Jalal Laassiri - Academia.edu (original) (raw)

Papers by Jalal Laassiri

Research paper thumbnail of Data Security and risks for IoT in intercommunicating objects

Nowadays Internet of Things" (IoT) codes are passive entities that encode information, The g... more Nowadays Internet of Things" (IoT) codes are passive entities that encode information, The goal of this work is to give explicit interconnections between IoT specifications and interpreting IoT codes and information's in order to exchange information to fulfill tasks for the users. Deploying existing data security solutions to the Internet of Things (IoT) is not straightforward because of device heterogeneity, highly dynamic and possibly unprotected environments, and large scale. It is well-known the existence of a closed relation between IoT systems over finite fields and Security and risks systems that allow to understand some properties of computational security codes and to construct them. An accurate look at the IoT structure of information using techniques of smart systems information as well a study of input-state-output representation smart control systems, For the Internet of Things security based Internet Language we intend to analyze both the theoretical security...

Research paper thumbnail of 8. A prediction MapReduce-based TLBO-FLANN model for angiographic disease status value

Computational Intelligence, 2020

Research paper thumbnail of Comparative study and simulation of flat and hierarchical routing protocols for wireless sensor network

2016 International Conference on Engineering & MIS (ICEMIS), 2016

Sensor Networks are emerging as a new tool for important applications in diverse fields like mili... more Sensor Networks are emerging as a new tool for important applications in diverse fields like military surveillance, habitat monitoring, monitoring and gathering events in hazardous environments, surveillance of buildings, whether monitoring etc, In the research area of wireless sensor networks the Flat and hierarchical routing protocols is a major issue. In this paper we intend to discuss some of the major Flat routing protocols (AODV, DSDV, GSR, FSR, OLSR, SPIN) and hierarchical routing protocols (LEACH-C, LEACH-F, PEGASIS, ZHLS) for wireless sensor networks. First we will discuss the routing protocols in short and later we will compare and simulate the behavior on lifetime and energy using NS2 simulator.

Research paper thumbnail of Reliability of transport data and energy efficient in Wireless Sensor Networks: A literature survey

2016 International Conference on Engineering & MIS (ICEMIS), 2016

Sensor technologies are vital today in gathering information about certain environments and Wirel... more Sensor technologies are vital today in gathering information about certain environments and Wireless Sensors Networks (WSNs) are getting more widespread use every day. The recent advances in Wireless Sensor Networks open new scenarios where sensors can be rapidly deployed without any existing infrastructure. Such networks are useful in many fields, such as smart grid, smart water networks, intelligent transportation, smart homes, health monitoring, environmental control, military applications, etc. Ensuring energy efficient and reliable transport of data in resource constrained WSNs is one of the primary concerns to achieve a high degree of efficiency in monitoring and control systems. In WSN, reliable monitoring of a phenomenon depends on the collective data provided by the target cluster of sensors and not on any individual node, There are several strategies to reduce the power consumption of WSN nodes by increasing the network lifetime and increase the reliability of the network by improving the WSN Quality of Service. However, there is an inherent conflict between power consumption and reliability. This paper describes the concept of WSNs which has been made viable by the convergence of microelectronics systems technology and wireless communications.

Research paper thumbnail of Design a New Architecure of Audio Amplifiers Class-D for a Hardware Mobile Systems

International Journal of Computer Science and Application, Aug 1, 2012

This paper presents the advantages of using Audio amplifiers-class-D which has an important role ... more This paper presents the advantages of using Audio amplifiers-class-D which has an important role in every mobile system involving an audible sound. General power amplifiers till recently have been very inefficient, bulky and unreliable. Though Class AB amplifiers have major market share in the audio industry because of their efficiency compared to previous classes of amplifiers such as Class A and Class B, recent demand for smaller devices with longer battery life has resulted in replacement of class AB amplifiers (linear amplifiers) with Class D (switching amplifiers). Class D amplifiers provide the balance between efficiency and distortion required by portable devices, hi-fi audio systems, as they utilize the switching operation where the transistors are either fully on or fully off resulting in amplification with zero power dissipation ideally. The main focus of this thesis is to analyze various design issues involved in the implementation of class D amplifiers. As many designers in the future will be switching to Class D amplifiers because of the recent advances in switching amplifiers, an effort was made to develop the thesis so as to be able to serve as a basic reference guide which gives them a good understanding of existing architectures, challenges in efficient power amplifier design, modulation methods, power stage topologies and implementation of class D amplifiers. A detailed study of parameters and parasitic that affect the performance of class D amplifiers has been carried out with design, implementation, and simulation of various stages. Various component selection decisions and layout issues have been discussed for an efficient, low distortion class D amplifier.

Research paper thumbnail of Mobile Agent Security Based on Mutual Authentication and Elliptic Curve Cryptography

International Journal of Innovative Technology and Exploring Engineering, 2019

Mobile agent system is a satisfying solution for the implementation and maintenance of applicatio... more Mobile agent system is a satisfying solution for the implementation and maintenance of applications distributed over large-scale networks, this solution is very used in solving complex problems since they are autonomous, Intelligent, robust and fault- tolerant. Mobile agents have the capacity to migrate from one node to another all over the network allowing reduction in communication costs. Although they possess all these advantages, using them in distributed environment increases the threat to mobile agent security and during their mobility they can face different types of attacks such as of attacks like Replay attack, man-in-the-middle attack, Cookie theft attack, Offline password guessing attack, Stolen-verifier attack. In this paper we investigate the security of distributed mobile agent system. We propose a solution based on a secure Elliptic Curve Cryptography (ECC) protocol to ensure mutual authentication and protect the agent from different known attacks. The implementation ...

Research paper thumbnail of ICCSRE2018 Persentation

Research paper thumbnail of Specifying Behavioralconcepts by Engineering Language of RM-Odp 1

Distributed systems can be very large and complex and the many different considerations which inf... more Distributed systems can be very large and complex and the many different considerations which influence their design can result in a substantial body of specification, which needs a structuring framework if it is to be managed successfully. The purpose of the RM-ODP is to define such a framework. The Reference Model for Open Distributed Processing (RM-ODP) provides a framework within which support of distribution, inter-working and portability can be integrated. It defines: an object model, architectural concepts and architecture for the development of ODP systems in terms of five viewpoints. However, RM-ODP is a meta-norm, and several ODP standards have to be defined. Indeed, the viewpoint languages are abstract in sense that they define what concepts should be supported and not how these concepts should be represented using the UML/OCL meta-modeling approach. In this paper, we report on the definition and address of the syntax and semantics for a fragment of ODP object concepts de...

Research paper thumbnail of Energy Consumption in Wireless Sensor Network : Simulation and Compartative Study of Flat and Hierarchical Routing Protocols

Sensor networks are dense wireless networks of small, low-cost sensors, which collect and dissemi... more Sensor networks are dense wireless networks of small, low-cost sensors, which collect and disseminate environmental data, it used in a variety of fields like military surveillance, habitat monitoring, monitoring and gathering events in hazardous environments, surveillance of buildings, whether monitoring etc. In wireless sensor networks Flat and Hierarchical routing are two most typical routing protocols. Comparing the two routing protocols (flat / hierarchical) is very important to know well the performance of each routing, for that, in this paper we will discuss in first some of the major Flat routing protocols (AODV, DSDV, GSR, FSR, OLSR, SPIN) and hierarchical routing protocols (LEACH-C, LEACH-F, PEGASIS, ZHLS) for wireless sensor networks, and later we will compare and simulate the behavior on lifetime and energy using NS2 simulator for flat and hierarchical routing protocols.

Research paper thumbnail of Energy Saving in Wireless Sensor Networks: Urban Traffic Management Application

Since ten years, researches on the technology of wireless sensor network (WSN) in the field of ur... more Since ten years, researches on the technology of wireless sensor network (WSN) in the field of urban traffic management succeed without proposing a reliable solution for all the constraints suffered. In this article, we study the scenario of using a wireless sensor network to control traffic lights an urban transport network and optimize its functioning by reducing the average waiting time of users and traffic fluidity. We are interested in a simple network at an intersection. Our study provides primarily, a study of the researches work that were done, and who are at the present time, in order to solve the number of communication problem between network of sensor node and the traffic light controller (each node collects data and sends them) with the consideration of energy consumption. it is termed the energy of communication. Note that the energy of communication represents the largest portion of the energy consumed by a sensor node. So, it is necessary minimize energy costs, becau...

Research paper thumbnail of Devant le jury

A mes parents, A toute la famille A Tous mes amies Et, à tous ceux qui me sont chersREMERCIEMENTS... more A mes parents, A toute la famille A Tous mes amies Et, à tous ceux qui me sont chersREMERCIEMENTS Les travaux présentés dans cette thèse ont été effectués au sein de l’UFR de " Mathématiques et Informatique et Applications " du Département de Mathématiques et Informatique à la faculté des sciences de l’Université Mohammed V- Agdal. Je tiens à remercier tout d’abord très vivement mon encadrant de thèse Monsieur Said ELHAJJI, Professeur d’enseignement supérieures à la faculté des sciences de Rabat, pour son soutien, sa disponibilité, sa patience, sa collaboration étroite et son aide qui m’ont permis de mener à bien cette thèse. J’espère avoir été à la hauteur de ses attentes. Je suis aussi particulièrement reconnaissant envers Monsieur Mohamed BOUHDADI, Professeur à la faculté des sciences de Rabat, pour avoir accepté de diriger cette thèse mais aussi pour sa disponibilité et ses nombreux conseils et orientations décisives pour la concrétisation de la présente recherche.

Research paper thumbnail of 1 Specifying Behavioralconcepts by Engineering Language of RM-Odp

Distributed systems can be very large and complex and the many different considerations which inf... more Distributed systems can be very large and complex and the many different considerations which influence their design can result in a substantial body of specification, which needs a structuring framework if it is to be managed successfully. The purpose of the RM-ODP is to define such a framework. The Reference Model for Open Distributed Processing (RM-ODP) provides a framework within which support of distribution, inter-working and portability can be integrated. It defines: an object model, architectural concepts and architecture for the development of ODP systems in terms of five viewpoints. However, RM-ODP is a meta-norm, and several ODP standards have to be defined. Indeed, the viewpoint languages are abstract in sense that they define what concepts should be supported and not how these concepts should be represented using the UML/OCL meta-modeling approach. In this paper, we report on the definition and address of the syntax and semantics for a fragment of ODP object concepts de...

Research paper thumbnail of Specifying QoS Structural Constraints in RM- ODP

QoS already forms an important part of the studies being carried out by the international standar... more QoS already forms an important part of the studies being carried out by the international standards organizations, ITU and ISO, In order to support interoperability in open distributed systems, an information service is needed that can provide dynamic knowledge about available service providers. So network infrastructure specification, identified by Basic Reference Model of Open Distributed Processing (RM ODP). In RM-ODP a user provider concept is developed as a component standard. Understanding the new network infrastructure specification and how the parameters affect network performance is vital to ensuring excellent performance. In this paper, we present an extensive survey of existing QoS specification languages, and new verification for QoS parameters to assure control of the priority, reliability, speed and amount of traffic sending over a network. We propose a language of specification defined and compliant with the object paradigm, intended to specify QoS in distributed syst...

Research paper thumbnail of Authentication Model Using the JADE Framework for Communication Security in Multiagent Systems

Research paper thumbnail of Modeling and Simulation Methodology Techniques for Advanced Low Power Communication Circuits

This paper targets heterogeneous low power communication circuits and Systems that will be used i... more This paper targets heterogeneous low power communication circuits and Systems that will be used in the future generations' hand-held devices (PDA's, mobile phones). Those platforms will probably contain a few studies have emerged and considerable amount of on-chip memories. An optimized communication architecture will be required to interconnect them efficiently. Many communication architectures have been proposed in the literature: shared buses, bridged buses, segmented buses and more recently, Networks-on-Chip. Being battery-powered devices, the energy consumption of the platform is a critical issue. However, with the exception of buses, power consumption has been mostly neglected in interconnection networks. Only very recently have a few studies emerged in that domain. The Power Aware Wireless Sensors (PAWiS) simulation framework becomes an essential tool to evaluate design and simulation of Wireless Sensor Networks (WSNs) models including Soft-Ware (SW) and Hard-Ware (HW...

Research paper thumbnail of Mobility Condition to Study Performance of MANET Routing Protocols

Studies in Systems, Decision and Control

Research paper thumbnail of Spécification et vérification des systèmes informatiques distribuées conformément au modèle de référence du traitement réparti ouvert (RM-ODP)

Les travaux présentés dans cette thèse ont été effectués au sein de l'UFR de " Mathématiques et I... more Les travaux présentés dans cette thèse ont été effectués au sein de l'UFR de " Mathématiques et Informatique et Applications " du Département de Mathématiques et Informatique à la faculté des sciences de l'Université Mohammed V-Agdal. Je tiens à remercier tout d'abord très vivement mon encadrant de thèse Monsieur Said ELHAJJI, Professeur d'enseignement supérieures à la faculté des sciences de Rabat, pour son soutien, sa disponibilité, sa patience, sa collaboration étroite et son aide qui m'ont permis de mener à bien cette thèse. J'espère avoir été à la hauteur de ses attentes. Je suis aussi particulièrement reconnaissant envers Monsieur Mohamed BOUHDADI, Professeur à la faculté des sciences de Rabat, pour avoir accepté de diriger cette thèse mais aussi pour sa disponibilité et ses nombreux conseils et orientations décisives pour la concrétisation de la présente recherche. J'exprime ma profonde gratitude à Monsieur Noureddine ZAHID, Professeur à la faculté des sciences de Rabat, pour l'honneur qu'il me fait d'évaluer ce travail, d'une part, et de présider le jury de thèse, de l'autre part. Qu'il trouve ici l'expression de ma profonde gratitude. Je souhaite remercier Monsieur Mohamed EL MARRAKI,professeur à la faculté des sciences de Rabat, et Monsieur Mohammed EL KOUTBI, professeur à l'école nationale supérieure d'informatique et d'analyse des systèmes rabat, pour avoir accepté la lourde charge d'être Rapporteur et pour leurs précieuses remarques qui m'ont permis d'améliorer ce manuscrit. Je remercie aussi Monsieur Mohammed RZIZA, professeur à la faculté des sciences de Rabat, pour avoir accepté la lourde charge d'être Rapporteur et pour les nombreuses discussions que nous avons eu ensemble. Nous ne pourrions conclure sans citer et remercier tout les membres de notre groupe de Résumé La conception et le design des systèmes distribués ont besoin d'un Framework structuré afin qu'ils puissent être gérés et contrôlés avec succès. L'objectif du Modèle de référence du traitement réparti ouvert (RM-ODP) est donc de définir ce Framework. C'est dans ce cadre que s'inscrit cette thèse. En effet, elle présente une approche basée sur la sémantique dénotationnelle à partir des spécifications informelles relatives au point de vue traitement et aussi au point de vue ingénierie dans le traitement réparti ouvert (ODP). La sémantique proposée se base aussi sur l'utilisation des langages UML et OCL afin de pouvoir effectuer des vérifications automatiques. Par ailleurs, la composante innovante de notre thèse, qui consiste en l'approche sémantique dénotationnelle, nous a permis d'identifier un sous-ensemble de concepts définis dans la norme RM-ODP et de décrire, en OCL, la formalisation des contraintes statiques et les clauses liées aux concepts d'ODP. En outre, nous avons mis l'accent sur la sémantique des concepts associés aux deux points de vue cités auparavant et de relever les correspondances entre les concepts du comportement du langage de traitement et les concepts du langage BPEL. Pour se faire, nous avons utilisé le 'mapping' entre UML et BPEL et nous avons ainsi montré l'applicabilité de l'approche proposée. Nous nous sommes intéressés également au problème de l'utilisation d'un outil de preuve Event-B pour des spécifications et vérification de systèmes distribuées. Et enfin, nous avons spécifié une sémantique des concepts de bases de données en utilisant le langage d'ingénierie de RM-ODP.

Research paper thumbnail of A survey on distributed mobile agents' system security

Int. J. Knowl. Eng. Soft Data Paradigms, 2020

A multi-agent system (MAS) is a system in which there is a cooperation of autonomous entities cal... more A multi-agent system (MAS) is a system in which there is a cooperation of autonomous entities called 'agents', with intelligent behaviour, and have the power to coordinate their goals and action plans to solve a problem or achieve an objective. They are widely applied in telecommunications and e-commerce. In this paper we investigate the security of the distributed mobile agents' system. We also discuss the problem of availability of a mobile agent while exposing an overview about the DDoS which is the major attack that threatens the availability in a system. Furthermore, we establish a method to guarantee the confidentiality and secure mobility of a mobile agent during its migration in a distributed system by combining the principle of serialisation and cryptography.

Research paper thumbnail of Applying Agile Procedure Model to Improve ERP Systems Implementation Strategy

Enterprise Resource Planning (ERP) systems implementation is a difficult, time consuming, expensi... more Enterprise Resource Planning (ERP) systems implementation is a difficult, time consuming, expensive and risky process. A lot of planning and communication is required for success in ERP Implementation. Various authors have classified ERP implementation with respect methodology, phases, and procedures. In this regard, our paper identifies implementation methods and strategies used over the years, then select the best steps to implement an ERP. The main aim of our study is to increase the effectiveness of the ERP systems implementation strategy in companies by proposing a generic procedure model for ERP implementation whatever the system to implement. Then combining this model with an agile approach to make the implementation flexible and more efficient.

Research paper thumbnail of A MapReduce-Based Adjoint Method to Predict the Levenson Self Report Psychopathy Scale Value

The Levenson Self Report Psychopathy serves as a measure to spot persons with psychopathic disord... more The Levenson Self Report Psychopathy serves as a measure to spot persons with psychopathic disorders able to commit crime or offend others. Indeed, predicting the Levenson Self Report Psychopathy factors would help investigator and even psychologist to spot offenders. In this paper, a statistical model is performed with the aim of predicting the Levenson Self Report Psychopathy scale value. For this purpose, the multiple regression statistical method is used. In addition, a parallelized algebraic adjoint method is performed to solve the least square problem. The MapReduce framework is used for this purpose. The Apache implementation of Mapreduce developed in Java untilled Hadoop 2.6.0 is deployed to tackle experiments.

Research paper thumbnail of Data Security and risks for IoT in intercommunicating objects

Nowadays Internet of Things" (IoT) codes are passive entities that encode information, The g... more Nowadays Internet of Things" (IoT) codes are passive entities that encode information, The goal of this work is to give explicit interconnections between IoT specifications and interpreting IoT codes and information's in order to exchange information to fulfill tasks for the users. Deploying existing data security solutions to the Internet of Things (IoT) is not straightforward because of device heterogeneity, highly dynamic and possibly unprotected environments, and large scale. It is well-known the existence of a closed relation between IoT systems over finite fields and Security and risks systems that allow to understand some properties of computational security codes and to construct them. An accurate look at the IoT structure of information using techniques of smart systems information as well a study of input-state-output representation smart control systems, For the Internet of Things security based Internet Language we intend to analyze both the theoretical security...

Research paper thumbnail of 8. A prediction MapReduce-based TLBO-FLANN model for angiographic disease status value

Computational Intelligence, 2020

Research paper thumbnail of Comparative study and simulation of flat and hierarchical routing protocols for wireless sensor network

2016 International Conference on Engineering & MIS (ICEMIS), 2016

Sensor Networks are emerging as a new tool for important applications in diverse fields like mili... more Sensor Networks are emerging as a new tool for important applications in diverse fields like military surveillance, habitat monitoring, monitoring and gathering events in hazardous environments, surveillance of buildings, whether monitoring etc, In the research area of wireless sensor networks the Flat and hierarchical routing protocols is a major issue. In this paper we intend to discuss some of the major Flat routing protocols (AODV, DSDV, GSR, FSR, OLSR, SPIN) and hierarchical routing protocols (LEACH-C, LEACH-F, PEGASIS, ZHLS) for wireless sensor networks. First we will discuss the routing protocols in short and later we will compare and simulate the behavior on lifetime and energy using NS2 simulator.

Research paper thumbnail of Reliability of transport data and energy efficient in Wireless Sensor Networks: A literature survey

2016 International Conference on Engineering & MIS (ICEMIS), 2016

Sensor technologies are vital today in gathering information about certain environments and Wirel... more Sensor technologies are vital today in gathering information about certain environments and Wireless Sensors Networks (WSNs) are getting more widespread use every day. The recent advances in Wireless Sensor Networks open new scenarios where sensors can be rapidly deployed without any existing infrastructure. Such networks are useful in many fields, such as smart grid, smart water networks, intelligent transportation, smart homes, health monitoring, environmental control, military applications, etc. Ensuring energy efficient and reliable transport of data in resource constrained WSNs is one of the primary concerns to achieve a high degree of efficiency in monitoring and control systems. In WSN, reliable monitoring of a phenomenon depends on the collective data provided by the target cluster of sensors and not on any individual node, There are several strategies to reduce the power consumption of WSN nodes by increasing the network lifetime and increase the reliability of the network by improving the WSN Quality of Service. However, there is an inherent conflict between power consumption and reliability. This paper describes the concept of WSNs which has been made viable by the convergence of microelectronics systems technology and wireless communications.

Research paper thumbnail of Design a New Architecure of Audio Amplifiers Class-D for a Hardware Mobile Systems

International Journal of Computer Science and Application, Aug 1, 2012

This paper presents the advantages of using Audio amplifiers-class-D which has an important role ... more This paper presents the advantages of using Audio amplifiers-class-D which has an important role in every mobile system involving an audible sound. General power amplifiers till recently have been very inefficient, bulky and unreliable. Though Class AB amplifiers have major market share in the audio industry because of their efficiency compared to previous classes of amplifiers such as Class A and Class B, recent demand for smaller devices with longer battery life has resulted in replacement of class AB amplifiers (linear amplifiers) with Class D (switching amplifiers). Class D amplifiers provide the balance between efficiency and distortion required by portable devices, hi-fi audio systems, as they utilize the switching operation where the transistors are either fully on or fully off resulting in amplification with zero power dissipation ideally. The main focus of this thesis is to analyze various design issues involved in the implementation of class D amplifiers. As many designers in the future will be switching to Class D amplifiers because of the recent advances in switching amplifiers, an effort was made to develop the thesis so as to be able to serve as a basic reference guide which gives them a good understanding of existing architectures, challenges in efficient power amplifier design, modulation methods, power stage topologies and implementation of class D amplifiers. A detailed study of parameters and parasitic that affect the performance of class D amplifiers has been carried out with design, implementation, and simulation of various stages. Various component selection decisions and layout issues have been discussed for an efficient, low distortion class D amplifier.

Research paper thumbnail of Mobile Agent Security Based on Mutual Authentication and Elliptic Curve Cryptography

International Journal of Innovative Technology and Exploring Engineering, 2019

Mobile agent system is a satisfying solution for the implementation and maintenance of applicatio... more Mobile agent system is a satisfying solution for the implementation and maintenance of applications distributed over large-scale networks, this solution is very used in solving complex problems since they are autonomous, Intelligent, robust and fault- tolerant. Mobile agents have the capacity to migrate from one node to another all over the network allowing reduction in communication costs. Although they possess all these advantages, using them in distributed environment increases the threat to mobile agent security and during their mobility they can face different types of attacks such as of attacks like Replay attack, man-in-the-middle attack, Cookie theft attack, Offline password guessing attack, Stolen-verifier attack. In this paper we investigate the security of distributed mobile agent system. We propose a solution based on a secure Elliptic Curve Cryptography (ECC) protocol to ensure mutual authentication and protect the agent from different known attacks. The implementation ...

Research paper thumbnail of ICCSRE2018 Persentation

Research paper thumbnail of Specifying Behavioralconcepts by Engineering Language of RM-Odp 1

Distributed systems can be very large and complex and the many different considerations which inf... more Distributed systems can be very large and complex and the many different considerations which influence their design can result in a substantial body of specification, which needs a structuring framework if it is to be managed successfully. The purpose of the RM-ODP is to define such a framework. The Reference Model for Open Distributed Processing (RM-ODP) provides a framework within which support of distribution, inter-working and portability can be integrated. It defines: an object model, architectural concepts and architecture for the development of ODP systems in terms of five viewpoints. However, RM-ODP is a meta-norm, and several ODP standards have to be defined. Indeed, the viewpoint languages are abstract in sense that they define what concepts should be supported and not how these concepts should be represented using the UML/OCL meta-modeling approach. In this paper, we report on the definition and address of the syntax and semantics for a fragment of ODP object concepts de...

Research paper thumbnail of Energy Consumption in Wireless Sensor Network : Simulation and Compartative Study of Flat and Hierarchical Routing Protocols

Sensor networks are dense wireless networks of small, low-cost sensors, which collect and dissemi... more Sensor networks are dense wireless networks of small, low-cost sensors, which collect and disseminate environmental data, it used in a variety of fields like military surveillance, habitat monitoring, monitoring and gathering events in hazardous environments, surveillance of buildings, whether monitoring etc. In wireless sensor networks Flat and Hierarchical routing are two most typical routing protocols. Comparing the two routing protocols (flat / hierarchical) is very important to know well the performance of each routing, for that, in this paper we will discuss in first some of the major Flat routing protocols (AODV, DSDV, GSR, FSR, OLSR, SPIN) and hierarchical routing protocols (LEACH-C, LEACH-F, PEGASIS, ZHLS) for wireless sensor networks, and later we will compare and simulate the behavior on lifetime and energy using NS2 simulator for flat and hierarchical routing protocols.

Research paper thumbnail of Energy Saving in Wireless Sensor Networks: Urban Traffic Management Application

Since ten years, researches on the technology of wireless sensor network (WSN) in the field of ur... more Since ten years, researches on the technology of wireless sensor network (WSN) in the field of urban traffic management succeed without proposing a reliable solution for all the constraints suffered. In this article, we study the scenario of using a wireless sensor network to control traffic lights an urban transport network and optimize its functioning by reducing the average waiting time of users and traffic fluidity. We are interested in a simple network at an intersection. Our study provides primarily, a study of the researches work that were done, and who are at the present time, in order to solve the number of communication problem between network of sensor node and the traffic light controller (each node collects data and sends them) with the consideration of energy consumption. it is termed the energy of communication. Note that the energy of communication represents the largest portion of the energy consumed by a sensor node. So, it is necessary minimize energy costs, becau...

Research paper thumbnail of Devant le jury

A mes parents, A toute la famille A Tous mes amies Et, à tous ceux qui me sont chersREMERCIEMENTS... more A mes parents, A toute la famille A Tous mes amies Et, à tous ceux qui me sont chersREMERCIEMENTS Les travaux présentés dans cette thèse ont été effectués au sein de l’UFR de " Mathématiques et Informatique et Applications " du Département de Mathématiques et Informatique à la faculté des sciences de l’Université Mohammed V- Agdal. Je tiens à remercier tout d’abord très vivement mon encadrant de thèse Monsieur Said ELHAJJI, Professeur d’enseignement supérieures à la faculté des sciences de Rabat, pour son soutien, sa disponibilité, sa patience, sa collaboration étroite et son aide qui m’ont permis de mener à bien cette thèse. J’espère avoir été à la hauteur de ses attentes. Je suis aussi particulièrement reconnaissant envers Monsieur Mohamed BOUHDADI, Professeur à la faculté des sciences de Rabat, pour avoir accepté de diriger cette thèse mais aussi pour sa disponibilité et ses nombreux conseils et orientations décisives pour la concrétisation de la présente recherche.

Research paper thumbnail of 1 Specifying Behavioralconcepts by Engineering Language of RM-Odp

Distributed systems can be very large and complex and the many different considerations which inf... more Distributed systems can be very large and complex and the many different considerations which influence their design can result in a substantial body of specification, which needs a structuring framework if it is to be managed successfully. The purpose of the RM-ODP is to define such a framework. The Reference Model for Open Distributed Processing (RM-ODP) provides a framework within which support of distribution, inter-working and portability can be integrated. It defines: an object model, architectural concepts and architecture for the development of ODP systems in terms of five viewpoints. However, RM-ODP is a meta-norm, and several ODP standards have to be defined. Indeed, the viewpoint languages are abstract in sense that they define what concepts should be supported and not how these concepts should be represented using the UML/OCL meta-modeling approach. In this paper, we report on the definition and address of the syntax and semantics for a fragment of ODP object concepts de...

Research paper thumbnail of Specifying QoS Structural Constraints in RM- ODP

QoS already forms an important part of the studies being carried out by the international standar... more QoS already forms an important part of the studies being carried out by the international standards organizations, ITU and ISO, In order to support interoperability in open distributed systems, an information service is needed that can provide dynamic knowledge about available service providers. So network infrastructure specification, identified by Basic Reference Model of Open Distributed Processing (RM ODP). In RM-ODP a user provider concept is developed as a component standard. Understanding the new network infrastructure specification and how the parameters affect network performance is vital to ensuring excellent performance. In this paper, we present an extensive survey of existing QoS specification languages, and new verification for QoS parameters to assure control of the priority, reliability, speed and amount of traffic sending over a network. We propose a language of specification defined and compliant with the object paradigm, intended to specify QoS in distributed syst...

Research paper thumbnail of Authentication Model Using the JADE Framework for Communication Security in Multiagent Systems

Research paper thumbnail of Modeling and Simulation Methodology Techniques for Advanced Low Power Communication Circuits

This paper targets heterogeneous low power communication circuits and Systems that will be used i... more This paper targets heterogeneous low power communication circuits and Systems that will be used in the future generations' hand-held devices (PDA's, mobile phones). Those platforms will probably contain a few studies have emerged and considerable amount of on-chip memories. An optimized communication architecture will be required to interconnect them efficiently. Many communication architectures have been proposed in the literature: shared buses, bridged buses, segmented buses and more recently, Networks-on-Chip. Being battery-powered devices, the energy consumption of the platform is a critical issue. However, with the exception of buses, power consumption has been mostly neglected in interconnection networks. Only very recently have a few studies emerged in that domain. The Power Aware Wireless Sensors (PAWiS) simulation framework becomes an essential tool to evaluate design and simulation of Wireless Sensor Networks (WSNs) models including Soft-Ware (SW) and Hard-Ware (HW...

Research paper thumbnail of Mobility Condition to Study Performance of MANET Routing Protocols

Studies in Systems, Decision and Control

Research paper thumbnail of Spécification et vérification des systèmes informatiques distribuées conformément au modèle de référence du traitement réparti ouvert (RM-ODP)

Les travaux présentés dans cette thèse ont été effectués au sein de l'UFR de " Mathématiques et I... more Les travaux présentés dans cette thèse ont été effectués au sein de l'UFR de " Mathématiques et Informatique et Applications " du Département de Mathématiques et Informatique à la faculté des sciences de l'Université Mohammed V-Agdal. Je tiens à remercier tout d'abord très vivement mon encadrant de thèse Monsieur Said ELHAJJI, Professeur d'enseignement supérieures à la faculté des sciences de Rabat, pour son soutien, sa disponibilité, sa patience, sa collaboration étroite et son aide qui m'ont permis de mener à bien cette thèse. J'espère avoir été à la hauteur de ses attentes. Je suis aussi particulièrement reconnaissant envers Monsieur Mohamed BOUHDADI, Professeur à la faculté des sciences de Rabat, pour avoir accepté de diriger cette thèse mais aussi pour sa disponibilité et ses nombreux conseils et orientations décisives pour la concrétisation de la présente recherche. J'exprime ma profonde gratitude à Monsieur Noureddine ZAHID, Professeur à la faculté des sciences de Rabat, pour l'honneur qu'il me fait d'évaluer ce travail, d'une part, et de présider le jury de thèse, de l'autre part. Qu'il trouve ici l'expression de ma profonde gratitude. Je souhaite remercier Monsieur Mohamed EL MARRAKI,professeur à la faculté des sciences de Rabat, et Monsieur Mohammed EL KOUTBI, professeur à l'école nationale supérieure d'informatique et d'analyse des systèmes rabat, pour avoir accepté la lourde charge d'être Rapporteur et pour leurs précieuses remarques qui m'ont permis d'améliorer ce manuscrit. Je remercie aussi Monsieur Mohammed RZIZA, professeur à la faculté des sciences de Rabat, pour avoir accepté la lourde charge d'être Rapporteur et pour les nombreuses discussions que nous avons eu ensemble. Nous ne pourrions conclure sans citer et remercier tout les membres de notre groupe de Résumé La conception et le design des systèmes distribués ont besoin d'un Framework structuré afin qu'ils puissent être gérés et contrôlés avec succès. L'objectif du Modèle de référence du traitement réparti ouvert (RM-ODP) est donc de définir ce Framework. C'est dans ce cadre que s'inscrit cette thèse. En effet, elle présente une approche basée sur la sémantique dénotationnelle à partir des spécifications informelles relatives au point de vue traitement et aussi au point de vue ingénierie dans le traitement réparti ouvert (ODP). La sémantique proposée se base aussi sur l'utilisation des langages UML et OCL afin de pouvoir effectuer des vérifications automatiques. Par ailleurs, la composante innovante de notre thèse, qui consiste en l'approche sémantique dénotationnelle, nous a permis d'identifier un sous-ensemble de concepts définis dans la norme RM-ODP et de décrire, en OCL, la formalisation des contraintes statiques et les clauses liées aux concepts d'ODP. En outre, nous avons mis l'accent sur la sémantique des concepts associés aux deux points de vue cités auparavant et de relever les correspondances entre les concepts du comportement du langage de traitement et les concepts du langage BPEL. Pour se faire, nous avons utilisé le 'mapping' entre UML et BPEL et nous avons ainsi montré l'applicabilité de l'approche proposée. Nous nous sommes intéressés également au problème de l'utilisation d'un outil de preuve Event-B pour des spécifications et vérification de systèmes distribuées. Et enfin, nous avons spécifié une sémantique des concepts de bases de données en utilisant le langage d'ingénierie de RM-ODP.

Research paper thumbnail of A survey on distributed mobile agents' system security

Int. J. Knowl. Eng. Soft Data Paradigms, 2020

A multi-agent system (MAS) is a system in which there is a cooperation of autonomous entities cal... more A multi-agent system (MAS) is a system in which there is a cooperation of autonomous entities called 'agents', with intelligent behaviour, and have the power to coordinate their goals and action plans to solve a problem or achieve an objective. They are widely applied in telecommunications and e-commerce. In this paper we investigate the security of the distributed mobile agents' system. We also discuss the problem of availability of a mobile agent while exposing an overview about the DDoS which is the major attack that threatens the availability in a system. Furthermore, we establish a method to guarantee the confidentiality and secure mobility of a mobile agent during its migration in a distributed system by combining the principle of serialisation and cryptography.

Research paper thumbnail of Applying Agile Procedure Model to Improve ERP Systems Implementation Strategy

Enterprise Resource Planning (ERP) systems implementation is a difficult, time consuming, expensi... more Enterprise Resource Planning (ERP) systems implementation is a difficult, time consuming, expensive and risky process. A lot of planning and communication is required for success in ERP Implementation. Various authors have classified ERP implementation with respect methodology, phases, and procedures. In this regard, our paper identifies implementation methods and strategies used over the years, then select the best steps to implement an ERP. The main aim of our study is to increase the effectiveness of the ERP systems implementation strategy in companies by proposing a generic procedure model for ERP implementation whatever the system to implement. Then combining this model with an agile approach to make the implementation flexible and more efficient.

Research paper thumbnail of A MapReduce-Based Adjoint Method to Predict the Levenson Self Report Psychopathy Scale Value

The Levenson Self Report Psychopathy serves as a measure to spot persons with psychopathic disord... more The Levenson Self Report Psychopathy serves as a measure to spot persons with psychopathic disorders able to commit crime or offend others. Indeed, predicting the Levenson Self Report Psychopathy factors would help investigator and even psychologist to spot offenders. In this paper, a statistical model is performed with the aim of predicting the Levenson Self Report Psychopathy scale value. For this purpose, the multiple regression statistical method is used. In addition, a parallelized algebraic adjoint method is performed to solve the least square problem. The MapReduce framework is used for this purpose. The Apache implementation of Mapreduce developed in Java untilled Hadoop 2.6.0 is deployed to tackle experiments.