Time filter

Source Type

Drir N.,University of Science and Technology Houari Boumediene | Barazane L.,University of Science and Technology Houari Boumediene | Loudini M.,Laboratoire Of Communication Dans Les Systemes Informatiques
2014 International Conference on Electrical Sciences and Technologies in Maghreb, CISTEM 2014 | Year: 2014

The aim of the present research is the comparative for variety controller of maximum power point tracking (MPPT) in photovoltaic system under variable temperature and isolation conditions. The first controller refers to traditional approach based on the perturbation & observation (P&O) methods, the second and third one refers to new approach based respectively on artificial neural network (ANN) and fuzzy logic (FC). The performances of these adopted controllers are examined and compared through a series of simulation witch shown the good tracking and rapid response to change in different meteorological conditions of intelligent controllers compare with the conventional one. © 2014 IEEE. Source

Bouabana-Tebibel T.,Laboratoire Of Communication Dans Les Systemes Informatiques
Proceedings of the 2011 IEEE International Conference on Information Reuse and Integration, IRI 2011 | Year: 2011

UML is often formalized by means of a denotational semantics based on state-transition languages. The obtained models are afterwards verified to prove the UML diagrams correctness. We propose, in this paper, an approach to initialize object Petri net models at any time of the system life cycle starting from UML diagrams. The OPNs marking regarding objects is mainly deduced from the sequence diagram. The object diagram is used to provide the object signature. A case study is given to illustrate the approach. © 2011 IEEE. Source

Bouabana-Tebibel T.,Laboratoire Of Communication Dans Les Systemes Informatiques | Rubin S.H.,Systems Center Pacific | Bennama M.,Laboratoire Of Communication Dans Les Systemes Informatiques
Advances in Intelligent Systems and Computing | Year: 2015

In this paper, we propose a new approach to formally analyze UML CombinedFragments. The latter are mapped into Colored Petri Nets, or CPN. The derived specification is value-oriented, composed of identified objects and events, thus allowing for a more precise analysis of the model behavior. To verify that the CPN model preserves the system properties, we use OCL invariants. This use induces the need for specifying the association ends on the behavioral models. The analysis results are in the form of CPNTools reports. They, consequently, are not necessarily comprehensible to UML designers. Automatic analysis of the CPNTools results is, therefore, provided. It is followed by an interpretation of these results and their feedback to the user, expressed in UML language. © Springer International Publishing Switzerland 2015. Source

Yahiaoui C.,Laboratoire Of Communication Dans Les Systemes Informatiques | Aouine Y.,University of Science and Technology Houari Boumediene | Bouhali M.,University of Science and Technology Houari Boumediene | Bessah N.,Laboratoire Of Communication Dans Les Systemes Informatiques
Proceedings - UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, UKSim 2014 | Year: 2014

In this paper we investigate a comprehensive analysis of Long Term Evolution Advanced (LTE) downlink (DL) physical layer performance using Multi Input Multi Output channel (MIMO) based on standard parameters. The work consists firstly in modeling LTE physical downlink shared channel (PDSCH). The developed model is based on an independent functional blocks in order to facilitate reproduction of signal processing techniques results used in LTE and particularly to evaluate the physical layer downlink components. Thereafter, it was integrated in the simulator, basic structure with AWGN channel including evaluation of using diversity and spatial multiplexing transmissions on downlink connections and multipath fading channel model. The simulation examples are illustrated with different digital modulation and MIMO scheme. BER and throughput results with multipath impact on transmission channel quality are also considered. These results show that the model implemented in Matlab faithfully advantages introduced in the LTE system. © 2014 IEEE. Source

Bouabana-Tebibel T.,Laboratoire Of Communication Dans Les Systemes Informatiques | Kaci A.,Laboratoire Of Communication Dans Les Systemes Informatiques
Computers and Security | Year: 2015

Data confidentiality in the Cloud Computing is a very challenging task. Encryption is one of the most secure methods ensuring this task, and searchable encryption techniques are used to search on encrypted data without the need for decryption. But, despite this secure measure some leaks may appear when searching over data. In this article, we propose to improve confidentiality of outsourced data. We are particularly interested in reinforcing the access control on the search result, when the search is performed over encrypted data. The property behind this aspect of security is known as ACAS (Access Control Aware Search) principle. We present a hybridization of Searchable Encryption and Attribute Based Encryption techniques in order to satisfy the ACAS property. The proposed model supports a personalized and secure multi-user access to outsourced data, presenting high search performance. It deals with multi-keywords searches and is designed to speed up the search time by taking advantage of High Performance Computing, which is widely used in Cloud Computing. Two Attribute Based Encryption techniques are considered on the side of the Cloud and some conducted experiments show the efficiency of the proposed method. © 2015 Elsevier Ltd. Source

Discover hidden collaborations