• Mobility Impact on Mobile Ad hoc Routing Protocols 

    Djenouri, Djamel; Derhab, Abdelouahid; Badache, Nadjib
    In : ACS/IEEE International Conference on Computer Systems and Applications (AICCSA'03), (IEEE Computer Society, Tunis, 2003)
    An ad hoc network is a set of mobile units connected by wireless technologies, making an infrastructureless temporary network. without turning to a central administration. The network topology is unpredictable, dynamic, it may change any time. These topology changes make ad hoc networks challenging to implement routing ...
  • An Energy Efficient routing protocol for mobile ad hoc networks 

    Djenouri, Djamel; Badache, Nadjib
    In : The 2nd IFIP Mediterranean Workshop on Ad-Hoc Networks, MED-HOC NET’03, (IFIP, Mahdia Tunisia, 2003-06)
    power consumed for routing data-packets in wireless ad hoc networks can be significantly reduced compared with the current min-hop max-power routing protocols. One of promising mechanisms proposed to reduce energy consumption is power control. Doshi & Timothy [7] have presented an implementation of this mechanism, and ...
  • Genetic algorithms and multifractal segmentation of cervical cell images 

    Lassouaoui, Nadia; Hamami, Latifa
    In : ISSPA'03 : Signal Processing and Its Applications, 2003. Proceedings, Seventh International Symposium on, (IEEE, Paris, France, 2003-07)
    This paper deals with the segmentation problem of cervical cell images. Knowing that the malignity criteria appear on the morphology of the core and the cytoplasm of each cell, then, the goal of this segmentation is to separate each cell on its component, that permits to analyze separately their morphology (size and ...
  • Morphological geodesic reconstruction in the extraction of the lesions in brain images 

    Lassouaoui, Nadia; Hamami, Latifa
    In : CISTEMA’2003 : Conférence Internationale sur les Systèmes de Télécommunications, d’Electronique Médicale et d’Automatique, (Université Aboubekr Belkaïd –Tlemcen, Tlemcen, Algérie, 2003-09)
    In this paper, we present algorithms that permit to extract the lesions in brain images. The goal is to extract the abnormal zones with respect of theirs morphological haracteristics as: size, shape and position. Then, we present to the doctor a simple image of abnormal zone that is easy to analysis and correct to ...
  • A Study on the Energy Consumption Minimisation in Mobile Ad Hoc Networks 

    Djenouri, Djamel; Badache, Nadjib
    In : International Arab Conference on Information Technology (ACIT'03), (Alexandria, Egypt, 2003-12)
    The emergence of lightweight wireless mobile devices, like laptops, PDAs, and sensors makes mobile ad hoc networks (MANETs) an exciting and important research area in recent years. The MANET community have been concentrating on some problems related to the network layer, especially on the routing protocols. ...
  • Une approche basée sur le simplexe pour le formatage spatial de documents multimédia interactifs 

    Maredj, Azze-Eddine; Ider, A.; Hammour, Achour
    In : SETIT 2004 : Conférence Internationale: Sciences Electroniques, Technologies de l'Information et des Télécommunications, Sousse, Tunisie, (IEEE, Sousse, Tunisie, 2004-03)
    L'objectif de ce papier est de montrer comment utiliser les techniques de programmation par contraintes, particulièrement la technique basée sur le simplexe, pour le formatage spatial des documents multimédia interactifs. Nous présentons dans la suite de ce papier le formalisme de la programmation par contrainte basée ...
  • Simulation evaluation of an energy efficient routing protocol for mobile ad hoc networks 

    Djenouri, Djamel; Badache, Nadjib
    In : IEEE/ACS International Conference on Pervasive Services (ICPS'04), (IEEE Computer Society, merican University of Beirut (AUB), Lebanon, 2004-07)
    Energy conservation is one of the most important issues in ad hoc networks, where computers used are usually supplied with limited autonomous resources. Recent studies show that the energy consumed for routing data-packets in wireless ad hoc networks can be significantly reduced compared with the current min-hop max-power ...
  • A two-phase commit protocol for mobile wireless environment 

    Nouali-Taboudjemat, Nadia; Doucet, Anne; Drias, Habiba
    In : The 16th Australasian database conference (ADC '05), (ACM, Australia, 2005)
    The challenges of wireless and mobile computing environments have attracted the attention of researchers to revisit the conventional implementation of distributed computing paradigms. In this paper we propose to revisit the conventional implementation of the Two Phase Commit (2PC) protocol which is a fundamental asset ...
  • La Gestion du Recouvrement Spatial dans les Documents Multimédia 

    Maredj, Azze-Eddine; Hammour, Achour
    In : 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications (SETIT 2005), (Sousse - Tunisie, 2005-03-27)
    Dans le domaine de l’édition et de la présentation des documents multimédia interactifs, le problème du recouvrement spatial constitue un élément déterminant pour une bonne qualité de service des applications qui ont découlent. En effet, de part le fait qu’un même espace de présentation peut être occupé, en même temps, ...
  • A Novel Approach for Selfish Nodes Detection in MANETs: Proposal and Petri Nets Based Modeling 

    Djenouri, Djamel; Badache, Nadjib
    In : 8th IEEE International Conference on Telecommunications, ConTEL, (IEEE, Zagreb, Croatia, 2005-06)
    The resource limitation of nodes used in selforganized ad hoc networks, along with the multi-hop nature of these networks, may cause a new behavioral phenomena which does not exist in traditional infrastructured environments. To save its energy, a node may behave sel shly, then it would not forward packets for other ...
  • Scalability of Wireless MAC Protocols in Mobile Ad hoc Networks 

    Djenouri, Djamel; Bouznada, Mohamed; Khiyat, Faten; Khelladi, Lyes
    In : First IEEE International Computer Systems and Information Technology Conference (ICSIT), (IEEE, Algiers, 2005-07)
    The rapid proliferation of lightweight wireless mobile devices, such as laptops, PDAs, and sensors makes mobile ad hoc networks (MANETs) an exciting and important research area nowadays. The MANET community have been concentrating on some problems related to the network layer, especially on the routing protocols. ...
  • New Approach for Selfish Nodes Detection in Mobile Ad hoc Networks 

    Djenouri, Djamel; Badache, Nadjib
    In : Security and Privacy for Emerging Areas in Communication Networks Workshops, (IEEE, Athens, Greece, 2005-09)
    A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services that were ensured by the powerful fixed infrastructure ...
  • Random Feedbacks for Selfish Nodes Detection in Mobile Ad Hoc Networks 

    Djenouri, Djamel; Ouali, Nabil; Mahmoudi, Ahmed; Badache, Nadjib
    In : 5th IEEE International Workshop on IP Operations and Management (IPOM);LNCS, (Springer, Barcelona, Spain, 2005-10)
    A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensure the services ensured by the powerful fixed infrastructure in traditional ...
  • Detection and Description the Lesions in Brain Images 

    Lassouaoui, Nadia; Hamami, Latifa; Nouali-Taboudjemat, Nadia; Hadjar, Samir; Saadi, Hocine
    In : ICMS 2005: International Conference on Modeling and Simulation: General Applications and Models in Engineering Science : Marrakech, Morocco 22, 23, 24 November 2005 : Proceedings, (University Cadi Ayyad (Marroc), Marrakech, Morocco, 2005-11)
    In this paper, we present the various stages for lesion recognition in brain images. We firstly apply a filtering based on geodesic reconstruction operator for increasing the quality of image. After, we use an unsupervised segmentation genetic algorithm for detecting the abnormal zones with respect of theirs morphological ...
  • Mobility and MAC protocols in MANETs 

    Djenouri, Djamel; Bouznada, Mohamed; Khiyat, Faten
    In : Proceedings of the International Arab Conference on Information Technology (ACIT'05), (Amman, Jordan, 2005-12)
    The emergence of lightweight wireless mobile de-vices, like laptops, PDAs, and sensors makes mo-bile ad hoc networks (MANETs) an exciting and important research area in recent years. The MANET community have been concentrating on some problems related to the network layer, es-pecially on the routing protocols. But regarding ...
  • A Communication model of distributed information sources bacteria colonies inspired 

    Mellah, Hakima; Hassas, Salima; Drias, Habiba
    In : INES '06 : 10th International Conference on Intelligent Engineering Systems, 26-28 June 20062006. Proceedings, (IEEE, London, 2006)
    The implementation of communication organizational strategies constitutes an essential performance factor. Nowadays, the organization becomes companies competitiveness element (organizational structures), networks, knowledge and competences management, and cooperation. This, to be better reactive to ensure the competing ...
  • Improvement of a retrieval and f iltering systems by an automatic multi words extraction tool 

    Nouali, Omar; Krinah, Abdelghani
    In : The 4th International Multiconference on Computer Science and Information Technology 5th – 7th, April 2006., (Ghassan Issa, General Chair, Amman-Jordan, 2006-04)
    The role of all retrieval systems consists in finding documents (or document excerpts) that best answer an information need. This need, whether precise and instant (a request) or general and long term (a profile), is most often expre ssed by a list of entities called terms. The goal of this article is to present an ...
  • XML-DFG : A Dynamic Forms Generator for XML Valid DTD Document 

    Maredj, Azze-Eddine; Khouatmi-Boukhatem, Samia; Adjerad, Halima Douniazed
    In : 4th International Multiconference on Computer Science and Information Technology (CSIT 2006), (Amman - Jordan, 2006-04)
    Today, new needs place internet at the center of very huge technological challenges. Structure standardization of the data diffused and exchanged on the web is one of conditions to meet these challenges. New technologies are thus necessary and a great hope is built on XML technology. However, and in spite of the profusion ...
  • Anonymous Mobile Agents 

    Benmeziane, Souad; Larab, Baghdad
    In : (IEEE, Syria, 2006-04-24)
    One of the most important issues of the agent security is to keep the agent anonymity, not only in regard of the outsider (eavesdropper) but from the visited hosts too. Indeed, the observer may access agent's data, like the agent's route information data, and thus collecting sensitive information about the agent's owner. ...
  • Testimony-Based Isolation: New Approach to Overcome packet Dropping Attacks in MANET 

    Djenouri, Djamel; Badache, Nadjib
    In : The 7th Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting, (John Moors University, John Moors University, Liverpool, UK, 2006-06)
    Attackers could take advantage of the cooperative nature of MANET’s routing protocols, by participating in the route discovery procedure to include themselves in routes, then simply drop data packets during the forwarding phase, aiming at a DoS (Denial of Service) attack. In this paper we deal with the detection and ...