Time filter

Source Type

Rabat, Morocco

Bousselham A.,Universite Ibn Tofail | Sadiki T.,Int University Of Rabat
2014 International Conference on Web and Open Access to Learning, ICWOAL 2014 | Year: 2015

Cloud Computing emerge as new IT paradigm, which aims to provide applications delivered as services over the Internet and the hardware and systems software in the data centers that provide those services, by sharing resources to achieve coherence and economies of scale. However, one of the most important occupations of cloud computing today is to ensure the security of the infrastructure. This paper brings an introduction to the virtualization in a cloud environment. In the first place we will describe the principle of operation of a virtual network in the platform Xen, then we will discuss some possible attacks on these networks. In the end, we will introduce an analysis of some models of IDS applied to the cloud computing. © 2014 IEEE. Source

El Haddioui A.,Abdelmalek Essaadi University | El Mamoune S.,Abdelmalek Essaadi University | Cherrat L.,Abdelmalek Essaadi University | Ezziyyani M.,Abdelmalek Essaadi University | And 2 more authors.
WCCCS 2014 - Proceedings; 2014 5th Workshop on Codes, Cryptography and Communication Systems | Year: 2014

E-health technologies can play a major role in improving the lives of patients and especially with chronic diseases, these technologies can provide quality care at a distance without consulting their doctor regularly. These technologies provide many benefits for all stakeholders: patients and health providers to patients, the main advantage of e-health is remote access of this information, and communications services as well as communication. Directly with professionals and health services without having to travel to doctors. For providers of health, the main advantages of e-health is improving access to real patient data remotely and improve the quality of their decision and their services through systems help in the decision. We propose in this paper to compare the two techniques of data mining association rules and decision trees in discussing their advantages and limitations depending on the efficiency, accuracy and timeliness in real time. Our discussion leads us to propose a new solution of a system of monitoring and suggestion based on the hybrid use of association rules and decision trees where the association rules in first phase is used to generate the relevant relationships for a homogeneous group of patients who share the same profile and the second phase involves generating a decision tree for each group of patients, from medical relationships that are generated in the first phase and the elimination of transitivity and regenerating the canonical decision tree. © 2014 IEEE. Source

Hatim A.,Cadi Ayyad University | Belkouch S.,Cadi Ayyad University | Sadiki T.,Int University Of Rabat | M'Rabet Hassani M.,Cadi Ayyad University
2013 25th International Conference on Microelectronics, ICM 2013 | Year: 2013

In this paper, we propose a low complexity architecture for direct 2D-DCT computation. The architecture will transform the pixels from spatial to spectral domain with the required quality constraints of the compression standards. In our previous works we introduced a new fast 2D-DCT with low computations: only 40 additions are used and no multiplications are needed. Based on that algorithm we developed in this work a new architecture to achieve the computations of the 2D DCT directly without using any transposition memory. We defined S k functions blocks to build the 2D DCT architecture. The S k block perform 8 function depending on the control signals of the system. The number of additions/subtractions used is 63, but no multiplication or memory transposition is needed. The architecture is suitable for usage with statistical rules to predict the zero quantized coefficients, which can considerably reduce the number of computation. We implemented the design using an FPGA Cyclone 3. The design can reach up to 244 MHz and uses 1188 logic elements, and it respect the real time video requirements. © 2013 IEEE. Source

Discover hidden collaborations