions, Virtual Cloud Laboratory (VCL) has improved many universities experience by providing hand-on labs for each course per class. VCL has multiple deployment requirements. Although it represents a simplified architecture design, treating a large size VCL deployment might be challenging. In addition, putting the performance of resource allocation policies and different scheduling algorithms under scope could help to quantify the workload running in a real and expanded VCL environment. We aim through this study at identifying the limitations of the default scheduler in VCL and propose an enhanced scheduler. By simulating a VCL cloud computing environment, it might be possible to prove different scheduling algorithms and their impact from performance perspective. © 2015 IEEE.


Khedher O.,InnovCom Laboratory | Jarraya M.,Saudi Electronic University
Proceedings of the 2015 International Conference on High Performance Computing and Simulation, HPCS 2015 | Year: 2015

Cloud computing covers a wide range of applications, from online services for the end user. It becomes the new trends for most organizations to handle their business IT units. Services provided are becoming flexible because the resources and processing power available to each can be adjusted on the fly to meet changes in need [6]. However, infrastructures deployed on a cloud computing environment may induce significant performance penalties for the demanding computing workload. In our doctoral research, we aim to study, analyze, evaluate and improve performance in cloud computing environment based on different criteria. To achieve the thesis objectives, a research performed is based on a quantitative analysis of repeatable empirical experiment. © 2015 IEEE.


Laouini N.,SYSCOM Laboratory | Ben Hadj Slama L.,INNOVCOM Laboratory | Bouallegue A.,SYSCOM Laboratory
2012 9th International Conference on High Capacity Optical Networks and Enabling Technologies, HONET 2012 | Year: 2012

The Layered Belief Propagation L-BP algorithm is is a modified Belief Propagation BP algorithm, where the check nodes are divided in subgroups called layers and each iteration is broken into multiple sub-iterations. In this paper, we consider layered belief propagation decoding and propose an efficient variable node layering for decoding LDPC codes that performs well. We compare the performance of the first introduced LDPC decoding algorithm BP and Layered BP using check node layering with Layered BP using variable node layering in terms of bit error rate (BER). We show that the convergence for decoding LDPC codes is increasing by using a simple and efficient layering strategy. © 2012 IEEE.


Jarraya M.,University of Dammam | Khedher O.,InnovCom Laboratory
2015 International Conference on Cloud Computing, ICCC 2015 | Year: 2015

In this paper we are proposing a time response optimization in a cloud computing based virtual training lab solution. The Virtual Training Lab (VTL) represents a true cloud computing solution that has been optimized for the educational and research needs of the academic community. It is essential to understand what kind of technologies could be evolved in cloud computing to make it possible. Basically, the virtualization is being the most important one. In the last few years, and due to the hypervisors, virtualization has been well used and integrated by many. The fact that many hypervisors have been created, it is important to classify them and be aware about their strength points and drawbacks as well. This manuscript provides an analysis of some of today commonly accepted virtualization technologies from feature comparison to performance analysis. Such result asserts are very important to construct an optimized response time in a cloud computing solution for training and laboratories. © 2015 IEEE.


Ghilen A.,Tunis el Manar University | Azizi M.,University Mohamed Ist Oujda | Bouallegue R.,Innovcom Laboratory
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015

Virtual Private Network (VPN) tunnels are cryptographic solutions that enable sensitive information to be transmitted over an untrusted environment, and ensure the most imperative security services such as confidentiality,integrity, and authentication. OpenVPN is an open source implementation of VPN. In the present work, we propose the deployment of a quantum protocol for cryptographic key exchange and authentication within OpenVPN between both sides of the tunnel. Our approach is a prominent step towards unconditional security based on the laws of quantum physics. Despite the huge progress in the quantum research field, quantifying the confidence and secrecy of the proposed scheme still remains a hard task. In this context, we adopt a probabilistic approach based on the technique of Model Checking, using the PRISM tool. We basically focus on two pioneering security properties: the ability to detect an eavesdropper independently of its computational power and the minimization of the amount of information gained by the eavesdropper about the secret key. © Springer International Publishing Switzerland 2015.


Ghilen A.,National Engineering School of Tunis | Azizi M.,University Mohammed Ist Oujda | Bouallegue R.,InnovCom Laboratory
Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA | Year: 2016

In a security context, to render a cryptosystem more resistant against man-in-the-middle and impersonation attacks, an authentication mechanism has to be considered. CHAP protocol (Challenge Handshake Authentication Protocol) is among the most widely spread authentication technique used within Local Area Networks. To offer greater robustness and privacy, we intend through our present paper to introduce a new quantum extension of CHAP that integrates quantum cryptography and takes advantage of its benefits such as eavesdropping detection, random secret key generation and unconditional security. A new scheme using a previously shared entangled qubits pairs with quantum unitary operators to ensure key agreement and mutual authentication is performed. To analyze the security of the proposed protocol, we use the PRISM tool as a model checker. We particularly focus on the security property of minimizing the quantity of information about the key that an enemy can obtain from applying a 'man in the middle' attack. If we act on the parameters of the channel and the eavesdropper, we prove that this security property is affected by varying the efficiency of the channel as well as the power of the enemy. More interestingly, we show that the enemy could never be able to retrieve the value of the key. © 2015 IEEE.


Ghilen A.,National Engineering School of Tunis | Azizi M.,University Mohammed Ist Oujda | Bouallegue R.,InnovCom Laboratory
Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA | Year: 2016

By relying upon the laws of quantum physics, quantum cryptography is reaching an extremely high level of security guarantee. It allows establishing a secret and perfectly random key material between two network nodes. It improves the contemporary cryptographic methods based only on computational security by integrating a quantum cryptographic solution. Since quantum technology becomes an attractive prospect, our overriding objective is to provide a quantum key agreement scheme that properly authenticates users in 802.11i networks. In this paper, we introduce a quantum scheme, for mutual authentication and key establishment for the integration within IEEE 802.11 networks towards absolute communication security. The key issued from the quantum algorithm authenticates the two endpoints and will be used for building the pairwise key and the group key hierarchies. To analyze the security of our approach, a formal verification of some security properties is performed using PRISM as a model checker tool. © 2015 IEEE.


Ghilen A.,National Engineering School of Tunis | Azizi M.,University Mohammed Ist Oujda | Bouallegue R.,InnovCom Laboratory
Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA | Year: 2016

The expanded use of wireless networks has led to significant improvement in security approaches that aim to protect information. Providing secure communication for wireless local area network (WLAN) has become one of the prime concerns. The current standard for exchanging a secret key to authenticate users and ensure secure data transmission within EAP-TLS protocol relies on Public Key Infrastructure. This technique remains secure only in case of limited computational power of eavesdroppers. Thus, we propose a quantum extension of EAP-TLS which allows exchanging a cryptographic key and authenticating a remote client peer with absolute security, ensured by the laws of quantum laws. © 2015 IEEE.

Loading INNOVCOM Laboratory collaborators
Loading INNOVCOM Laboratory collaborators