This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Cloud computing is the access via internet to shared resources and services. Merging this technol... more Cloud computing is the access via internet to shared resources and services. Merging this technology with RFID enabled the improvement of the latter such as data storage and processing, and both allow to have intelligent environments and access services anytime and anywhere. But this fusion is the subject of some criticism concerning the data security and privacy. In this article we are interested in the authentication of tag / reader to the cloud interface and we propose a protocol using elliptic curve cryptography (ECC) to verify the identity of readers before issuing the certificate which authenticates the reader to tag, and then lets them access the cloud interface.
2015 Long Island Systems, Applications and Technology, 2015
In recent years, the estimation of human sleep disorders from Electroencephalogram (EEG) signals ... more In recent years, the estimation of human sleep disorders from Electroencephalogram (EEG) signals have played an important role in developing automatic detection of sleep stages. A few methods exist in the market presently towards this aim. However, sleep physicians may not have full assurance and consideration in such methods due to concerns associated with systems accuracy, sensitivity and specificity. This paper presents a novel and efficient technique that can be implemented in a microcontroller device to identify sleep stages in an effort to assist physicians in the diagnosis and treatment of related sleep disorders by enhancing the accuracy of the developed algorithm using a single channel of EEG signals. First, the dataset of EEG signal is filtered and decomposed into delta, theta, alpha, beta and gamma subbands using Butterworth band-pass filters. Second, a set of sample statistical discriminating features are derived from each frequency band. Finally, sleep stages consisting of Wakefulness, Rapid Eye Movement (REM) and Non-Rapid Eye Movement (NREM) are classified using several supervised machine learning classifiers including multi-class Support Vector Machines (SVM), Decision Trees (DT), Neural Networks (NN), K-Nearest Neighbors (KNN) and Naive Bayes (NB). This paper combines REM with Stage 1 NREM due to data similarities. Performance is then compared based on single channel EEG signals that were obtained from 20 healthy subjects. The results show that the proposed technique using DT classifier efficiently achieves high accuracy of 97.30% in differentiating sleeps stages. Also, a comparison of our method with some recent available works in the literature reiterates the high classification accuracy performance.
This paper introduces two decoders for binary linear codes based on Metaheuristics. The first one... more This paper introduces two decoders for binary linear codes based on Metaheuristics. The first one uses a genetic algorithm and the second is based on a combination genetic algorithm with a feed forward neural network. The decoder based on the genetic algorithms (DAG) applied to BCH and convolutional codes give good performances compared to Chase-2 and Viterbi algorithm respectively and reach the performances of the OSD-3 for some Residue Quadratic (RQ) codes. This algorithm is less complex for linear block codes of large block length; furthermore their performances can be improved by tuning the decoder-s parameters, in particular the number of individuals by population and the number of generations. In the second algorithm, the search space, in contrast to DAG which was limited to the code word space, now covers the whole binary vector space. It tries to elude a great number of coding operations by using a neural network. This reduces greatly the complexity of the decoder while main...
2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), 2017
Currently, vehicular cloud computing has appeared as one of the fast growing technologies in the ... more Currently, vehicular cloud computing has appeared as one of the fast growing technologies in the globe. The cloud-based RFID merged with the VANET provide many advantages such as data storage and processing. This paper proposes an intelligent RFID-enabled authentication scheme for filtering access applications in VANET environment. In the proposed scheme, an ECC authentication model is used to protect the authentication of HF or UHF tags, and readers. The proposed scheme can be used in many fields and applications such as campuses, parking, toll collection, etc. To evaluate the effectiveness of the proposed architecture, a case study was treated in a university campus. In order to allow research works, teaching and the various activities of the University's units to be carried out in a high level of security, a system filtering the access of vehicles to campus was applied.
2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech), 2016
The adoption of cloud computing is accelerating among health care providers, as they realize the ... more The adoption of cloud computing is accelerating among health care providers, as they realize the limitations of traditional systems of computerized medical file. Many obstacles must be overcome, however, with regard to respect for privacy and patient safety. In order to ensure the respect for privacy, an encryption of data is required. An encryption that allows to compute over encrypted data without having to decrypt. In this paper we focus on cloud computing and its adoption in different domain, we describe the role of homomorphic encryption scheme for preserving privacy data sharing in the cloud and propose a system that ensures confidentiality of data by using partial homomorphic encryption algorithms.
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
Abstract A Wireless Sensor Network (WSN) is one that is in continual interaction with its environ... more Abstract A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and executes at a pace determined by that environment. The use of rigorous formal method in specification and validation can help designers to limit the introduction of ...
A Reactive system is one that is in continual interaction with its environment, and executes at a... more A Reactive system is one that is in continual interaction with its environment, and executes at a pace determined by that environment. Examples of such systems are network protocols, industrial-process control systems etc. The use of rigorous formal method in specification and validation, can help designers to limit the introduction of potentially faulty components during the construction of the system. Due to their complex nature, reactive systems are extremely difficult to specify and validate. In this paper, we propose a new formal model for the specification and the validation of such systems. This approach considers a Reactive System as a Reactive Multi-Agent System consisting of concurrent reactive agents that cooperate with each other to achieve the desired functionality. In addition, this approach uses formal synchronous specification and verification tools in order to specify and to verify the systems behaviors. Finally an example of an application of the approach is mentioned.
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
Abstract This paper introduces a new decoder based on genetic algorithms and neural networks for ... more Abstract This paper introduces a new decoder based on genetic algorithms and neural networks for binary linear codes. The search space, in contrast to our previous algorithms which was limited to the codeword space, now covers the whole binary vector space. The ...
A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and... more A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and executes at a pace determined by that environment. The use of rigorous formal method in specification and validation can help designers to limit the introduction of potentially faulty components during the construction of the system. Due to their complex nature, WSN are extremely difficult to specify and validate. In this paper, we propose a new formal model for the specification and the validation of such systems. This approach considers a WSN as a Reactive Multi-Agent System consisting of concurrent reactive agents that cooperate with each other to achieve the desired functionality. In addition, this approach uses formal synchronous specification and verification tools in order to specify and to verify the systems behaviors.
The emergence of cloud computing and cyber-physical systems made of security in processing data a... more The emergence of cloud computing and cyber-physical systems made of security in processing data a major challenge. In order to ensure privacy and confidentiality of the data being manipulated, the use of cryptography is widely used today. In 2009, C. Gentry proposed the first fully homomorphic cryptosystem, to perform calculations on data previously encrypted without having to decrypt. This progress has allowed the opening of many industrial and research perspectives. However, despite recent progress, many limitations remain today on the lack of performance of these systems and their strong memory requirements. In this paper we focus on cloud computing along with its various security and privacy issues, we describe the role of homomorphic encryption scheme for ensuring data privacy and compare its types based on different characteristics.
This paper introduces a decoder for binary linear codes based on Genetic Algorithm (GA) over the ... more This paper introduces a decoder for binary linear codes based on Genetic Algorithm (GA) over the Gaussian and Rayleigh flat fading channel. The performances and compututional complexity of our decoder applied to BCH and convolutional codes are good compared to Chase-2 and Viterbi algorithm respectively. It show that our algorithm is less complex for linear block codes of large block
International Conference on Control, Decision and Information Technologies, 2017
The objective of this paper is to propose a robust approach to the automatic detection and recogn... more The objective of this paper is to propose a robust approach to the automatic detection and recognition of road signs using video stream images. Our approach consists of three main phases: extracting the interest areas of the image, processing these zones and finally matching the extracted areas of the image with the reference road signs by comparing the extracted interest points using the SURF and the FLANN.
A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and... more A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and executes at a pace determined by that environment. The use of rigorous formal method in specification and validation can help designers to limit the introduction of potentially faulty components during the construction of the system. Due to their complex nature, WSN are extremely difficult to specify and validate. In this paper, we propose a new formal model for the specification and the validation of such systems. This approach considers a WSN as a Reactive Multi-Agent System consisting of concurrent reactive agents that cooperate with each other to achieve the desired functionality. In addition, this approach uses formal synchronous specification and verification tools in order to specify and to verify the systems behaviors.
Abstract—This paper introduces two decoders for binary linear codes based on Metaheuristics. The ... more Abstract—This paper introduces two decoders for binary linear codes based on Metaheuristics. The first one uses a genetic algorithm and the second is based on a combination genetic algorithm with a feed forward neural network. The decoder based on the genetic algorithms (DAG) applied to BCH and convolutional codes give good performances compared to Chase-2 and Viterbi algorithm respectively and reach the performances of the OSD-3 for some Residue Quadratic (RQ) codes. This algorithm is less complex for linear block codes of large block length; furthermore their performances can be improved by tuning the decoder’s parameters, in particular the number of individuals by population and the number of generations. In the second algorithm, the search space, in contrast to DAG which was limited to the code word space, now covers the whole binary vector space. It tries to elude a great number of coding operations by using a neural network. This reduces greatly the complexity of the decoder w...
Currently, vehicular cloud computing has appeared as one of the fast growing technologies in the ... more Currently, vehicular cloud computing has appeared as one of the fast growing technologies in the globe. The cloud-based RFID merged with the VANET provide many advantages such as data storage and processing. This paper proposes an intelligent RFID-enabled authentication scheme for filtering access applications in VANET environment. In the proposed scheme, an ECC authentication model is used to protect the authentication of HF or UHF tags, and readers. The proposed scheme can be used in many fields and applications such as campuses, parking, toll collection, etc. To evaluate the effectiveness of the proposed architecture, a case study was treated in a university campus. In order to allow research works, teaching and the various activities of the University's units to be carried out in a high level of security, a system filtering the access of vehicles to campus was applied.
A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and... more A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and executes at a pace determined by that environment. The use of rigorous formal method in specification and validation can help designers to limit the introduction of potentially faulty components during the construction of the system. Due to their complex nature, WSN are extremely difficult to specify and validate. In this paper, we propose a new formal model for the specification and the validation of such systems. This approach considers a WSN as a Reactive Multi-Agent System consisting of concurrent reactive agents that cooperate with each other to achieve the desired functionality. In addition, this approach uses formal synchronous specification and verification tools in order to specify and to verify the systems behaviors.
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Cloud computing is the access via internet to shared resources and services. Merging this technol... more Cloud computing is the access via internet to shared resources and services. Merging this technology with RFID enabled the improvement of the latter such as data storage and processing, and both allow to have intelligent environments and access services anytime and anywhere. But this fusion is the subject of some criticism concerning the data security and privacy. In this article we are interested in the authentication of tag / reader to the cloud interface and we propose a protocol using elliptic curve cryptography (ECC) to verify the identity of readers before issuing the certificate which authenticates the reader to tag, and then lets them access the cloud interface.
2015 Long Island Systems, Applications and Technology, 2015
In recent years, the estimation of human sleep disorders from Electroencephalogram (EEG) signals ... more In recent years, the estimation of human sleep disorders from Electroencephalogram (EEG) signals have played an important role in developing automatic detection of sleep stages. A few methods exist in the market presently towards this aim. However, sleep physicians may not have full assurance and consideration in such methods due to concerns associated with systems accuracy, sensitivity and specificity. This paper presents a novel and efficient technique that can be implemented in a microcontroller device to identify sleep stages in an effort to assist physicians in the diagnosis and treatment of related sleep disorders by enhancing the accuracy of the developed algorithm using a single channel of EEG signals. First, the dataset of EEG signal is filtered and decomposed into delta, theta, alpha, beta and gamma subbands using Butterworth band-pass filters. Second, a set of sample statistical discriminating features are derived from each frequency band. Finally, sleep stages consisting of Wakefulness, Rapid Eye Movement (REM) and Non-Rapid Eye Movement (NREM) are classified using several supervised machine learning classifiers including multi-class Support Vector Machines (SVM), Decision Trees (DT), Neural Networks (NN), K-Nearest Neighbors (KNN) and Naive Bayes (NB). This paper combines REM with Stage 1 NREM due to data similarities. Performance is then compared based on single channel EEG signals that were obtained from 20 healthy subjects. The results show that the proposed technique using DT classifier efficiently achieves high accuracy of 97.30% in differentiating sleeps stages. Also, a comparison of our method with some recent available works in the literature reiterates the high classification accuracy performance.
This paper introduces two decoders for binary linear codes based on Metaheuristics. The first one... more This paper introduces two decoders for binary linear codes based on Metaheuristics. The first one uses a genetic algorithm and the second is based on a combination genetic algorithm with a feed forward neural network. The decoder based on the genetic algorithms (DAG) applied to BCH and convolutional codes give good performances compared to Chase-2 and Viterbi algorithm respectively and reach the performances of the OSD-3 for some Residue Quadratic (RQ) codes. This algorithm is less complex for linear block codes of large block length; furthermore their performances can be improved by tuning the decoder-s parameters, in particular the number of individuals by population and the number of generations. In the second algorithm, the search space, in contrast to DAG which was limited to the code word space, now covers the whole binary vector space. It tries to elude a great number of coding operations by using a neural network. This reduces greatly the complexity of the decoder while main...
2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), 2017
Currently, vehicular cloud computing has appeared as one of the fast growing technologies in the ... more Currently, vehicular cloud computing has appeared as one of the fast growing technologies in the globe. The cloud-based RFID merged with the VANET provide many advantages such as data storage and processing. This paper proposes an intelligent RFID-enabled authentication scheme for filtering access applications in VANET environment. In the proposed scheme, an ECC authentication model is used to protect the authentication of HF or UHF tags, and readers. The proposed scheme can be used in many fields and applications such as campuses, parking, toll collection, etc. To evaluate the effectiveness of the proposed architecture, a case study was treated in a university campus. In order to allow research works, teaching and the various activities of the University's units to be carried out in a high level of security, a system filtering the access of vehicles to campus was applied.
2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech), 2016
The adoption of cloud computing is accelerating among health care providers, as they realize the ... more The adoption of cloud computing is accelerating among health care providers, as they realize the limitations of traditional systems of computerized medical file. Many obstacles must be overcome, however, with regard to respect for privacy and patient safety. In order to ensure the respect for privacy, an encryption of data is required. An encryption that allows to compute over encrypted data without having to decrypt. In this paper we focus on cloud computing and its adoption in different domain, we describe the role of homomorphic encryption scheme for preserving privacy data sharing in the cloud and propose a system that ensures confidentiality of data by using partial homomorphic encryption algorithms.
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
Abstract A Wireless Sensor Network (WSN) is one that is in continual interaction with its environ... more Abstract A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and executes at a pace determined by that environment. The use of rigorous formal method in specification and validation can help designers to limit the introduction of ...
A Reactive system is one that is in continual interaction with its environment, and executes at a... more A Reactive system is one that is in continual interaction with its environment, and executes at a pace determined by that environment. Examples of such systems are network protocols, industrial-process control systems etc. The use of rigorous formal method in specification and validation, can help designers to limit the introduction of potentially faulty components during the construction of the system. Due to their complex nature, reactive systems are extremely difficult to specify and validate. In this paper, we propose a new formal model for the specification and the validation of such systems. This approach considers a Reactive System as a Reactive Multi-Agent System consisting of concurrent reactive agents that cooperate with each other to achieve the desired functionality. In addition, this approach uses formal synchronous specification and verification tools in order to specify and to verify the systems behaviors. Finally an example of an application of the approach is mentioned.
2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008
Abstract This paper introduces a new decoder based on genetic algorithms and neural networks for ... more Abstract This paper introduces a new decoder based on genetic algorithms and neural networks for binary linear codes. The search space, in contrast to our previous algorithms which was limited to the codeword space, now covers the whole binary vector space. The ...
A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and... more A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and executes at a pace determined by that environment. The use of rigorous formal method in specification and validation can help designers to limit the introduction of potentially faulty components during the construction of the system. Due to their complex nature, WSN are extremely difficult to specify and validate. In this paper, we propose a new formal model for the specification and the validation of such systems. This approach considers a WSN as a Reactive Multi-Agent System consisting of concurrent reactive agents that cooperate with each other to achieve the desired functionality. In addition, this approach uses formal synchronous specification and verification tools in order to specify and to verify the systems behaviors.
The emergence of cloud computing and cyber-physical systems made of security in processing data a... more The emergence of cloud computing and cyber-physical systems made of security in processing data a major challenge. In order to ensure privacy and confidentiality of the data being manipulated, the use of cryptography is widely used today. In 2009, C. Gentry proposed the first fully homomorphic cryptosystem, to perform calculations on data previously encrypted without having to decrypt. This progress has allowed the opening of many industrial and research perspectives. However, despite recent progress, many limitations remain today on the lack of performance of these systems and their strong memory requirements. In this paper we focus on cloud computing along with its various security and privacy issues, we describe the role of homomorphic encryption scheme for ensuring data privacy and compare its types based on different characteristics.
This paper introduces a decoder for binary linear codes based on Genetic Algorithm (GA) over the ... more This paper introduces a decoder for binary linear codes based on Genetic Algorithm (GA) over the Gaussian and Rayleigh flat fading channel. The performances and compututional complexity of our decoder applied to BCH and convolutional codes are good compared to Chase-2 and Viterbi algorithm respectively. It show that our algorithm is less complex for linear block codes of large block
International Conference on Control, Decision and Information Technologies, 2017
The objective of this paper is to propose a robust approach to the automatic detection and recogn... more The objective of this paper is to propose a robust approach to the automatic detection and recognition of road signs using video stream images. Our approach consists of three main phases: extracting the interest areas of the image, processing these zones and finally matching the extracted areas of the image with the reference road signs by comparing the extracted interest points using the SURF and the FLANN.
A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and... more A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and executes at a pace determined by that environment. The use of rigorous formal method in specification and validation can help designers to limit the introduction of potentially faulty components during the construction of the system. Due to their complex nature, WSN are extremely difficult to specify and validate. In this paper, we propose a new formal model for the specification and the validation of such systems. This approach considers a WSN as a Reactive Multi-Agent System consisting of concurrent reactive agents that cooperate with each other to achieve the desired functionality. In addition, this approach uses formal synchronous specification and verification tools in order to specify and to verify the systems behaviors.
Abstract—This paper introduces two decoders for binary linear codes based on Metaheuristics. The ... more Abstract—This paper introduces two decoders for binary linear codes based on Metaheuristics. The first one uses a genetic algorithm and the second is based on a combination genetic algorithm with a feed forward neural network. The decoder based on the genetic algorithms (DAG) applied to BCH and convolutional codes give good performances compared to Chase-2 and Viterbi algorithm respectively and reach the performances of the OSD-3 for some Residue Quadratic (RQ) codes. This algorithm is less complex for linear block codes of large block length; furthermore their performances can be improved by tuning the decoder’s parameters, in particular the number of individuals by population and the number of generations. In the second algorithm, the search space, in contrast to DAG which was limited to the code word space, now covers the whole binary vector space. It tries to elude a great number of coding operations by using a neural network. This reduces greatly the complexity of the decoder w...
Currently, vehicular cloud computing has appeared as one of the fast growing technologies in the ... more Currently, vehicular cloud computing has appeared as one of the fast growing technologies in the globe. The cloud-based RFID merged with the VANET provide many advantages such as data storage and processing. This paper proposes an intelligent RFID-enabled authentication scheme for filtering access applications in VANET environment. In the proposed scheme, an ECC authentication model is used to protect the authentication of HF or UHF tags, and readers. The proposed scheme can be used in many fields and applications such as campuses, parking, toll collection, etc. To evaluate the effectiveness of the proposed architecture, a case study was treated in a university campus. In order to allow research works, teaching and the various activities of the University's units to be carried out in a high level of security, a system filtering the access of vehicles to campus was applied.
A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and... more A Wireless Sensor Network (WSN) is one that is in continual interaction with its environment, and executes at a pace determined by that environment. The use of rigorous formal method in specification and validation can help designers to limit the introduction of potentially faulty components during the construction of the system. Due to their complex nature, WSN are extremely difficult to specify and validate. In this paper, we propose a new formal model for the specification and the validation of such systems. This approach considers a WSN as a Reactive Multi-Agent System consisting of concurrent reactive agents that cooperate with each other to achieve the desired functionality. In addition, this approach uses formal synchronous specification and verification tools in order to specify and to verify the systems behaviors.
Uploads
Papers by rahal romadi