Abdelkader Laouid | Hamma Lakhdar El-Oued University (original) (raw)
Uploads
Papers by Abdelkader Laouid
Multimedia tools and applications, Jun 25, 2024
HAL (Le Centre pour la Communication Scientifique Directe), Jul 11, 2021
The 5th International Conference on Future Networks & Distributed Systems, Dec 15, 2021
This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approa... more This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approach presented in [5]. 3SOA defines a practical approach for implementing service-oriented Internet of Things (IoT) using coordination languages to integrate and program individual IoT objects to compose into full IoT system. We believe that the modularity, reuse, interoperability and portability of this model has much to offer, but that there exist some challenges in overcoming the performance issues inherent in the approach, and extending the range of applications to which it is suited. We are particularly interested in applying the coordination languages to decentralized systems. To this end, blockchain smart contracts are proposed to offer a decentralized trustable method to automatically verify compliance with pre-defined conditions before executing a transaction involving multiple parties. To validate our proposal, we demonstrate a healthcare functional prototypes as a proof of concept.
HAL (Le Centre pour la Communication Scientifique Directe), Jun 8, 2016
International audienc
Proceedings of the 6th International Conference on Future Networks & Distributed Systems
IEEE Internet of Things Journal
Applied Sciences
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity,... more Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove their robustness, but are unsuitable in several domains due to their computational complexity. Other asymmetric encryption schemes have been proposed to provide a cloud homomorphic encryption service, where the researchers focused only on how to ensure the homomorphic property. This paper proposes a new digital signature scheme dedicated to a family of encryption techniques. The proposal consists of two parts: the first focused on the secret key, and the second focused on the public key. Signature validity checking was performed by multiplying these two parts to reform again the sender’s public key, then comparing the result with the decrypted message. The validation of the decrypted message guarantees data integrity, where the sign...
Social networking services such as Facebook, Twitter, and YouTube are fertile ground for analyzin... more Social networking services such as Facebook, Twitter, and YouTube are fertile ground for analyzing texts, extracting opinions, and identifying feelings, due to the large number of texts and their diversity in all areas of life. In this manuscript, we apply four algorithms to classify tweets written in the Algerian dialect. To extract feelings, we used six features based on three polarities. In the presented work, we manually annotate a corpus of 2,891 texts and create an Algerian lexicon of idioms that contains 1328 annotated words. Our results show that there are improvements gained on the accuracy of the system, where we have achieved a better accuracy of 85.31%.
Cryptography helps solve many computer and communication problems, including clock synchronizatio... more Cryptography helps solve many computer and communication problems, including clock synchronization, where a group of nodes wants to agree on a theoretically unique clock in the system with the presence of malicious nodes trying to prevent the process of convergence; so we will need a set of mechanisms, including encryption. Many synchronization techniques suffer from high power consumption or vulnerability to attack or difficulty of implementation. In this article, we propose a synchronization protocol that contains two parts. The first part uses a lightweight linear scheme to encrypt clock messages to fend off certain types of attacks such as message manipulation. This scheme is suitable for Wireless sensor networks (WSNs) with negligible encryption and decryption time. The second part is the process of calculating the clock based on a very simple consensus algorithm. The study of the proposed protocol has shown very satisfactory results.
International Journal of Organizational and Collective Intelligence
Religion is a source of mercy and peace; religious texts are one of the most critical parts of a ... more Religion is a source of mercy and peace; religious texts are one of the most critical parts of a culture's heritage, and they affect societies often in a big way; sadly, misconceptions can also make some religious people extremists. Modern social networks provide a platform for people to express themselves share their opinions and show their affiliations on many topics. This generates data in many forms like photos, videos, and texts. The authors used predefined machine learning (ML) to classify and analyze textual data from social networks. In this paper, they focus on two types of classification: religious and extremist. Extremism is independent of religious text, and therefore, they classify them separately. The work uses and compares several algorithms to classify textual data from social networks. The proposed model has achieved 93.33% accuracy for religious classification and 97% accuracy for extremism detection.
Accord is an important operation in the mechanism design for multi-agent systems and consequently... more Accord is an important operation in the mechanism design for multi-agent systems and consequently to applications built for these environments , such as ad hoc networks, virtual organizations, and decision-support tools for smart production systems. Much attention has been given to designing the process for resisting manipulation by strategic voting and decentralized control. The emphasis is on local decision-making based on locally available information and perception of events occurring locally. This manuscript presents a secure decision-support algorithm in a multi-agent system. The proposed consensus-based model serves multiple purposes in production planning and control, supply chain management , and product design and development. In particular, we describe decision-making, the selection of a leader, and the exploitation of limited resources. The importance of the proposal is to ensure robustness in a specific way; in which, decisions are carried out considering that the syste...
IEEE Transactions on Industrial Informatics
The 5th International Conference on Future Networks & Distributed Systems
The importance of drone use is increasing in all fields due to several characteristics and advant... more The importance of drone use is increasing in all fields due to several characteristics and advantages they provide, such as saving lives, quality imaging, and being easily controllable. In addition, Unmanned Aerial Vehicle (UAV) prices are going to decrease, this has contributed greatly to an increase in demand for them. However, many challenges face the widespread use of UAVs. One of the most important challenges is his vulnerability to hacking. This paper presents a semi-decentralized collaboration model for the secure measurement of drone positions. The proposed model is based on choosing a leader for each specified period of time by a lightweight consensus algorithm. The leader gets his position using satellites, other drone team members are based on the leader’s safe position to find their locations in a way that is immune to GPS spoofing. Our proposal study shows the extent of the security level it provides against spoofing attacks.
WSEAS TRANSACTIONS ON SYSTEMS, 2021
The multi-depot vehicle routing problem is a variant of the vehicle routing problem that tries to... more The multi-depot vehicle routing problem is a variant of the vehicle routing problem that tries to minimize the total cost of providing the service from several depots to satisfy several client demands. This paper presents a multi-ant colony system to solve the multi-depot vehicle routing problem using a reactive agent-based approach. This approach is designed to effectively solve the problem, in which each reactive agent is inspired by modeling the behavior of the ant. We define two types of reactive agents whose behavior differs in the use of two kinds of pheromone trail. In order to refer to the two phases of the execution process, i.e., the assignment phase and the routing phase, every reactive agent cooperates with others to provide a scalable solution for the overall problem. The solution of the multi-depot vehicle routing problem is beneficial and helpful for many real applications. The performance evaluation of the proposed approach is done using instances from the literature...
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019
Watermarking is the technique to prove the security aspects of the material. One of the main aspe... more Watermarking is the technique to prove the security aspects of the material. One of the main aspects in any watermarking method is the imperceptibly and the fidelity of the watermarked data. The place chosen for watermark embedding affects directly in the imperceptibility and fidelity characteristics. Choosing optimal area of embedding is still worrying issue. Robust watermarking approach is helpful for proving the intellectual ownership property rights. Moreover, medical image is very sensitive for any slight modification. However, spatial domain provides less complexity, but unfortunately less robustness comparing to frequency domain. We present through this paper, a watermarking approach in the spatial domain. Our approach investigated Dijkstra algorithm in order to find the optimal path of embedding data, where the Mean aspects can play a vital role in the algorithm. Our approach provides less complexity with high robustness regarding to the relevant existing approaches operating in spatial domain. Moreover, the approach provides watermark integrity aspects and ability to detect any tamper happening for the embedded watermark and moreover the ability to recover the attacked watermark.
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 2021
Multimedia tools and applications, Jun 25, 2024
HAL (Le Centre pour la Communication Scientifique Directe), Jul 11, 2021
The 5th International Conference on Future Networks & Distributed Systems, Dec 15, 2021
This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approa... more This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approach presented in [5]. 3SOA defines a practical approach for implementing service-oriented Internet of Things (IoT) using coordination languages to integrate and program individual IoT objects to compose into full IoT system. We believe that the modularity, reuse, interoperability and portability of this model has much to offer, but that there exist some challenges in overcoming the performance issues inherent in the approach, and extending the range of applications to which it is suited. We are particularly interested in applying the coordination languages to decentralized systems. To this end, blockchain smart contracts are proposed to offer a decentralized trustable method to automatically verify compliance with pre-defined conditions before executing a transaction involving multiple parties. To validate our proposal, we demonstrate a healthcare functional prototypes as a proof of concept.
HAL (Le Centre pour la Communication Scientifique Directe), Jun 8, 2016
International audienc
Proceedings of the 6th International Conference on Future Networks & Distributed Systems
IEEE Internet of Things Journal
Applied Sciences
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity,... more Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove their robustness, but are unsuitable in several domains due to their computational complexity. Other asymmetric encryption schemes have been proposed to provide a cloud homomorphic encryption service, where the researchers focused only on how to ensure the homomorphic property. This paper proposes a new digital signature scheme dedicated to a family of encryption techniques. The proposal consists of two parts: the first focused on the secret key, and the second focused on the public key. Signature validity checking was performed by multiplying these two parts to reform again the sender’s public key, then comparing the result with the decrypted message. The validation of the decrypted message guarantees data integrity, where the sign...
Social networking services such as Facebook, Twitter, and YouTube are fertile ground for analyzin... more Social networking services such as Facebook, Twitter, and YouTube are fertile ground for analyzing texts, extracting opinions, and identifying feelings, due to the large number of texts and their diversity in all areas of life. In this manuscript, we apply four algorithms to classify tweets written in the Algerian dialect. To extract feelings, we used six features based on three polarities. In the presented work, we manually annotate a corpus of 2,891 texts and create an Algerian lexicon of idioms that contains 1328 annotated words. Our results show that there are improvements gained on the accuracy of the system, where we have achieved a better accuracy of 85.31%.
Cryptography helps solve many computer and communication problems, including clock synchronizatio... more Cryptography helps solve many computer and communication problems, including clock synchronization, where a group of nodes wants to agree on a theoretically unique clock in the system with the presence of malicious nodes trying to prevent the process of convergence; so we will need a set of mechanisms, including encryption. Many synchronization techniques suffer from high power consumption or vulnerability to attack or difficulty of implementation. In this article, we propose a synchronization protocol that contains two parts. The first part uses a lightweight linear scheme to encrypt clock messages to fend off certain types of attacks such as message manipulation. This scheme is suitable for Wireless sensor networks (WSNs) with negligible encryption and decryption time. The second part is the process of calculating the clock based on a very simple consensus algorithm. The study of the proposed protocol has shown very satisfactory results.
International Journal of Organizational and Collective Intelligence
Religion is a source of mercy and peace; religious texts are one of the most critical parts of a ... more Religion is a source of mercy and peace; religious texts are one of the most critical parts of a culture's heritage, and they affect societies often in a big way; sadly, misconceptions can also make some religious people extremists. Modern social networks provide a platform for people to express themselves share their opinions and show their affiliations on many topics. This generates data in many forms like photos, videos, and texts. The authors used predefined machine learning (ML) to classify and analyze textual data from social networks. In this paper, they focus on two types of classification: religious and extremist. Extremism is independent of religious text, and therefore, they classify them separately. The work uses and compares several algorithms to classify textual data from social networks. The proposed model has achieved 93.33% accuracy for religious classification and 97% accuracy for extremism detection.
Accord is an important operation in the mechanism design for multi-agent systems and consequently... more Accord is an important operation in the mechanism design for multi-agent systems and consequently to applications built for these environments , such as ad hoc networks, virtual organizations, and decision-support tools for smart production systems. Much attention has been given to designing the process for resisting manipulation by strategic voting and decentralized control. The emphasis is on local decision-making based on locally available information and perception of events occurring locally. This manuscript presents a secure decision-support algorithm in a multi-agent system. The proposed consensus-based model serves multiple purposes in production planning and control, supply chain management , and product design and development. In particular, we describe decision-making, the selection of a leader, and the exploitation of limited resources. The importance of the proposal is to ensure robustness in a specific way; in which, decisions are carried out considering that the syste...
IEEE Transactions on Industrial Informatics
The 5th International Conference on Future Networks & Distributed Systems
The importance of drone use is increasing in all fields due to several characteristics and advant... more The importance of drone use is increasing in all fields due to several characteristics and advantages they provide, such as saving lives, quality imaging, and being easily controllable. In addition, Unmanned Aerial Vehicle (UAV) prices are going to decrease, this has contributed greatly to an increase in demand for them. However, many challenges face the widespread use of UAVs. One of the most important challenges is his vulnerability to hacking. This paper presents a semi-decentralized collaboration model for the secure measurement of drone positions. The proposed model is based on choosing a leader for each specified period of time by a lightweight consensus algorithm. The leader gets his position using satellites, other drone team members are based on the leader’s safe position to find their locations in a way that is immune to GPS spoofing. Our proposal study shows the extent of the security level it provides against spoofing attacks.
WSEAS TRANSACTIONS ON SYSTEMS, 2021
The multi-depot vehicle routing problem is a variant of the vehicle routing problem that tries to... more The multi-depot vehicle routing problem is a variant of the vehicle routing problem that tries to minimize the total cost of providing the service from several depots to satisfy several client demands. This paper presents a multi-ant colony system to solve the multi-depot vehicle routing problem using a reactive agent-based approach. This approach is designed to effectively solve the problem, in which each reactive agent is inspired by modeling the behavior of the ant. We define two types of reactive agents whose behavior differs in the use of two kinds of pheromone trail. In order to refer to the two phases of the execution process, i.e., the assignment phase and the routing phase, every reactive agent cooperates with others to provide a scalable solution for the overall problem. The solution of the multi-depot vehicle routing problem is beneficial and helpful for many real applications. The performance evaluation of the proposed approach is done using instances from the literature...
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019
Watermarking is the technique to prove the security aspects of the material. One of the main aspe... more Watermarking is the technique to prove the security aspects of the material. One of the main aspects in any watermarking method is the imperceptibly and the fidelity of the watermarked data. The place chosen for watermark embedding affects directly in the imperceptibility and fidelity characteristics. Choosing optimal area of embedding is still worrying issue. Robust watermarking approach is helpful for proving the intellectual ownership property rights. Moreover, medical image is very sensitive for any slight modification. However, spatial domain provides less complexity, but unfortunately less robustness comparing to frequency domain. We present through this paper, a watermarking approach in the spatial domain. Our approach investigated Dijkstra algorithm in order to find the optimal path of embedding data, where the Mean aspects can play a vital role in the algorithm. Our approach provides less complexity with high robustness regarding to the relevant existing approaches operating in spatial domain. Moreover, the approach provides watermark integrity aspects and ability to detect any tamper happening for the embedded watermark and moreover the ability to recover the attacked watermark.
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 2021