Book Edition
Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/753
Browse
7 results
Search Results
Item Special Issue on Interconnections of Wireless Sensor Networks(InderScience, 2011-05) Derhab, Abdelouahid; Djenouri, Djamel; Jianguo, DingItem A Formal Approach for a Self Organizing Protocol Inspired by Bacteria Colonies: Production System Application(Springer Berlin Heidelberg, 2010) Mellah, Hakima; Hassas, Salima; Drias, Habiba; Raiah, A.; Tiguemoumine, A.Any dysfunction in production system (PS) is likely to be very expensive; so modelling by Multi Agent Systems (MAS) makes the production system (PS) possible to have aspects of robustness, reactivity and flexibility, which allow the PS control to be powerful and to react to all the risks being able to occur. In order to have a fault-tolerant PS, we propose when and how to recourse to a self organizing protocol making the MAS capable of changing its communication structure or organization, and thus reorganizing itself without any external intervention.Item Tags Weighting Based on User Profile(Springer Berlin Heidelberg, 2011) Kichou, Saida; Mellah, Hakima; Amghar, Youssef; Dahak, FouadThe ’Collaborative Tagging’ is gaining popularity on Web 2.0, this new generation of Web which makes user reader/writer. The ’Tagging’ is a mean for users to express themselves freely through additions of label called ’Tags’ to shared resources. One of the problems encountered in current tagging systems is to define the most appropriate tag for a resource. Tags are typically listed in order of popularity, as del-icio-us. But the popularity of the tag does not always reflect its importance and representativeness for the resource to which it is associated. Starting from the assumptions that the same tag for a resource can take different meanings for different users, and a tag from a knowledgeable user would be more important than a tag from a novice user, we propose an approach for weighting resource’s tags based on user profile. For this we define a user model for his integration in the tag weight calculation and a formula for this calculation, based on three factors namely the user, the degree of approximation between his interest centers and the resource field, expertise and personal assessment for tags associated to the resource. A resource descriptor containing the best tags is created.Item A Comparison on MANETs’ Service Replication Schemes: Interest versus Topology Prediction(Springer, 2010) Derhab, Abdelouahid; Hamdy, Mohamed; König-Ries, BirgittaMobile ad hoc networks (MANETs) are characterized by high dynamics in particular with respect to the formation of network partitions. The presence of unconnected partitions makes the deployed services inaccessible to some network participants. Service replication is employed as an approach to overcome this problem and to ensure higher service availability. Several protocols and algorithms for service replication in MANETs have been proposed. Most of these approaches apply topological analysis (like partitioning prediction) schemes to produce the required replication decisions. One approach, SDP, the Service Distribution Protocol, bases its decisions on analyzing interest in the service, an application layer concept. In this paper, we compare the performance of approaches based on these two criteria. First, we analyze protocols based on topology prediction and choose two typical representatives of this category, namely PSRP and SSRP. We then compare SDP as the only candidate using service interest to these two approaches. This comparison is based on an extensive set of simulation runs which are discussed in detail in the paper.Item SecuRights(Springer Berlin Heidelberg, 2011) Khenak, FerhatThe technicality is no longer an obstacle; the issue of any environment of E-Learning (before) or V-Learning (now) is the production then the protection (in terms of security and confidentiality) of the content flowing through it. As part of our national policy of Visual Informatics For Education (VIFE), specifically for our Algerian V-Learning Network (AVN), which is a device of distributed interactive learning spread over all our vast territory according to a new concept based on the principle of the Online Video Learning via Internet and/or by Satellite; we have developed an encryption method enabling a certain security of copyrights. This paper discusses this method and presents its SecuRights system based on a distributed random algorithm.Item Security in Mobile Ad hoc Networks Detection and lsolation of Selfish Nodes(LAP LAMBERT Academic Publishing, 2010-11) Djenouri, Djamel; Badache, NadjibItem Optimisation de la Consommation d'energie pour le Routage dans les Reseaux Mobiles Ad hoc(Editions Universitaires Europeennes, 2011) Djenouri, Djamel; Badache, Nadjib
