INNOVCOM Laboratory

Ariana, Tunisia

INNOVCOM Laboratory

Ariana, Tunisia
SEARCH FILTERS
Time filter
Source Type

Bannour A.,InnovCom Laboratory | Ammari M.L.,InnovCom Laboratory | Sun Y.,University of Hertfordshire | Bouallegue R.,InnovCom Laboratory
Wireless Personal Communications | Year: 2013

Algebraic Space-Time Codes (ASTC) for Multiple Input Multiple Output (MIMO) systems are based on quaternion algebras. Thanks to their algebraic construction, the ASTC codes are full-rank, full-rate and have the non-vanishing determinant property. These codes have been proposed for MIMO flat fading channels in order to increase the spectral efficiency and to maximize the coding gain. The purpose of this work is to analyze the performance of the ASTC in a frequency selective Rayleigh channel. To deal with the frequency selectivity, we use the OFDM modulation. The capacity performances of an ASTC-MIMO-OFDM system, under correlated Rayleigh frequency-selective channel, have been evaluated. © 2012 Springer Science+Business Media, LLC.


Saoud S.,INNOVCOM Laboratory | Cherif A.,INNOVCOM Laboratory
International Review on Computers and Software | Year: 2013

This paper presents a novel system for Arabic speech recognition of Arabic isolated words with mono-locutor and a small vocabulary. We have used a database consisting of eleven isolated Arabic words each of them was repeated twenty five times by the same -locutor. Mel Frequency Cepstral Coefficient (MFCC) and Bionic Wavelet Transform (BWT) are used for feature extraction from each recorded word. The obtained coefficients were then concatenated to construct one input node of a Multi-Layer Perceptual (MLP) used for features classification and recognition. We describe in this paper the use of Genetic Algorithm (GA) for optimizing the topology of each Multi-Layer Perceptron (MLP). So, the GA is utilized to find the optimal number of neurons in input layer and in hidden layer, the training epochs and the learning goal of network. From the results, it was observed that the integration of the GA with feed forward network can improve classification rate to 100%. © 2013 Praise Worthy Prize S.r.l. - All rights reserved.


Salhi R.,InnovCom Laboratory | Laabidi M.,InnovCom Laboratory | Choubani F.,InnovCom Laboratory
Call for Papers - ICCEM 2016: 2016 IEEE International Conference on Computational Electromagnetics | Year: 2016

Metamaterials have attracted much attention in recent years because of their electromagnetic exquisite proprieties. For this we will introduce in this paper the modeling of a whole structure in metamaterials by equivalent circuit model. We begin by modeling the SRR (Split Ring Resonator), then we model the HIS (High Impedance Surfaces). In order to validate models, we compare the results obtained by an equivalent circuit models with numerical simulation. © 2016 IEEE.


Chihi H.,Innovcom Laboratory | Bouallegue R.,Innovcom Laboratory
Wireless Personal Communications | Year: 2017

Green communication has become the main concern of many researchers according to the quick evolution of wireless communication applications. For this, in this correspondence we develop a cross-layer framework based on the joint association between Modulation and Coding Scheme together with truncated Selective Repeat Hybrid Automatic Repeat Request type I to examine the global energy consumption per bit of Multiband Orthogonal Frequency Division Multiplexing Ultra Wideband (MB-OFDM UWB) systems. Indeed, we examine a theoretical analysis based on throughput performance investigation when mode selection is performed which is dynamically selected following the Channel State Information. Next, we prove that cross-layer design outperforms the mode selection behavior in terms of outage probability. Then, based on the features of cross-layer MB-OFDM UWB (MB-UWB) design a theoretical framework is derived in terms of Packet Error Rate and overall energy expenditure per bit. Specifically, the closed form relation of energy per bit is determined by exploiting the proprieties of the two link adaptation tools. Correspondingly, since the purpose behind cross-layer design adoption into MB-UWB system is EE improvement, we have compared the impact of different M-QAM modulations into energy consumption per useful bit at various range of distances. The obtained results reveal that cross-layer design is a powerful solution in terms of EE enhancement. © 2017 Springer Science+Business Media, LLC


Khedher O.,InnovCom Laboratory | Jarraya M.,University of Dammam
Proceedings of the 2015 International Conference on High Performance Computing and Simulation, HPCS 2015 | Year: 2015

Cloud Computing has empowered the academic communities by reducing the IT infrastructure administration and cost. As one of several cloud computing solutions, Virtual Cloud Laboratory (VCL) has improved many universities experience by providing hand-on labs for each course per class. VCL has multiple deployment requirements. Although it represents a simplified architecture design, treating a large size VCL deployment might be challenging. In addition, putting the performance of resource allocation policies and different scheduling algorithms under scope could help to quantify the workload running in a real and expanded VCL environment. We aim through this study at identifying the limitations of the default scheduler in VCL and propose an enhanced scheduler. By simulating a VCL cloud computing environment, it might be possible to prove different scheduling algorithms and their impact from performance perspective. © 2015 IEEE.


Khedher O.,InnovCom Laboratory | Jarraya M.,Saudi Electronic University
Proceedings of the 2015 International Conference on High Performance Computing and Simulation, HPCS 2015 | Year: 2015

Cloud computing covers a wide range of applications, from online services for the end user. It becomes the new trends for most organizations to handle their business IT units. Services provided are becoming flexible because the resources and processing power available to each can be adjusted on the fly to meet changes in need [6]. However, infrastructures deployed on a cloud computing environment may induce significant performance penalties for the demanding computing workload. In our doctoral research, we aim to study, analyze, evaluate and improve performance in cloud computing environment based on different criteria. To achieve the thesis objectives, a research performed is based on a quantitative analysis of repeatable empirical experiment. © 2015 IEEE.


Laouini N.,SYSCOM Laboratory | Ben Hadj Slama L.,INNOVCOM Laboratory | Bouallegue A.,SYSCOM Laboratory
2012 9th International Conference on High Capacity Optical Networks and Enabling Technologies, HONET 2012 | Year: 2012

The Layered Belief Propagation L-BP algorithm is is a modified Belief Propagation BP algorithm, where the check nodes are divided in subgroups called layers and each iteration is broken into multiple sub-iterations. In this paper, we consider layered belief propagation decoding and propose an efficient variable node layering for decoding LDPC codes that performs well. We compare the performance of the first introduced LDPC decoding algorithm BP and Layered BP using check node layering with Layered BP using variable node layering in terms of bit error rate (BER). We show that the convergence for decoding LDPC codes is increasing by using a simple and efficient layering strategy. © 2012 IEEE.


Jarraya M.,University of Dammam | Khedher O.,InnovCom Laboratory
2015 International Conference on Cloud Computing, ICCC 2015 | Year: 2015

In this paper we are proposing a time response optimization in a cloud computing based virtual training lab solution. The Virtual Training Lab (VTL) represents a true cloud computing solution that has been optimized for the educational and research needs of the academic community. It is essential to understand what kind of technologies could be evolved in cloud computing to make it possible. Basically, the virtualization is being the most important one. In the last few years, and due to the hypervisors, virtualization has been well used and integrated by many. The fact that many hypervisors have been created, it is important to classify them and be aware about their strength points and drawbacks as well. This manuscript provides an analysis of some of today commonly accepted virtualization technologies from feature comparison to performance analysis. Such result asserts are very important to construct an optimized response time in a cloud computing solution for training and laboratories. © 2015 IEEE.


Ghilen A.,National Engineering School of Tunis | Azizi M.,University Mohammed Ist Oujda | Bouallegue R.,InnovCom Laboratory
Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA | Year: 2016

In a security context, to render a cryptosystem more resistant against man-in-the-middle and impersonation attacks, an authentication mechanism has to be considered. CHAP protocol (Challenge Handshake Authentication Protocol) is among the most widely spread authentication technique used within Local Area Networks. To offer greater robustness and privacy, we intend through our present paper to introduce a new quantum extension of CHAP that integrates quantum cryptography and takes advantage of its benefits such as eavesdropping detection, random secret key generation and unconditional security. A new scheme using a previously shared entangled qubits pairs with quantum unitary operators to ensure key agreement and mutual authentication is performed. To analyze the security of the proposed protocol, we use the PRISM tool as a model checker. We particularly focus on the security property of minimizing the quantity of information about the key that an enemy can obtain from applying a 'man in the middle' attack. If we act on the parameters of the channel and the eavesdropper, we prove that this security property is affected by varying the efficiency of the channel as well as the power of the enemy. More interestingly, we show that the enemy could never be able to retrieve the value of the key. © 2015 IEEE.


Ghilen A.,National Engineering School of Tunis | Azizi M.,University Mohammed Ist Oujda | Bouallegue R.,InnovCom Laboratory
Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA | Year: 2016

By relying upon the laws of quantum physics, quantum cryptography is reaching an extremely high level of security guarantee. It allows establishing a secret and perfectly random key material between two network nodes. It improves the contemporary cryptographic methods based only on computational security by integrating a quantum cryptographic solution. Since quantum technology becomes an attractive prospect, our overriding objective is to provide a quantum key agreement scheme that properly authenticates users in 802.11i networks. In this paper, we introduce a quantum scheme, for mutual authentication and key establishment for the integration within IEEE 802.11 networks towards absolute communication security. The key issued from the quantum algorithm authenticates the two endpoints and will be used for building the pairwise key and the group key hierarchies. To analyze the security of our approach, a formal verification of some security properties is performed using PRISM as a model checker tool. © 2015 IEEE.

Loading INNOVCOM Laboratory collaborators
Loading INNOVCOM Laboratory collaborators