adnane addaim - Academia.edu (original) (raw)

Papers by adnane addaim

Research paper thumbnail of Proposed Architecture of Cyber Security in Smart Grids, Blockchain as Solution

2022 IEEE Information Technologies & Smart Industrial Systems (ITSIS)

Research paper thumbnail of Development of a hardware emulator of a nanosatellite gyroscope

EUREKA: Physics and Engineering

The gyroscope sensor has multiple applications in consumer electronics, aircraft navigation, and ... more The gyroscope sensor has multiple applications in consumer electronics, aircraft navigation, and control systems. Significant errors that match the corresponding data are a typical disadvantage of this sensor. This needs to be done by making error models that can be used to get the right level of measurement accuracy. For high-precision space applications, the navigation design system should take into account the angle random walk (N), bias instability error (B), and rate random walk (K) of the BMG160 gyroscope. For this reason, this paper shows how to use Allan Variance (AVAR) and Power Spectral Density (PSD) for the experimental identification and modeling of the stochastic parameters of the Bosch BMG160 gyroscope embedded in a nanosatellite in order to get an accurate gyroscope model. This work also demonstrates the principle of operation of the equivalent electronic model intended to carry out advanced simulations without recourse to the real material in order to avoid the probl...

Research paper thumbnail of Software Defined AIS Receiver Implementation Based on RTL-SDR and GNU Radio

2022 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)

Research paper thumbnail of Proposed robust ADRC control of a DFIG used in wind power production

Bulletin of Electrical Engineering and Informatics, Jun 1, 2022

This work presents the control of the double fed induction generator (DFIG) used in the wind conv... more This work presents the control of the double fed induction generator (DFIG) used in the wind conversion system (WCS). The studied model is based on the control of the two converters grid side converter (GSC) and rotor side converter (RSC), in order to extract the maximum of power and also to keep the direct current (DC) bus voltage constant. The control strategy used here is based on linear active disturbance rejection control (LADRC) controllers. These are known, in the field of control systems, by their performance and robustness and allow a very good rejection of disturbances which can affect the wind system. In addition, this kind of controllers could help to meet the requirements of robustness against the variations of the parameters of the system and the uncertainties of its mathematical model. To validate the effectiveness of the proposed control, the system was modeled and tested by numerical simulation using MATLAB/Simulink software. The results carried out are discussed and analyzed in terms of references tracking, robustness and disturbance rejection. The results obtained have shown shown that the proposed control is promising and useful.

Research paper thumbnail of Wind Farm Layout Optimization using Real Coded Multi-population Genetic Algorithm

2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)

Finding the optimal location of wind turbines is a challenging work by reason of the various effe... more Finding the optimal location of wind turbines is a challenging work by reason of the various effects of the turbine wake. Indeed, on a site gathering several wind turbines, if the turbines are too close the loss of power grows with the wake effect. In this paper, an RC-MPGA (Real Coded Multi-population Genetic Algorithm) method is proposed to search the optimal location of WTs (Wind Turbines) in Square shaped WF (wind farm), Installed on an area of 4000000 m2 ($2000\mathrm{m}\times 2000\mathrm{m}$), with the aim to maximize the electrical power generated by all WTs and grows the annual economic profitability of the WF. By using the same WF environment conditions, we can see that the proposed method is promising and presents an improvement in terms of maximum power generation when compared to other works previously studied in the literature.

Research paper thumbnail of Study and design of an active magnetorquer actuator model for nanosatellites

E3S Web of Conferences

This paper focuses on the study and the design of an air core magnetorquer model dedicated to the... more This paper focuses on the study and the design of an air core magnetorquer model dedicated to the 1U CubeSat (10×10×10 cm3). The objective is to obtain a solution which is able to provide accurate attitude control while having the smallest possible dimensions, electrical power, and total mass. To this end, the first part will provide theoretical mathematical knowledge on the laws of the coil to design an electromagnetic air core actuator. Then, this paper presents comparisons of the performances obtained by varying the type of material and the shape of the coil. Towards the end, the effect of temperature variation in LEO orbit is taken into consideration to predict the generated magnetic moment.

Research paper thumbnail of Proposed Access Control Architecture Based on Fog Computing for IoT Environments

2021 7th International Conference on Optimization and Applications (ICOA), 2021

With the growing need for smart devices in our daily life, the cloud paradigm may not be able to ... more With the growing need for smart devices in our daily life, the cloud paradigm may not be able to adapt to increasing data traffics neither to guarantee a standard level of security. In this context, Fog Computing extends cloud computing services to the edge of the network and could be integrated with Internet-of-Things (IoT) to enable computing services for such devices. Thus, improves security, efficiency and reduces the amount of data transmitted across the network to the cloud for processing, analysis, and storage. In this paper, we present a comparative study of fog computing architectures then we suggest our distributed model in order to face the IoT access control problems using the XACML language in a Fog Cloud.

Research paper thumbnail of Artificial Neural Networks for Communication Wireless Networks: a Synthetic Study

2018 6th International Conference on Multimedia Computing and Systems (ICMCS), 2018

The dynamic behavior of nodes makes management and administration in MANET networks more difficul... more The dynamic behavior of nodes makes management and administration in MANET networks more difficult. To overcome these problems, the researchers have tried to improve the used routing protocol. in this article, we have studied the impact of ANN on quality and performance evaluation in MANET networks from a set of approaches and techniques proposed by researchers in this field and we have tried to capitalize this study in a summary table to deduce possible remarks and improvements for these approaches.

Research paper thumbnail of Design of Store and Forward Data Collection Low-cost Nanosatellite

2007 IEEE Aerospace Conference, 2007

The satellite, as small as the Cubesat concept, requires employment of limited small boards. In t... more The satellite, as small as the Cubesat concept, requires employment of limited small boards. In the modular architecture, each single subsystem has a dedicated hardware and software. The approach, which has been taken in this paper, based on two design directives: the integration of the maximum subsystems within the same unit taking into account that single subsystems can be setup

Research paper thumbnail of Routing Protocols for WSN: A Survey Precision Agriculture Case Study

2020 IEEE 2nd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), 2020

In Internet of Things (IoT), various communication technologies such as Ad-Hoc, MANET, VANET and ... more In Internet of Things (IoT), various communication technologies such as Ad-Hoc, MANET, VANET and Wireless Sensor Network (WSN) are used to facilitate the supervision and control of connected machines and environments. In this paper, we describe the different constraints of the WSNs and their routing protocols, with the aim of identifying, by comparison, the appropriate routing protocol design of applications driven by their needs and the available network resources. We also present methods to be taken in order to enhance lifetime and performances of WSN.

Research paper thumbnail of A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System

2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), 2019

Recently Vehicular Cloud Computing (VCC) has become an attractive solution that support vehicle&#... more Recently Vehicular Cloud Computing (VCC) has become an attractive solution that support vehicle's computing and storing service requests. This computing paradigm insures a reduced energy consumption and low traffic congestion. Additionally, VCC has emerged as a promising technology that provides a virtual platform for processing data using vehicles as infrastructures or centralized data servers. However, vehicles are deployed in open environments where they are vulnerable to various types of attacks. Furthermore, traditional cryptographic algorithms failed in insuring security once their keys compromised. In order to insure a secure vehicular platform, we introduce in this paper a new decoy technology DT and user behavior profiling (UBP) as an alternative solution to overcome data security, privacy and trust in vehicular cloud servers using a fog computing architecture. In the case of a malicious behavior, our mechanism shows a high efficiency by delivering decoy files in such a way making the intruder unable to differentiate between the original and decoy file.

Research paper thumbnail of Comparative study of MPR selection algorithms based on statistical model checking

2016 5th International Conference on Multimedia Computing and Systems (ICMCS), 2016

MANET (Mobile Ad hoc Network) networks are distinguished by mobile and dynamic infrastructure due... more MANET (Mobile Ad hoc Network) networks are distinguished by mobile and dynamic infrastructure due to the behavior and random movement of the nodes. Its administration is more difficult and requires more technical and more appropriate routing protocols. The OLSR (Optimized Link State Routing) is one of the most widely used routing protocols for such networks through its proactive behavior that periodically determines the possible and optimal paths from source node to the destination node. This protocol is based on the selection technique of MPR (Multi Point Relay) that selects delegate's nodes to reduce the number of exchanged messages inside the network.

Research paper thumbnail of Analysis and Delay Optimization of Slotted-Aloha System over LEO Satellite

Slotted Aloha [1] is one of the most widely implemented random access protocols, in particular, i... more Slotted Aloha [1] is one of the most widely implemented random access protocols, in particular, in satellite communication systems. In this paper, we will be interested in delay optimization of the Slotted-Aloha with finite number of users in the message system by LEO satellite. In practice, the interactive applications, the user requires for a small delay response and the throughput is less critical since the traffic is often light and sporadic. We propose a random perturbation of generalized reduced gradient method for solving global optimization equivalent to mixed integer programming problem who is model for optimize average delay of the system during the visibility of the satellite with some properties of Slotted-Aloha system with finite number of users over one LEO satellite.

Research paper thumbnail of Design of APRS Network using Low Cost Nanosatellite

The Seventh IFIP …, 2005

The use of Nanosatellite to provide APRS network service is discussed. The satellite, as small as... more The use of Nanosatellite to provide APRS network service is discussed. The satellite, as small as the cubesat concept, requires employment of a very simple payload whereas all the complexity is brought back to the terminals. The radio link between the terminals and the Nanosatellite will be studied. We will employ the Slotted-Aloha in the uplink, and establish a mathematical model for evaluating the performance of the system under finite number of terminals. In such a system, two appropriate measures of the performance are the throughput and the average delay; thus, we will use these measures in this paper.

Research paper thumbnail of Real-time Software In the Loop Simulation for PID Control of the Nanosatellite Reaction Wheel

2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), 2022

Research paper thumbnail of A novel autonomous remote system applied in agriculture using transmission control protocol

International Journal of Reconfigurable and Embedded Systems (IJRES), 2022

An internet of things (IoT) irrigation system is challenged by several issues, such as cost, ener... more An internet of things (IoT) irrigation system is challenged by several issues, such as cost, energy consumption, and data storage. This paper proposes a novel energy-efficient, cost-effective IoT system called "NewAgriCom" to monitor agricultural field water flow. NewAgriCom works with an embedded energy harvesting system, is an autonomous remote supervisory control and data acquisition (SCADA) based on a general packet radio service (GPRS) cellular network that effectively communicates irrigation field data to the Node.js server using SIM808 EVBV3.2 modem. In javascript object notation (JSON) format, data is transmitted over the hypertext transfer protocol (HTTP) protocol to the MySQL database. Then data are transferred to the proposed IoT platform, which gives us a hand to control actuators, visualise, store and download the data. NewAgriCom can significantly reduce water consumption. It can set a schedule to control water automatically at specific times in various modes...

Research paper thumbnail of Wind Power Production based on DFIG: Modeling and Control by ADRC

2020 IEEE 20th Mediterranean Electrotechnical Conference ( MELECON), 2020

This paper presents the modeling and the control of the DFIG (Dual Fed Induction Generator) used ... more This paper presents the modeling and the control of the DFIG (Dual Fed Induction Generator) used in the wind power production. The model investigated in this paper is based on the different components that make up the wind energy conversion systems namely Turbine, DFIG, Back to Back Converters and Filter. The proposed control is known as the ADRC (Active Disturbance Rejection Control) which is used to ensure the maximum power extraction from the WTF (Wind Turbine Farm). The use of this ADRC provide also the regulation of the reactive power injected to the grid. This control strategy is based on the ESO (Extended State Observer) which estimate in real time the different disturbance affecting the system. The various performances of the proposed system are tested by numerical simulation carried out from MATLAB/SIMULINK software. The obtained results are analyzed in terms of references tracking, robustness and disturbance rejection.

Research paper thumbnail of Comparative Study of The Various new Cellular IoT Technologies

2018 International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), 2018

Cellular Internet of Things (CIoT) technologies have been designed for reliability, security, and... more Cellular Internet of Things (CIoT) technologies have been designed for reliability, security, and scalability and provide a strong foundation for existing cellular networks connectivity with a unique combination of functionality and performance. Through software upgrades, existing deployed infrastructure provides a base for unmatched IoT coverage and fast time-to-market. The CIoT based on 3GPP standards constitute a large and evolving ecosystem. This paper emphasizes a comparative study between the emergent CIoT namely; the Narrow-band IoT (NB-IoT) and the LTE-M technology (named also eMTC).

Research paper thumbnail of New Scalable Smart Telemetry for Industrial Systems: IoT solutions

2018 International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), 2018

In this paper, we propose a new scalable architecture of smart telemetry system based on IoT (Int... more In this paper, we propose a new scalable architecture of smart telemetry system based on IoT (Internet of Things) devices, it uses cellular (SMS solution) and internet (TCP/UDP Solution) networks to transmit, in real time, data to or from supervised and controlled system. Here, we try, for example, to collect measurements data from the flammable gas, temperature sensors and DC motor. This proposed work takes advantage of being scalable and also proposing a solution to solve temperature, redundancy and electromagnetic compatibility problems, which are the critical parameters in the majority of applications based on IIoT (Industrial IoT) solutions. The proposed smart telemetry system is promising and could play an important role in reducing repairs costs and improve efficiencies in preventive and predictive maintenance. Consequently, manufacturing and logistics environments could increase their productivity by using IIoT technologies to anticipate maintenance needs to prevent equipment failures and avoid unscheduled downtime.

Research paper thumbnail of An Incentive Mechanism for Computing Resource Allocation in Vehicular Fog Computing Environment

2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), 2020

Vehicular Fog Computing (VFC) has recently become a promising research field. Fog Computing (FC) ... more Vehicular Fog Computing (VFC) has recently become a promising research field. Fog Computing (FC) paradigm is used to enhance the quality of services of cloud computing by extending it to the edge of the network using collaborative devices nearby the end users. The VFC deploys computing resources of vehicles situated at the edge of the network to serve local on-demand mobile applications. Most of the previous research works assume that vehicles can serve as fog nodes unconditionally, which is not always true. In this paper, we investigate the problem of resource allocation in a VFC environment where resource-sharing is needed. Data service operators (DSO) and the fog nodes (FN) i.e. Vehicles participate in computation offloading and serve User Equipements (UE) demands. Hence, a joint optimization approach is designed to model the interactions among DSOs, FNs and UEs. We present a new incentive mechanism to stimulate vehicles to serve as fog nodes and share their computing resources based on UE demands. The simulation results show that the proposed approach significantly improves the performance of a VFC in terms of resource-sharing by dedicating the computational resources of vehicles to the UEs demands.

Research paper thumbnail of Proposed Architecture of Cyber Security in Smart Grids, Blockchain as Solution

2022 IEEE Information Technologies & Smart Industrial Systems (ITSIS)

Research paper thumbnail of Development of a hardware emulator of a nanosatellite gyroscope

EUREKA: Physics and Engineering

The gyroscope sensor has multiple applications in consumer electronics, aircraft navigation, and ... more The gyroscope sensor has multiple applications in consumer electronics, aircraft navigation, and control systems. Significant errors that match the corresponding data are a typical disadvantage of this sensor. This needs to be done by making error models that can be used to get the right level of measurement accuracy. For high-precision space applications, the navigation design system should take into account the angle random walk (N), bias instability error (B), and rate random walk (K) of the BMG160 gyroscope. For this reason, this paper shows how to use Allan Variance (AVAR) and Power Spectral Density (PSD) for the experimental identification and modeling of the stochastic parameters of the Bosch BMG160 gyroscope embedded in a nanosatellite in order to get an accurate gyroscope model. This work also demonstrates the principle of operation of the equivalent electronic model intended to carry out advanced simulations without recourse to the real material in order to avoid the probl...

Research paper thumbnail of Software Defined AIS Receiver Implementation Based on RTL-SDR and GNU Radio

2022 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)

Research paper thumbnail of Proposed robust ADRC control of a DFIG used in wind power production

Bulletin of Electrical Engineering and Informatics, Jun 1, 2022

This work presents the control of the double fed induction generator (DFIG) used in the wind conv... more This work presents the control of the double fed induction generator (DFIG) used in the wind conversion system (WCS). The studied model is based on the control of the two converters grid side converter (GSC) and rotor side converter (RSC), in order to extract the maximum of power and also to keep the direct current (DC) bus voltage constant. The control strategy used here is based on linear active disturbance rejection control (LADRC) controllers. These are known, in the field of control systems, by their performance and robustness and allow a very good rejection of disturbances which can affect the wind system. In addition, this kind of controllers could help to meet the requirements of robustness against the variations of the parameters of the system and the uncertainties of its mathematical model. To validate the effectiveness of the proposed control, the system was modeled and tested by numerical simulation using MATLAB/Simulink software. The results carried out are discussed and analyzed in terms of references tracking, robustness and disturbance rejection. The results obtained have shown shown that the proposed control is promising and useful.

Research paper thumbnail of Wind Farm Layout Optimization using Real Coded Multi-population Genetic Algorithm

2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)

Finding the optimal location of wind turbines is a challenging work by reason of the various effe... more Finding the optimal location of wind turbines is a challenging work by reason of the various effects of the turbine wake. Indeed, on a site gathering several wind turbines, if the turbines are too close the loss of power grows with the wake effect. In this paper, an RC-MPGA (Real Coded Multi-population Genetic Algorithm) method is proposed to search the optimal location of WTs (Wind Turbines) in Square shaped WF (wind farm), Installed on an area of 4000000 m2 ($2000\mathrm{m}\times 2000\mathrm{m}$), with the aim to maximize the electrical power generated by all WTs and grows the annual economic profitability of the WF. By using the same WF environment conditions, we can see that the proposed method is promising and presents an improvement in terms of maximum power generation when compared to other works previously studied in the literature.

Research paper thumbnail of Study and design of an active magnetorquer actuator model for nanosatellites

E3S Web of Conferences

This paper focuses on the study and the design of an air core magnetorquer model dedicated to the... more This paper focuses on the study and the design of an air core magnetorquer model dedicated to the 1U CubeSat (10×10×10 cm3). The objective is to obtain a solution which is able to provide accurate attitude control while having the smallest possible dimensions, electrical power, and total mass. To this end, the first part will provide theoretical mathematical knowledge on the laws of the coil to design an electromagnetic air core actuator. Then, this paper presents comparisons of the performances obtained by varying the type of material and the shape of the coil. Towards the end, the effect of temperature variation in LEO orbit is taken into consideration to predict the generated magnetic moment.

Research paper thumbnail of Proposed Access Control Architecture Based on Fog Computing for IoT Environments

2021 7th International Conference on Optimization and Applications (ICOA), 2021

With the growing need for smart devices in our daily life, the cloud paradigm may not be able to ... more With the growing need for smart devices in our daily life, the cloud paradigm may not be able to adapt to increasing data traffics neither to guarantee a standard level of security. In this context, Fog Computing extends cloud computing services to the edge of the network and could be integrated with Internet-of-Things (IoT) to enable computing services for such devices. Thus, improves security, efficiency and reduces the amount of data transmitted across the network to the cloud for processing, analysis, and storage. In this paper, we present a comparative study of fog computing architectures then we suggest our distributed model in order to face the IoT access control problems using the XACML language in a Fog Cloud.

Research paper thumbnail of Artificial Neural Networks for Communication Wireless Networks: a Synthetic Study

2018 6th International Conference on Multimedia Computing and Systems (ICMCS), 2018

The dynamic behavior of nodes makes management and administration in MANET networks more difficul... more The dynamic behavior of nodes makes management and administration in MANET networks more difficult. To overcome these problems, the researchers have tried to improve the used routing protocol. in this article, we have studied the impact of ANN on quality and performance evaluation in MANET networks from a set of approaches and techniques proposed by researchers in this field and we have tried to capitalize this study in a summary table to deduce possible remarks and improvements for these approaches.

Research paper thumbnail of Design of Store and Forward Data Collection Low-cost Nanosatellite

2007 IEEE Aerospace Conference, 2007

The satellite, as small as the Cubesat concept, requires employment of limited small boards. In t... more The satellite, as small as the Cubesat concept, requires employment of limited small boards. In the modular architecture, each single subsystem has a dedicated hardware and software. The approach, which has been taken in this paper, based on two design directives: the integration of the maximum subsystems within the same unit taking into account that single subsystems can be setup

Research paper thumbnail of Routing Protocols for WSN: A Survey Precision Agriculture Case Study

2020 IEEE 2nd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), 2020

In Internet of Things (IoT), various communication technologies such as Ad-Hoc, MANET, VANET and ... more In Internet of Things (IoT), various communication technologies such as Ad-Hoc, MANET, VANET and Wireless Sensor Network (WSN) are used to facilitate the supervision and control of connected machines and environments. In this paper, we describe the different constraints of the WSNs and their routing protocols, with the aim of identifying, by comparison, the appropriate routing protocol design of applications driven by their needs and the available network resources. We also present methods to be taken in order to enhance lifetime and performances of WSN.

Research paper thumbnail of A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System

2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), 2019

Recently Vehicular Cloud Computing (VCC) has become an attractive solution that support vehicle&#... more Recently Vehicular Cloud Computing (VCC) has become an attractive solution that support vehicle's computing and storing service requests. This computing paradigm insures a reduced energy consumption and low traffic congestion. Additionally, VCC has emerged as a promising technology that provides a virtual platform for processing data using vehicles as infrastructures or centralized data servers. However, vehicles are deployed in open environments where they are vulnerable to various types of attacks. Furthermore, traditional cryptographic algorithms failed in insuring security once their keys compromised. In order to insure a secure vehicular platform, we introduce in this paper a new decoy technology DT and user behavior profiling (UBP) as an alternative solution to overcome data security, privacy and trust in vehicular cloud servers using a fog computing architecture. In the case of a malicious behavior, our mechanism shows a high efficiency by delivering decoy files in such a way making the intruder unable to differentiate between the original and decoy file.

Research paper thumbnail of Comparative study of MPR selection algorithms based on statistical model checking

2016 5th International Conference on Multimedia Computing and Systems (ICMCS), 2016

MANET (Mobile Ad hoc Network) networks are distinguished by mobile and dynamic infrastructure due... more MANET (Mobile Ad hoc Network) networks are distinguished by mobile and dynamic infrastructure due to the behavior and random movement of the nodes. Its administration is more difficult and requires more technical and more appropriate routing protocols. The OLSR (Optimized Link State Routing) is one of the most widely used routing protocols for such networks through its proactive behavior that periodically determines the possible and optimal paths from source node to the destination node. This protocol is based on the selection technique of MPR (Multi Point Relay) that selects delegate's nodes to reduce the number of exchanged messages inside the network.

Research paper thumbnail of Analysis and Delay Optimization of Slotted-Aloha System over LEO Satellite

Slotted Aloha [1] is one of the most widely implemented random access protocols, in particular, i... more Slotted Aloha [1] is one of the most widely implemented random access protocols, in particular, in satellite communication systems. In this paper, we will be interested in delay optimization of the Slotted-Aloha with finite number of users in the message system by LEO satellite. In practice, the interactive applications, the user requires for a small delay response and the throughput is less critical since the traffic is often light and sporadic. We propose a random perturbation of generalized reduced gradient method for solving global optimization equivalent to mixed integer programming problem who is model for optimize average delay of the system during the visibility of the satellite with some properties of Slotted-Aloha system with finite number of users over one LEO satellite.

Research paper thumbnail of Design of APRS Network using Low Cost Nanosatellite

The Seventh IFIP …, 2005

The use of Nanosatellite to provide APRS network service is discussed. The satellite, as small as... more The use of Nanosatellite to provide APRS network service is discussed. The satellite, as small as the cubesat concept, requires employment of a very simple payload whereas all the complexity is brought back to the terminals. The radio link between the terminals and the Nanosatellite will be studied. We will employ the Slotted-Aloha in the uplink, and establish a mathematical model for evaluating the performance of the system under finite number of terminals. In such a system, two appropriate measures of the performance are the throughput and the average delay; thus, we will use these measures in this paper.

Research paper thumbnail of Real-time Software In the Loop Simulation for PID Control of the Nanosatellite Reaction Wheel

2022 2nd International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), 2022

Research paper thumbnail of A novel autonomous remote system applied in agriculture using transmission control protocol

International Journal of Reconfigurable and Embedded Systems (IJRES), 2022

An internet of things (IoT) irrigation system is challenged by several issues, such as cost, ener... more An internet of things (IoT) irrigation system is challenged by several issues, such as cost, energy consumption, and data storage. This paper proposes a novel energy-efficient, cost-effective IoT system called "NewAgriCom" to monitor agricultural field water flow. NewAgriCom works with an embedded energy harvesting system, is an autonomous remote supervisory control and data acquisition (SCADA) based on a general packet radio service (GPRS) cellular network that effectively communicates irrigation field data to the Node.js server using SIM808 EVBV3.2 modem. In javascript object notation (JSON) format, data is transmitted over the hypertext transfer protocol (HTTP) protocol to the MySQL database. Then data are transferred to the proposed IoT platform, which gives us a hand to control actuators, visualise, store and download the data. NewAgriCom can significantly reduce water consumption. It can set a schedule to control water automatically at specific times in various modes...

Research paper thumbnail of Wind Power Production based on DFIG: Modeling and Control by ADRC

2020 IEEE 20th Mediterranean Electrotechnical Conference ( MELECON), 2020

This paper presents the modeling and the control of the DFIG (Dual Fed Induction Generator) used ... more This paper presents the modeling and the control of the DFIG (Dual Fed Induction Generator) used in the wind power production. The model investigated in this paper is based on the different components that make up the wind energy conversion systems namely Turbine, DFIG, Back to Back Converters and Filter. The proposed control is known as the ADRC (Active Disturbance Rejection Control) which is used to ensure the maximum power extraction from the WTF (Wind Turbine Farm). The use of this ADRC provide also the regulation of the reactive power injected to the grid. This control strategy is based on the ESO (Extended State Observer) which estimate in real time the different disturbance affecting the system. The various performances of the proposed system are tested by numerical simulation carried out from MATLAB/SIMULINK software. The obtained results are analyzed in terms of references tracking, robustness and disturbance rejection.

Research paper thumbnail of Comparative Study of The Various new Cellular IoT Technologies

2018 International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), 2018

Cellular Internet of Things (CIoT) technologies have been designed for reliability, security, and... more Cellular Internet of Things (CIoT) technologies have been designed for reliability, security, and scalability and provide a strong foundation for existing cellular networks connectivity with a unique combination of functionality and performance. Through software upgrades, existing deployed infrastructure provides a base for unmatched IoT coverage and fast time-to-market. The CIoT based on 3GPP standards constitute a large and evolving ecosystem. This paper emphasizes a comparative study between the emergent CIoT namely; the Narrow-band IoT (NB-IoT) and the LTE-M technology (named also eMTC).

Research paper thumbnail of New Scalable Smart Telemetry for Industrial Systems: IoT solutions

2018 International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), 2018

In this paper, we propose a new scalable architecture of smart telemetry system based on IoT (Int... more In this paper, we propose a new scalable architecture of smart telemetry system based on IoT (Internet of Things) devices, it uses cellular (SMS solution) and internet (TCP/UDP Solution) networks to transmit, in real time, data to or from supervised and controlled system. Here, we try, for example, to collect measurements data from the flammable gas, temperature sensors and DC motor. This proposed work takes advantage of being scalable and also proposing a solution to solve temperature, redundancy and electromagnetic compatibility problems, which are the critical parameters in the majority of applications based on IIoT (Industrial IoT) solutions. The proposed smart telemetry system is promising and could play an important role in reducing repairs costs and improve efficiencies in preventive and predictive maintenance. Consequently, manufacturing and logistics environments could increase their productivity by using IIoT technologies to anticipate maintenance needs to prevent equipment failures and avoid unscheduled downtime.

Research paper thumbnail of An Incentive Mechanism for Computing Resource Allocation in Vehicular Fog Computing Environment

2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT), 2020

Vehicular Fog Computing (VFC) has recently become a promising research field. Fog Computing (FC) ... more Vehicular Fog Computing (VFC) has recently become a promising research field. Fog Computing (FC) paradigm is used to enhance the quality of services of cloud computing by extending it to the edge of the network using collaborative devices nearby the end users. The VFC deploys computing resources of vehicles situated at the edge of the network to serve local on-demand mobile applications. Most of the previous research works assume that vehicles can serve as fog nodes unconditionally, which is not always true. In this paper, we investigate the problem of resource allocation in a VFC environment where resource-sharing is needed. Data service operators (DSO) and the fog nodes (FN) i.e. Vehicles participate in computation offloading and serve User Equipements (UE) demands. Hence, a joint optimization approach is designed to model the interactions among DSOs, FNs and UEs. We present a new incentive mechanism to stimulate vehicles to serve as fog nodes and share their computing resources based on UE demands. The simulation results show that the proposed approach significantly improves the performance of a VFC in terms of resource-sharing by dedicating the computational resources of vehicles to the UEs demands.