This page has only limited features, please log in for full access.

Prof. Abderrazak Jemai
University of Carthage, National Institute of Applied Sciences and Technology (INSAT), 1080, Tunis, Tunisia

Basic Info


Research Keywords & Expertise

0 Co-design
0 Embedded Systems
0 PSO
0 Security
0 IoT

Fingerprints

PSO
Security
Embedded Systems
IoT
Co-design
Industry 4.0

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

Abderrazak JEMAI, Professor at National Institute of Applied Science and Technology (INSAT), University of Carthage, Tunis, Tunisia. He received an Engineer degree from the University of Tunis (ENSI), Tunisia in 1988 and the DEA and “Doctor” degrees from the University of Grenoble (ENSIMAG-INPG), France, in 1989 and 1992, respectively, and he received his Habilitation Degree in 2012, all in computer science. He became Full Professor in computer Science in July 2018. From 1989 to 1992 he prepared his thesis on simulation of RISC processors and parallel architectures. Since 1993, his interests are focused on high level synthesis and simulation at behavioral and system levels within AMICAL and COSMOS at TIMA Laboratory in Grenoble. Abderrazak Jemai became an Assistant at the ENSI University in Tunis in 1993 and an Assistant-Professor at the INSAT University in Tunis from 1994 to 2013. In 2013, he became an Associate- Professor in Computer Science at INSAT Institute and Full Professor in computer Science in July 2018. From 2014 to August 2015, Abderrazak JEMAI became the General Director (CEO) of the National Center of Informatics in Tunisia (CNI) dealing with government’ applications and related access services, data storage and security (eGov, Intranet, etc.). He is also the principal investigator for the “Codesign & IoT" in SERCOM/EPT Tunisia Lab. His last interest is focused on the co-design of embedded systems, Smart-IoT, Industry 4.0, Security and Cyber-Security.

Following
Followers
Co Authors
Profile ImageSana Belguith School of Science, Environme...
Profile ImageHichem Mrabet Saudi Electronic University
Profile ImageKamel Smiri LIP2 Laboratory, University ...
Following: 4 users
View all

Feed

Review
Published: 04 November 2020 in Sustainability
Reads 0
Downloads 0

A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.

ACS Style

Sidi ElMamy; Hichem Mrabet; Hassen Gharbi; Abderrazak Jemai; Damien Trentesaux. A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0. Sustainability 2020, 12, 9179 .

AMA Style

Sidi ElMamy, Hichem Mrabet, Hassen Gharbi, Abderrazak Jemai, Damien Trentesaux. A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0. Sustainability. 2020; 12 (21):9179.

Chicago/Turabian Style

Sidi ElMamy; Hichem Mrabet; Hassen Gharbi; Abderrazak Jemai; Damien Trentesaux. 2020. "A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0." Sustainability 12, no. 21: 9179.

Conference paper
Published: 28 October 2020 in 2020 5th International Conference on Logistics Operations Management (GOL)
Reads 0
Downloads 0

For several decades, New Information and Communication Technologies (NICTs) have been developing rapidly in the healthcare sector. They are now more and more present in the healthcare system and in particular in Home Health Care (HHC). Our study focuses on oncology which is among the most commonly treated diseases in HHC. Oncology techniques are ranked second in terms of stays in HHC, of which cancer chemotherapy is a part. Cancer treatment with chemotherapy is complex, cumbersome and very expensive. It requires drugs that are very expensive and they are very chemically unstable with usually a lifetime of a few hours, so any prolonged delay between the time of their preparation and the time of injection to the patient involves their destruction. This implies safe transport and administration of the drug within a time frame compatible with the validity of the drug. In this paper, we are interested in improving the quality of treatment service of chemotherapy in HHC by optimizing the delivery of anticancer drugs to patients. Our work is divided into two parts, first, we propose a new MIP Model for nurses scheduling. Our model aims to minimize the delivery time of drugs. In the second part, we propose a new learning approach based on Genetic Fuzzy System. It is applied for the first time in the field of health care and in particular in HHC. This approach is used to deal with the problem of uncertainty for the quantity of drug to be delivered.

ACS Style

Mariem Belhor; Adnen El-Amraoui; Francois Delmotte; Abderrazak Jemai. A New MIP Model and Machine Learning Approach for Home Health Care: Optimization of Cancer Treatment Process by Chemotherapy. 2020 5th International Conference on Logistics Operations Management (GOL) 2020, 1 -7.

AMA Style

Mariem Belhor, Adnen El-Amraoui, Francois Delmotte, Abderrazak Jemai. A New MIP Model and Machine Learning Approach for Home Health Care: Optimization of Cancer Treatment Process by Chemotherapy. 2020 5th International Conference on Logistics Operations Management (GOL). 2020; ():1-7.

Chicago/Turabian Style

Mariem Belhor; Adnen El-Amraoui; Francois Delmotte; Abderrazak Jemai. 2020. "A New MIP Model and Machine Learning Approach for Home Health Care: Optimization of Cancer Treatment Process by Chemotherapy." 2020 5th International Conference on Logistics Operations Management (GOL) , no. : 1-7.

Articles
Published: 24 September 2020 in Journal of Information and Telecommunication
Reads 0
Downloads 0

With the emergence of cloud computing paradigms, secure data outsourcing has become one of the crucial challenges which strongly imposes itself. Data owners place their data among cloud service providers in order to increase flexibility, optimize storage, enhance data manipulation and decrease processing time. Nevertheless, from a security point of view, access control is a major challenge in this situation seeing that the security policy of the data owner must be preserved when data is moved to the cloud. Nonetheless, the lack of a comprehensive and systematic review motivated us to construct this reviewing paper on this research problem. Here, we discuss current and emerging research on privacy and confidentiality concerns in data outsourcing and pinpoint potential issues that are still unresolved.

ACS Style

Adel Jebali; Salma Sassi; Abderrazak Jemai. Secure data outsourcing in presence of the inference problem: issues and directions. Journal of Information and Telecommunication 2020, 5, 16 -34.

AMA Style

Adel Jebali, Salma Sassi, Abderrazak Jemai. Secure data outsourcing in presence of the inference problem: issues and directions. Journal of Information and Telecommunication. 2020; 5 (1):16-34.

Chicago/Turabian Style

Adel Jebali; Salma Sassi; Abderrazak Jemai. 2020. "Secure data outsourcing in presence of the inference problem: issues and directions." Journal of Information and Telecommunication 5, no. 1: 16-34.

Review
Published: 28 June 2020 in Sensors
Reads 0
Downloads 0

The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.

ACS Style

Hichem Mrabet; Sana Belguith; Adeeb Alhomoud; Abderrazak Jemai. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors 2020, 20, 3625 .

AMA Style

Hichem Mrabet, Sana Belguith, Adeeb Alhomoud, Abderrazak Jemai. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors. 2020; 20 (13):3625.

Chicago/Turabian Style

Hichem Mrabet; Sana Belguith; Adeeb Alhomoud; Abderrazak Jemai. 2020. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13: 3625.

Conference paper
Published: 23 June 2020 in Transactions on Petri Nets and Other Models of Concurrency XV
Reads 0
Downloads 0

With the advent of the Internet of Things (IoT), various interconnected objects can be used to improve the collection and the process of vital signs with partially or fully automatized methods in smart hospital environment. The vital signs data are used to evaluate patient health status using heuristic approaches, such as the early warning scoring (EWS) approach. Several applications have been proposed based on the early warning scores approach to improve the recognition of patients at risk of deterioration. However, there is a lack of efficient tools that enable a personalized monitoring depending on the patient situations. This paper explores the publish-subscribe pattern to provide a self-adaptative early warning score system in smart hospital context. We propose an adaptative configuration of the vital sings monitoring process depending on the patient health status variation and the medical staff decisions.

ACS Style

Imen Ben Ida; Moez Balti; Sondès Chabaane; Abderrazak Jemai. Self-adaptative Early Warning Scoring System for Smart Hospital. Transactions on Petri Nets and Other Models of Concurrency XV 2020, 16 -27.

AMA Style

Imen Ben Ida, Moez Balti, Sondès Chabaane, Abderrazak Jemai. Self-adaptative Early Warning Scoring System for Smart Hospital. Transactions on Petri Nets and Other Models of Concurrency XV. 2020; ():16-27.

Chicago/Turabian Style

Imen Ben Ida; Moez Balti; Sondès Chabaane; Abderrazak Jemai. 2020. "Self-adaptative Early Warning Scoring System for Smart Hospital." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 16-27.

Conference paper
Published: 28 February 2020 in Transactions on Petri Nets and Other Models of Concurrency XV
Reads 0
Downloads 0

Traditional access control models aim to prevent data leakage via direct accesses. A direct access occurs when a requester performs his query directly into the desired object, however these models fail to protect sensitive data from being accessed with inference channels. An inference channel is produced by the combination of a legitimate response which the user receives from the system and metadata. Detecting and removing inference in database systems guarantee a high quality design in terms of data secrecy and privacy. Parting from the fact that data distribution exacerbates inference problem, we give in this paper a survey of the current and emerging research on the inference problem in both centralized and distributed database systems and highlighting research directions in this field.

ACS Style

Adel Jebali; Salma Sassi; Abderrazak Jemai. Inference Control in Distributed Environment: A Comparison Study. Transactions on Petri Nets and Other Models of Concurrency XV 2020, 69 -83.

AMA Style

Adel Jebali, Salma Sassi, Abderrazak Jemai. Inference Control in Distributed Environment: A Comparison Study. Transactions on Petri Nets and Other Models of Concurrency XV. 2020; ():69-83.

Chicago/Turabian Style

Adel Jebali; Salma Sassi; Abderrazak Jemai. 2020. "Inference Control in Distributed Environment: A Comparison Study." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 69-83.

Article
Published: 20 December 2019 in Journal of Intelligent Information Systems
Reads 0
Downloads 0

Frequent subgraph mining algorithms are widely used in various areas for information analysis. As yet, a handful of algorithms have been proposed and defined in the literature. While several experimental studies were reported, these experiments lack critical information which are important for selecting an implementation of an algorithm for a specific case of use. In this paper, we report on experiments that we carried out on available implementations of complete search Frequent Subgraph Mining (FSM) algorithms. These experiments are conducted in order to choose a suitable FSM solution (i.e., implementation). We identified 32 algorithms in the literature, six of them were selected for our experiments, through a filtering process relying on a set of criteria. Thirteen working implementations of these 6 algorithms are experimented. In this paper, we provide details of the experiments in terms of performance metrics and input variation effect. We propose a preliminary selection of the most efficient FSM solutions for end users, based on the most tested centralized graph-transaction datasets of the literature.

ACS Style

Rihab Ayed; Mohand-SaĂŻd Hacid; Rafiqul Haque; Abderrazak Jemai. An updated dashboard of complete search FSM implementations in centralized graph transaction databases. Journal of Intelligent Information Systems 2019, 55, 149 -182.

AMA Style

Rihab Ayed, Mohand-SaĂŻd Hacid, Rafiqul Haque, Abderrazak Jemai. An updated dashboard of complete search FSM implementations in centralized graph transaction databases. Journal of Intelligent Information Systems. 2019; 55 (1):149-182.

Chicago/Turabian Style

Rihab Ayed; Mohand-SaĂŻd Hacid; Rafiqul Haque; Abderrazak Jemai. 2019. "An updated dashboard of complete search FSM implementations in centralized graph transaction databases." Journal of Intelligent Information Systems 55, no. 1: 149-182.

Conference paper
Published: 01 December 2019 in 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)
Reads 0
Downloads 0

The open structure, different technical possibilities and anonymity represent the main reasons why the internet is misused as a platform for attack. This is also reflected in the creation of today's cyber-attacks. Following early 1960, industrial process control has been applied by electric systems. In the mid-1970s, the Supervisory Control and Data Acquisition (SCADA) emerged, describing the automated control and data acquisition. Considering most industrial and automation networks were physically isolated, security was not an issue. This modified when in the early 2000s industrial networks were opened to the public internet. The reasons were manifold. Increased interconnectivity led to more productivity, simplicity, and ease of use. It decreased the configuration overhead and downtimes for system adjustments. However, it also led to an abundance of new attack vectors. For victorious cyberattacks are increasingly necessary in many cases, no more than a PC and an internet connection to strike a critical infrastructure like SCADA system. As for any trend, many cyber-physical attacks are targeting manufactories involving Industry 4.0 systems, like Maroochy Water Services in Australia, German Steel Mill Thyssenkrupp and Norsk Hydro Aluminum in 2000, 2014 and 2019, respectively. This paper describes these three cyberattacks in Industry 4.0, their different vulnerabilities, and proposes security measures to address the identified vulnerabilities.

ACS Style

Nour Elhouda Oueslati; Hichem Mrabet; Abderrazak Jemai; Adeeb Alhomoud. Comparative Study of the Common Cyber-physical Attacks in Industry 4.0. 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC) 2019, 1 -7.

AMA Style

Nour Elhouda Oueslati, Hichem Mrabet, Abderrazak Jemai, Adeeb Alhomoud. Comparative Study of the Common Cyber-physical Attacks in Industry 4.0. 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC). 2019; ():1-7.

Chicago/Turabian Style

Nour Elhouda Oueslati; Hichem Mrabet; Abderrazak Jemai; Adeeb Alhomoud. 2019. "Comparative Study of the Common Cyber-physical Attacks in Industry 4.0." 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC) , no. : 1-7.

Journal article
Published: 17 September 2019 in Journal of Parallel and Distributed Computing
Reads 0
Downloads 0

In this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PAbAC, that combines attribute based encryption and attribute based signature techniques for securely sharing outsourced data contents via public cloud servers. The proposed framework presents several advantages. First, it provides an encrypted access control feature, enforced at the data owner’s side, while providing the desired expressiveness of access control policies. Second, Ins-PAbAC preserves users’ privacy, relying on an anonymous authentication mechanism, derived from a privacy preserving attribute based signature scheme that hides the users’ identifying information. Furthermore, our proposal introduces an accountable attribute based signature that enables an inspection authority to reveal the identity of the anonymously-authenticated user if needed. Third, Ins-PAbAC is provably secure, as it is resistant to both curious cloud providers and malicious users adversaries. Finally, experimental results, built upon OpenStack Swift testbed, point out the applicability of the proposed scheme in real world scenarios.

ACS Style

Sana Belguith; Nesrine Kaaniche; Maryline Laurent; Abderrazak Jemai; Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing 2019, 135, 1 -20.

AMA Style

Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing. 2019; 135 ():1-20.

Chicago/Turabian Style

Sana Belguith; Nesrine Kaaniche; Maryline Laurent; Abderrazak Jemai; Rabah Attia. 2019. "Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds." Journal of Parallel and Distributed Computing 135, no. : 1-20.

Conference paper
Published: 02 August 2019 in Blockchain Technology and Innovations in Business Processes
Reads 0
Downloads 0

The expansion of Internet of Things (IoT) and the evolution in communication technologies have an important promising trend in healthcare domain. By exploring connected medical devices, some healthcare services are moved from the hospital to the home environment and the control of patients is continuous in a comfortable home environment. Various solutions based on Cloud services and IoT technologies are explored to collect and analyze the patient data. However, availability limitation can arise when transferring huge amounts of patient data from IoT devices onto cloud. To support these challenges, a third layer between the cloud and devices which is known as Edge layer is proposed. In this paper, we present the benefits of using edge computing for home-based healthcare and we propose an edge-based architecture that enables the medical staff to change the edge layer configuration using a cloud service. We focus specially on the integration of cloud services and edge services to ensure an effective control and monitoring of the patient data.

ACS Style

Imen Ben Ida; Abderrazak Jemai. Cloud Service for Edge Configuration in Home-Based Healthcare Context. Blockchain Technology and Innovations in Business Processes 2019, 430 -439.

AMA Style

Imen Ben Ida, Abderrazak Jemai. Cloud Service for Edge Configuration in Home-Based Healthcare Context. Blockchain Technology and Innovations in Business Processes. 2019; ():430-439.

Chicago/Turabian Style

Imen Ben Ida; Abderrazak Jemai. 2019. "Cloud Service for Edge Configuration in Home-Based Healthcare Context." Blockchain Technology and Innovations in Business Processes , no. : 430-439.

Conference paper
Published: 10 July 2019 in Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering
Reads 0
Downloads 0
ACS Style

Adel Jebali; Abderrazak Jemai; Salma Sassi. A Survey Study on the Inference Problem in Distributed Environment (S). Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering 2019, 1 .

AMA Style

Adel Jebali, Abderrazak Jemai, Salma Sassi. A Survey Study on the Inference Problem in Distributed Environment (S). Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering. 2019; ():1.

Chicago/Turabian Style

Adel Jebali; Abderrazak Jemai; Salma Sassi. 2019. "A Survey Study on the Inference Problem in Distributed Environment (S)." Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering , no. : 1.

Proceedings article
Published: 01 January 2019 in 2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI)
Reads 0
Downloads 0

Particle swarm optimization (PSO) is a population-based stochastic algorithm designed to solve complex optimization problems such as the Flexible Job Shop Scheduling Problem (FJSP). As a metaheuristic, the performance of the PSO is heavily affected by two elements: the size of the search-space and the way of its exploration. In this paper, we present a specific PSO algorithm for the FJSP that use Lower-bounds to bypass regions not containing optimal solutions. The proposed algorithm is a two-level PSO. The upper-level handles the mapping of operations to machines while the lower-level handles the ordering of operations. The performance gain in terms of solution optimality and CPU time, obtained by our method, has been validated by external FJSP benchmarks.

ACS Style

Rim Zarrouk; Imed Eddine Bennour; Abderrazak Jemai. Toward a Two-Level PSO for FJS Problem. 2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI) 2019, 75 -82.

AMA Style

Rim Zarrouk, Imed Eddine Bennour, Abderrazak Jemai. Toward a Two-Level PSO for FJS Problem. 2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI). 2019; ():75-82.

Chicago/Turabian Style

Rim Zarrouk; Imed Eddine Bennour; Abderrazak Jemai. 2019. "Toward a Two-Level PSO for FJS Problem." 2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI) , no. : 75-82.

Conference paper
Published: 01 December 2018 in 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)
Reads 0
Downloads 0

The computational method known as Particle Swarm Optimization (PSO) used when searching for a global minimum of a function, has a number of parameters that determine its behavior and efficiency in optimizing a given problem. Among these parameters, the population topology and the updating technique of particles have an important impact. In a previous work, we have proposed different strategies to enhance the performance of PSO in its software (SW) implementations. In this paper, we target a combined Hardware/Software (HW/SW) implementation of PSO as a representative case study of metaheuristic resolution approaches. Based on a deep comparison of HW/SW methodologies, we find out that codesign is well appropriate for Internet of Things (IoT) design. Besides, it is worth noticing that codesign methodology has attracted attention of researchers and industrials looking for optimizing time and energy consumption of embedded systems and IoT devices. In this work we propose a new approach of implementing PSO on Field Programmable Gate Array (PFGA) which target different architectures using metaheuristic approaches for solving optimization problems.

ACS Style

Monia Ettouil; Habib Smei; Abderrazak Jemai; Mohamed Ghazel. Codesign of an IoT Using a Metaheuristic IP. 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC) 2018, 153 -157.

AMA Style

Monia Ettouil, Habib Smei, Abderrazak Jemai, Mohamed Ghazel. Codesign of an IoT Using a Metaheuristic IP. 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC). 2018; ():153-157.

Chicago/Turabian Style

Monia Ettouil; Habib Smei; Abderrazak Jemai; Mohamed Ghazel. 2018. "Codesign of an IoT Using a Metaheuristic IP." 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC) , no. : 153-157.

Conference paper
Published: 01 December 2018 in 2018 30th International Conference on Microelectronics (ICM)
Reads 0
Downloads 0

The particle swarm optimization PSO is an attractive domain for community looking to enhance time for optimal solutions. Several works will be done for SW or SW/HW implementation. The latter often gives better performance. In this paper, we present a comparative study of these various solutions and we focus on the FPGA ones. Our approach is based on a codesign methodology which adjusts performance parameters at design time.

ACS Style

Monia Ettouil; Habib Smei; Abderrazak Jemai. Particle Swarm Optimization on FPGA. 2018 30th International Conference on Microelectronics (ICM) 2018, 32 -35.

AMA Style

Monia Ettouil, Habib Smei, Abderrazak Jemai. Particle Swarm Optimization on FPGA. 2018 30th International Conference on Microelectronics (ICM). 2018; ():32-35.

Chicago/Turabian Style

Monia Ettouil; Habib Smei; Abderrazak Jemai. 2018. "Particle Swarm Optimization on FPGA." 2018 30th International Conference on Microelectronics (ICM) , no. : 32-35.

Conference paper
Published: 30 May 2018 in Transactions on Petri Nets and Other Models of Concurrency XV
Reads 0
Downloads 0

The metaheuristic Particle Swarm Optimization (PSO) is well suited to solve the Flexible Job Shop Scheduling Problem (FJSP), and a suitable particle representation should importantly impact the optimization results and performance of this algorithm. The chosen representation has a direct impact on the dimension and content of the solution space. In this paper, we intend to evaluate and compare the performance of two different variants of PSO with different particle representations (PSO with Job-Machine coding Scheme (PSO-JMS) and PSO with Only-Machine coding Scheme (PSO-OMS)) for solving FJSP. These procedures have been tested on thirteen benchmark problems, where the objective function is to minimize the makespan and total workload and to compare the run time of the different PSO variants. Based on the experimental results, it is clear that PSO-OMS gives the best performance in solving all benchmark problems.

ACS Style

Rim Zarrouk; Abderrazak Jemai. Performance Evaluation of Particles Coding in Particle Swarm Optimization with Self-adaptive Parameters for Flexible Job Shop Scheduling Problem. Transactions on Petri Nets and Other Models of Concurrency XV 2018, 396 -407.

AMA Style

Rim Zarrouk, Abderrazak Jemai. Performance Evaluation of Particles Coding in Particle Swarm Optimization with Self-adaptive Parameters for Flexible Job Shop Scheduling Problem. Transactions on Petri Nets and Other Models of Concurrency XV. 2018; ():396-407.

Chicago/Turabian Style

Rim Zarrouk; Abderrazak Jemai. 2018. "Performance Evaluation of Particles Coding in Particle Swarm Optimization with Self-adaptive Parameters for Flexible Job Shop Scheduling Problem." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 396-407.

Journal article
Published: 01 March 2018 in Computer Networks
Reads 0
Downloads 0

Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly shared access policies, thus leading to possible users’ privacy leakage. In this paper, we introduce PHOABE, a Policy-Hidden Outsourced ABE scheme. Our construction presents several advantages. First, it is a multi-attribute authority ABE scheme. Second, the expensive computations for the ABE decryption process is partially delegated to a Semi Trusted Cloud Server. Third, users’ privacy is protected thanks to a hidden access policy. Fourth, PHOABE is proven to be selectively secure, verifiable and policy privacy preserving under the random oracle model. Five, estimation of the processing overhead proves its feasibility in IoT constrained environments.

ACS Style

Sana Belguith; Nesrine Kaaniche; Maryline Laurent; Abderrazak Jemai; Rabah Attia. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks 2018, 133, 141 -156.

AMA Style

Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks. 2018; 133 ():141-156.

Chicago/Turabian Style

Sana Belguith; Nesrine Kaaniche; Maryline Laurent; Abderrazak Jemai; Rabah Attia. 2018. "PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT." Computer Networks 133, no. : 141-156.

Chapter
Published: 01 February 2018 in Econometrics for Financial Applications
Reads 0
Downloads 0

In real-world manufacturing systems, schedules are often confronted with uncertainty factors such as random machine breakdown, random process time, random job arrivals or job cancellations. A large number of impromptu disruptions frequently affect the scheduled operations and invalidate the original schedule. There is still the need for rescheduling methods that can work effectively in disruption management. In this work, an algorithm for rescheduling the affected operations in a flexible job shop is presented and its performance, with respect to measures of efficiency and stability, is compared with the Right Shift Rescheduling technique. The proposed method is tested on different benchmark scheduling problems with various disruption scenarios. Experimental results show that the proposed rescheduling method improves the efficiency and stability when compared to Right Shift Rescheduling method.

ACS Style

Maroua Nouiri; Abdelghani Bekrar; Abderrazak Jemai; Ahmed Chiheb Ammari; Smail Niar. A New Rescheduling Heuristic for Flexible Job Shop Problem with Machine Disruption. Econometrics for Financial Applications 2018, 461 -476.

AMA Style

Maroua Nouiri, Abdelghani Bekrar, Abderrazak Jemai, Ahmed Chiheb Ammari, Smail Niar. A New Rescheduling Heuristic for Flexible Job Shop Problem with Machine Disruption. Econometrics for Financial Applications. 2018; ():461-476.

Chicago/Turabian Style

Maroua Nouiri; Abdelghani Bekrar; Abderrazak Jemai; Ahmed Chiheb Ammari; Smail Niar. 2018. "A New Rescheduling Heuristic for Flexible Job Shop Problem with Machine Disruption." Econometrics for Financial Applications , no. : 461-476.

Journal article
Published: 01 October 2017 in Advances in Science, Technology and Engineering Systems Journal
Reads 0
Downloads 0
ACS Style

Habib Smei; Kamel Smiri; Abderrazak Jemai. A New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform. Advances in Science, Technology and Engineering Systems Journal 2017, 2, 40 -48.

AMA Style

Habib Smei, Kamel Smiri, Abderrazak Jemai. A New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform. Advances in Science, Technology and Engineering Systems Journal. 2017; 2 (6):40-48.

Chicago/Turabian Style

Habib Smei; Kamel Smiri; Abderrazak Jemai. 2017. "A New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform." Advances in Science, Technology and Engineering Systems Journal 2, no. 6: 40-48.

Journal article
Published: 01 October 2017 in Computers & Industrial Engineering
Reads 0
Downloads 0
ACS Style

Maroua Nouiri; Abdelghani Bekrar; Abderrazak Jemai; Damien Trentesaux; Ahmed Chiheb Ammari; Smail Niar. Two stage particle swarm optimization to solve the flexible job shop predictive scheduling problem considering possible machine breakdowns. Computers & Industrial Engineering 2017, 112, 595 -606.

AMA Style

Maroua Nouiri, Abdelghani Bekrar, Abderrazak Jemai, Damien Trentesaux, Ahmed Chiheb Ammari, Smail Niar. Two stage particle swarm optimization to solve the flexible job shop predictive scheduling problem considering possible machine breakdowns. Computers & Industrial Engineering. 2017; 112 ():595-606.

Chicago/Turabian Style

Maroua Nouiri; Abdelghani Bekrar; Abderrazak Jemai; Damien Trentesaux; Ahmed Chiheb Ammari; Smail Niar. 2017. "Two stage particle swarm optimization to solve the flexible job shop predictive scheduling problem considering possible machine breakdowns." Computers & Industrial Engineering 112, no. : 595-606.

Journal article
Published: 01 July 2017 in Advances in Science, Technology and Engineering Systems Journal
Reads 0
Downloads 0
ACS Style

Kamel Smiri; Habib Smei; Nourhen Fourati; Abderrazak Jemai. Fault-Tolerant in Embedded Systems (MPSoC): Performance Estimation and Dynamic Migration Task. Advances in Science, Technology and Engineering Systems Journal 2017, 2, 1188 -1195.

AMA Style

Kamel Smiri, Habib Smei, Nourhen Fourati, Abderrazak Jemai. Fault-Tolerant in Embedded Systems (MPSoC): Performance Estimation and Dynamic Migration Task. Advances in Science, Technology and Engineering Systems Journal. 2017; 2 (3):1188-1195.

Chicago/Turabian Style

Kamel Smiri; Habib Smei; Nourhen Fourati; Abderrazak Jemai. 2017. "Fault-Tolerant in Embedded Systems (MPSoC): Performance Estimation and Dynamic Migration Task." Advances in Science, Technology and Engineering Systems Journal 2, no. 3: 1188-1195.