This page has only limited features, please log in for full access.
Abderrazak JEMAI, Professor at National Institute of Applied Science and Technology (INSAT), University of Carthage, Tunis, Tunisia. He received an Engineer degree from the University of Tunis (ENSI), Tunisia in 1988 and the DEA and “Doctor” degrees from the University of Grenoble (ENSIMAG-INPG), France, in 1989 and 1992, respectively, and he received his Habilitation Degree in 2012, all in computer science. He became Full Professor in computer Science in July 2018. From 1989 to 1992 he prepared his thesis on simulation of RISC processors and parallel architectures. Since 1993, his interests are focused on high level synthesis and simulation at behavioral and system levels within AMICAL and COSMOS at TIMA Laboratory in Grenoble. Abderrazak Jemai became an Assistant at the ENSI University in Tunis in 1993 and an Assistant-Professor at the INSAT University in Tunis from 1994 to 2013. In 2013, he became an Associate- Professor in Computer Science at INSAT Institute and Full Professor in computer Science in July 2018. From 2014 to August 2015, Abderrazak JEMAI became the General Director (CEO) of the National Center of Informatics in Tunisia (CNI) dealing with government’ applications and related access services, data storage and security (eGov, Intranet, etc.). He is also the principal investigator for the “Codesign & IoT" in SERCOM/EPT Tunisia Lab. His last interest is focused on the co-design of embedded systems, Smart-IoT, Industry 4.0, Security and Cyber-Security.
A systematic review of the literature is presented related to the usage of blockchain technology (BCT) for cyber-threats in the context of Industry 4.0. BCT plays a crucial role in creating smart factories and it is recognized as a core technology that triggers a disruptive revolution in Industry 4.0. Beyond security, authentication, asset tracking and the exchange of smart contracts, BCTs allow terminals to exchange information according to mutually agreed rules within a secured manner. Consequently, BCT can play a crucial role in industrial sustainability by preserving the assets and the environment and by enhancing the quality of life of citizens. In this work, a classification of the most important cyber-attacks that occurred in the last decade in Industry 4.0 is proposed based on four classes. The latter classes cover scanning, local to remote, power of root and denial of service (DoS). BCT is also defined and various types belong to BCT are introduced and highlighted. Likewise, BCT protocols and implementations are discussed as well. BCT implementation includes linear structure and directed acyclic graph (DAG) technology. Then, a comparative study of the most relevant works based on BCT in Industry 4.0 is conducted in terms of confidentiality, integrity, availability, privacy and multifactor authentication features. Our review shows that the integration of BCT in industry can ensure data confidentiality and integrity and should be enforced to preserve data availability and privacy. Future research directions towards enforcing BCT in the industrial field by considering machine learning, 5G/6G mobile systems and new emergent technologies are presented.
Sidi ElMamy; Hichem Mrabet; Hassen Gharbi; Abderrazak Jemai; Damien Trentesaux. A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0. Sustainability 2020, 12, 9179 .
AMA StyleSidi ElMamy, Hichem Mrabet, Hassen Gharbi, Abderrazak Jemai, Damien Trentesaux. A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0. Sustainability. 2020; 12 (21):9179.
Chicago/Turabian StyleSidi ElMamy; Hichem Mrabet; Hassen Gharbi; Abderrazak Jemai; Damien Trentesaux. 2020. "A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0." Sustainability 12, no. 21: 9179.
For several decades, New Information and Communication Technologies (NICTs) have been developing rapidly in the healthcare sector. They are now more and more present in the healthcare system and in particular in Home Health Care (HHC). Our study focuses on oncology which is among the most commonly treated diseases in HHC. Oncology techniques are ranked second in terms of stays in HHC, of which cancer chemotherapy is a part. Cancer treatment with chemotherapy is complex, cumbersome and very expensive. It requires drugs that are very expensive and they are very chemically unstable with usually a lifetime of a few hours, so any prolonged delay between the time of their preparation and the time of injection to the patient involves their destruction. This implies safe transport and administration of the drug within a time frame compatible with the validity of the drug. In this paper, we are interested in improving the quality of treatment service of chemotherapy in HHC by optimizing the delivery of anticancer drugs to patients. Our work is divided into two parts, first, we propose a new MIP Model for nurses scheduling. Our model aims to minimize the delivery time of drugs. In the second part, we propose a new learning approach based on Genetic Fuzzy System. It is applied for the first time in the field of health care and in particular in HHC. This approach is used to deal with the problem of uncertainty for the quantity of drug to be delivered.
Mariem Belhor; Adnen El-Amraoui; Francois Delmotte; Abderrazak Jemai. A New MIP Model and Machine Learning Approach for Home Health Care: Optimization of Cancer Treatment Process by Chemotherapy. 2020 5th International Conference on Logistics Operations Management (GOL) 2020, 1 -7.
AMA StyleMariem Belhor, Adnen El-Amraoui, Francois Delmotte, Abderrazak Jemai. A New MIP Model and Machine Learning Approach for Home Health Care: Optimization of Cancer Treatment Process by Chemotherapy. 2020 5th International Conference on Logistics Operations Management (GOL). 2020; ():1-7.
Chicago/Turabian StyleMariem Belhor; Adnen El-Amraoui; Francois Delmotte; Abderrazak Jemai. 2020. "A New MIP Model and Machine Learning Approach for Home Health Care: Optimization of Cancer Treatment Process by Chemotherapy." 2020 5th International Conference on Logistics Operations Management (GOL) , no. : 1-7.
With the emergence of cloud computing paradigms, secure data outsourcing has become one of the crucial challenges which strongly imposes itself. Data owners place their data among cloud service providers in order to increase flexibility, optimize storage, enhance data manipulation and decrease processing time. Nevertheless, from a security point of view, access control is a major challenge in this situation seeing that the security policy of the data owner must be preserved when data is moved to the cloud. Nonetheless, the lack of a comprehensive and systematic review motivated us to construct this reviewing paper on this research problem. Here, we discuss current and emerging research on privacy and confidentiality concerns in data outsourcing and pinpoint potential issues that are still unresolved.
Adel Jebali; Salma Sassi; Abderrazak Jemai. Secure data outsourcing in presence of the inference problem: issues and directions. Journal of Information and Telecommunication 2020, 5, 16 -34.
AMA StyleAdel Jebali, Salma Sassi, Abderrazak Jemai. Secure data outsourcing in presence of the inference problem: issues and directions. Journal of Information and Telecommunication. 2020; 5 (1):16-34.
Chicago/Turabian StyleAdel Jebali; Salma Sassi; Abderrazak Jemai. 2020. "Secure data outsourcing in presence of the inference problem: issues and directions." Journal of Information and Telecommunication 5, no. 1: 16-34.
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.
Hichem Mrabet; Sana Belguith; Adeeb Alhomoud; Abderrazak Jemai. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors 2020, 20, 3625 .
AMA StyleHichem Mrabet, Sana Belguith, Adeeb Alhomoud, Abderrazak Jemai. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors. 2020; 20 (13):3625.
Chicago/Turabian StyleHichem Mrabet; Sana Belguith; Adeeb Alhomoud; Abderrazak Jemai. 2020. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13: 3625.
With the advent of the Internet of Things (IoT), various interconnected objects can be used to improve the collection and the process of vital signs with partially or fully automatized methods in smart hospital environment. The vital signs data are used to evaluate patient health status using heuristic approaches, such as the early warning scoring (EWS) approach. Several applications have been proposed based on the early warning scores approach to improve the recognition of patients at risk of deterioration. However, there is a lack of efficient tools that enable a personalized monitoring depending on the patient situations. This paper explores the publish-subscribe pattern to provide a self-adaptative early warning score system in smart hospital context. We propose an adaptative configuration of the vital sings monitoring process depending on the patient health status variation and the medical staff decisions.
Imen Ben Ida; Moez Balti; Sondès Chabaane; Abderrazak Jemai. Self-adaptative Early Warning Scoring System for Smart Hospital. Transactions on Petri Nets and Other Models of Concurrency XV 2020, 16 -27.
AMA StyleImen Ben Ida, Moez Balti, Sondès Chabaane, Abderrazak Jemai. Self-adaptative Early Warning Scoring System for Smart Hospital. Transactions on Petri Nets and Other Models of Concurrency XV. 2020; ():16-27.
Chicago/Turabian StyleImen Ben Ida; Moez Balti; Sondès Chabaane; Abderrazak Jemai. 2020. "Self-adaptative Early Warning Scoring System for Smart Hospital." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 16-27.
Traditional access control models aim to prevent data leakage via direct accesses. A direct access occurs when a requester performs his query directly into the desired object, however these models fail to protect sensitive data from being accessed with inference channels. An inference channel is produced by the combination of a legitimate response which the user receives from the system and metadata. Detecting and removing inference in database systems guarantee a high quality design in terms of data secrecy and privacy. Parting from the fact that data distribution exacerbates inference problem, we give in this paper a survey of the current and emerging research on the inference problem in both centralized and distributed database systems and highlighting research directions in this field.
Adel Jebali; Salma Sassi; Abderrazak Jemai. Inference Control in Distributed Environment: A Comparison Study. Transactions on Petri Nets and Other Models of Concurrency XV 2020, 69 -83.
AMA StyleAdel Jebali, Salma Sassi, Abderrazak Jemai. Inference Control in Distributed Environment: A Comparison Study. Transactions on Petri Nets and Other Models of Concurrency XV. 2020; ():69-83.
Chicago/Turabian StyleAdel Jebali; Salma Sassi; Abderrazak Jemai. 2020. "Inference Control in Distributed Environment: A Comparison Study." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 69-83.
Frequent subgraph mining algorithms are widely used in various areas for information analysis. As yet, a handful of algorithms have been proposed and defined in the literature. While several experimental studies were reported, these experiments lack critical information which are important for selecting an implementation of an algorithm for a specific case of use. In this paper, we report on experiments that we carried out on available implementations of complete search Frequent Subgraph Mining (FSM) algorithms. These experiments are conducted in order to choose a suitable FSM solution (i.e., implementation). We identified 32 algorithms in the literature, six of them were selected for our experiments, through a filtering process relying on a set of criteria. Thirteen working implementations of these 6 algorithms are experimented. In this paper, we provide details of the experiments in terms of performance metrics and input variation effect. We propose a preliminary selection of the most efficient FSM solutions for end users, based on the most tested centralized graph-transaction datasets of the literature.
Rihab Ayed; Mohand-SaĂŻd Hacid; Rafiqul Haque; Abderrazak Jemai. An updated dashboard of complete search FSM implementations in centralized graph transaction databases. Journal of Intelligent Information Systems 2019, 55, 149 -182.
AMA StyleRihab Ayed, Mohand-SaĂŻd Hacid, Rafiqul Haque, Abderrazak Jemai. An updated dashboard of complete search FSM implementations in centralized graph transaction databases. Journal of Intelligent Information Systems. 2019; 55 (1):149-182.
Chicago/Turabian StyleRihab Ayed; Mohand-SaĂŻd Hacid; Rafiqul Haque; Abderrazak Jemai. 2019. "An updated dashboard of complete search FSM implementations in centralized graph transaction databases." Journal of Intelligent Information Systems 55, no. 1: 149-182.
The open structure, different technical possibilities and anonymity represent the main reasons why the internet is misused as a platform for attack. This is also reflected in the creation of today's cyber-attacks. Following early 1960, industrial process control has been applied by electric systems. In the mid-1970s, the Supervisory Control and Data Acquisition (SCADA) emerged, describing the automated control and data acquisition. Considering most industrial and automation networks were physically isolated, security was not an issue. This modified when in the early 2000s industrial networks were opened to the public internet. The reasons were manifold. Increased interconnectivity led to more productivity, simplicity, and ease of use. It decreased the configuration overhead and downtimes for system adjustments. However, it also led to an abundance of new attack vectors. For victorious cyberattacks are increasingly necessary in many cases, no more than a PC and an internet connection to strike a critical infrastructure like SCADA system. As for any trend, many cyber-physical attacks are targeting manufactories involving Industry 4.0 systems, like Maroochy Water Services in Australia, German Steel Mill Thyssenkrupp and Norsk Hydro Aluminum in 2000, 2014 and 2019, respectively. This paper describes these three cyberattacks in Industry 4.0, their different vulnerabilities, and proposes security measures to address the identified vulnerabilities.
Nour Elhouda Oueslati; Hichem Mrabet; Abderrazak Jemai; Adeeb Alhomoud. Comparative Study of the Common Cyber-physical Attacks in Industry 4.0. 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC) 2019, 1 -7.
AMA StyleNour Elhouda Oueslati, Hichem Mrabet, Abderrazak Jemai, Adeeb Alhomoud. Comparative Study of the Common Cyber-physical Attacks in Industry 4.0. 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC). 2019; ():1-7.
Chicago/Turabian StyleNour Elhouda Oueslati; Hichem Mrabet; Abderrazak Jemai; Adeeb Alhomoud. 2019. "Comparative Study of the Common Cyber-physical Attacks in Industry 4.0." 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC) , no. : 1-7.
In this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PAbAC, that combines attribute based encryption and attribute based signature techniques for securely sharing outsourced data contents via public cloud servers. The proposed framework presents several advantages. First, it provides an encrypted access control feature, enforced at the data owner’s side, while providing the desired expressiveness of access control policies. Second, Ins-PAbAC preserves users’ privacy, relying on an anonymous authentication mechanism, derived from a privacy preserving attribute based signature scheme that hides the users’ identifying information. Furthermore, our proposal introduces an accountable attribute based signature that enables an inspection authority to reveal the identity of the anonymously-authenticated user if needed. Third, Ins-PAbAC is provably secure, as it is resistant to both curious cloud providers and malicious users adversaries. Finally, experimental results, built upon OpenStack Swift testbed, point out the applicability of the proposed scheme in real world scenarios.
Sana Belguith; Nesrine Kaaniche; Maryline Laurent; Abderrazak Jemai; Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing 2019, 135, 1 -20.
AMA StyleSana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds. Journal of Parallel and Distributed Computing. 2019; 135 ():1-20.
Chicago/Turabian StyleSana Belguith; Nesrine Kaaniche; Maryline Laurent; Abderrazak Jemai; Rabah Attia. 2019. "Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds." Journal of Parallel and Distributed Computing 135, no. : 1-20.
The expansion of Internet of Things (IoT) and the evolution in communication technologies have an important promising trend in healthcare domain. By exploring connected medical devices, some healthcare services are moved from the hospital to the home environment and the control of patients is continuous in a comfortable home environment. Various solutions based on Cloud services and IoT technologies are explored to collect and analyze the patient data. However, availability limitation can arise when transferring huge amounts of patient data from IoT devices onto cloud. To support these challenges, a third layer between the cloud and devices which is known as Edge layer is proposed. In this paper, we present the benefits of using edge computing for home-based healthcare and we propose an edge-based architecture that enables the medical staff to change the edge layer configuration using a cloud service. We focus specially on the integration of cloud services and edge services to ensure an effective control and monitoring of the patient data.
Imen Ben Ida; Abderrazak Jemai. Cloud Service for Edge Configuration in Home-Based Healthcare Context. Blockchain Technology and Innovations in Business Processes 2019, 430 -439.
AMA StyleImen Ben Ida, Abderrazak Jemai. Cloud Service for Edge Configuration in Home-Based Healthcare Context. Blockchain Technology and Innovations in Business Processes. 2019; ():430-439.
Chicago/Turabian StyleImen Ben Ida; Abderrazak Jemai. 2019. "Cloud Service for Edge Configuration in Home-Based Healthcare Context." Blockchain Technology and Innovations in Business Processes , no. : 430-439.
Adel Jebali; Abderrazak Jemai; Salma Sassi. A Survey Study on the Inference Problem in Distributed Environment (S). Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering 2019, 1 .
AMA StyleAdel Jebali, Abderrazak Jemai, Salma Sassi. A Survey Study on the Inference Problem in Distributed Environment (S). Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering. 2019; ():1.
Chicago/Turabian StyleAdel Jebali; Abderrazak Jemai; Salma Sassi. 2019. "A Survey Study on the Inference Problem in Distributed Environment (S)." Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering , no. : 1.
Particle swarm optimization (PSO) is a population-based stochastic algorithm designed to solve complex optimization problems such as the Flexible Job Shop Scheduling Problem (FJSP). As a metaheuristic, the performance of the PSO is heavily affected by two elements: the size of the search-space and the way of its exploration. In this paper, we present a specific PSO algorithm for the FJSP that use Lower-bounds to bypass regions not containing optimal solutions. The proposed algorithm is a two-level PSO. The upper-level handles the mapping of operations to machines while the lower-level handles the ordering of operations. The performance gain in terms of solution optimality and CPU time, obtained by our method, has been validated by external FJSP benchmarks.
Rim Zarrouk; Imed Eddine Bennour; Abderrazak Jemai. Toward a Two-Level PSO for FJS Problem. 2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI) 2019, 75 -82.
AMA StyleRim Zarrouk, Imed Eddine Bennour, Abderrazak Jemai. Toward a Two-Level PSO for FJS Problem. 2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI). 2019; ():75-82.
Chicago/Turabian StyleRim Zarrouk; Imed Eddine Bennour; Abderrazak Jemai. 2019. "Toward a Two-Level PSO for FJS Problem." 2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI) , no. : 75-82.
The computational method known as Particle Swarm Optimization (PSO) used when searching for a global minimum of a function, has a number of parameters that determine its behavior and efficiency in optimizing a given problem. Among these parameters, the population topology and the updating technique of particles have an important impact. In a previous work, we have proposed different strategies to enhance the performance of PSO in its software (SW) implementations. In this paper, we target a combined Hardware/Software (HW/SW) implementation of PSO as a representative case study of metaheuristic resolution approaches. Based on a deep comparison of HW/SW methodologies, we find out that codesign is well appropriate for Internet of Things (IoT) design. Besides, it is worth noticing that codesign methodology has attracted attention of researchers and industrials looking for optimizing time and energy consumption of embedded systems and IoT devices. In this work we propose a new approach of implementing PSO on Field Programmable Gate Array (PFGA) which target different architectures using metaheuristic approaches for solving optimization problems.
Monia Ettouil; Habib Smei; Abderrazak Jemai; Mohamed Ghazel. Codesign of an IoT Using a Metaheuristic IP. 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC) 2018, 153 -157.
AMA StyleMonia Ettouil, Habib Smei, Abderrazak Jemai, Mohamed Ghazel. Codesign of an IoT Using a Metaheuristic IP. 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC). 2018; ():153-157.
Chicago/Turabian StyleMonia Ettouil; Habib Smei; Abderrazak Jemai; Mohamed Ghazel. 2018. "Codesign of an IoT Using a Metaheuristic IP." 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC) , no. : 153-157.
The particle swarm optimization PSO is an attractive domain for community looking to enhance time for optimal solutions. Several works will be done for SW or SW/HW implementation. The latter often gives better performance. In this paper, we present a comparative study of these various solutions and we focus on the FPGA ones. Our approach is based on a codesign methodology which adjusts performance parameters at design time.
Monia Ettouil; Habib Smei; Abderrazak Jemai. Particle Swarm Optimization on FPGA. 2018 30th International Conference on Microelectronics (ICM) 2018, 32 -35.
AMA StyleMonia Ettouil, Habib Smei, Abderrazak Jemai. Particle Swarm Optimization on FPGA. 2018 30th International Conference on Microelectronics (ICM). 2018; ():32-35.
Chicago/Turabian StyleMonia Ettouil; Habib Smei; Abderrazak Jemai. 2018. "Particle Swarm Optimization on FPGA." 2018 30th International Conference on Microelectronics (ICM) , no. : 32-35.
The metaheuristic Particle Swarm Optimization (PSO) is well suited to solve the Flexible Job Shop Scheduling Problem (FJSP), and a suitable particle representation should importantly impact the optimization results and performance of this algorithm. The chosen representation has a direct impact on the dimension and content of the solution space. In this paper, we intend to evaluate and compare the performance of two different variants of PSO with different particle representations (PSO with Job-Machine coding Scheme (PSO-JMS) and PSO with Only-Machine coding Scheme (PSO-OMS)) for solving FJSP. These procedures have been tested on thirteen benchmark problems, where the objective function is to minimize the makespan and total workload and to compare the run time of the different PSO variants. Based on the experimental results, it is clear that PSO-OMS gives the best performance in solving all benchmark problems.
Rim Zarrouk; Abderrazak Jemai. Performance Evaluation of Particles Coding in Particle Swarm Optimization with Self-adaptive Parameters for Flexible Job Shop Scheduling Problem. Transactions on Petri Nets and Other Models of Concurrency XV 2018, 396 -407.
AMA StyleRim Zarrouk, Abderrazak Jemai. Performance Evaluation of Particles Coding in Particle Swarm Optimization with Self-adaptive Parameters for Flexible Job Shop Scheduling Problem. Transactions on Petri Nets and Other Models of Concurrency XV. 2018; ():396-407.
Chicago/Turabian StyleRim Zarrouk; Abderrazak Jemai. 2018. "Performance Evaluation of Particles Coding in Particle Swarm Optimization with Self-adaptive Parameters for Flexible Job Shop Scheduling Problem." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 396-407.
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly shared access policies, thus leading to possible users’ privacy leakage. In this paper, we introduce PHOABE, a Policy-Hidden Outsourced ABE scheme. Our construction presents several advantages. First, it is a multi-attribute authority ABE scheme. Second, the expensive computations for the ABE decryption process is partially delegated to a Semi Trusted Cloud Server. Third, users’ privacy is protected thanks to a hidden access policy. Fourth, PHOABE is proven to be selectively secure, verifiable and policy privacy preserving under the random oracle model. Five, estimation of the processing overhead proves its feasibility in IoT constrained environments.
Sana Belguith; Nesrine Kaaniche; Maryline Laurent; Abderrazak Jemai; Rabah Attia. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks 2018, 133, 141 -156.
AMA StyleSana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks. 2018; 133 ():141-156.
Chicago/Turabian StyleSana Belguith; Nesrine Kaaniche; Maryline Laurent; Abderrazak Jemai; Rabah Attia. 2018. "PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT." Computer Networks 133, no. : 141-156.
In real-world manufacturing systems, schedules are often confronted with uncertainty factors such as random machine breakdown, random process time, random job arrivals or job cancellations. A large number of impromptu disruptions frequently affect the scheduled operations and invalidate the original schedule. There is still the need for rescheduling methods that can work effectively in disruption management. In this work, an algorithm for rescheduling the affected operations in a flexible job shop is presented and its performance, with respect to measures of efficiency and stability, is compared with the Right Shift Rescheduling technique. The proposed method is tested on different benchmark scheduling problems with various disruption scenarios. Experimental results show that the proposed rescheduling method improves the efficiency and stability when compared to Right Shift Rescheduling method.
Maroua Nouiri; Abdelghani Bekrar; Abderrazak Jemai; Ahmed Chiheb Ammari; Smail Niar. A New Rescheduling Heuristic for Flexible Job Shop Problem with Machine Disruption. Econometrics for Financial Applications 2018, 461 -476.
AMA StyleMaroua Nouiri, Abdelghani Bekrar, Abderrazak Jemai, Ahmed Chiheb Ammari, Smail Niar. A New Rescheduling Heuristic for Flexible Job Shop Problem with Machine Disruption. Econometrics for Financial Applications. 2018; ():461-476.
Chicago/Turabian StyleMaroua Nouiri; Abdelghani Bekrar; Abderrazak Jemai; Ahmed Chiheb Ammari; Smail Niar. 2018. "A New Rescheduling Heuristic for Flexible Job Shop Problem with Machine Disruption." Econometrics for Financial Applications , no. : 461-476.
Habib Smei; Kamel Smiri; Abderrazak Jemai. A New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform. Advances in Science, Technology and Engineering Systems Journal 2017, 2, 40 -48.
AMA StyleHabib Smei, Kamel Smiri, Abderrazak Jemai. A New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform. Advances in Science, Technology and Engineering Systems Journal. 2017; 2 (6):40-48.
Chicago/Turabian StyleHabib Smei; Kamel Smiri; Abderrazak Jemai. 2017. "A New profiling and pipelining approach for HEVC Decoder on ZedBoard Platform." Advances in Science, Technology and Engineering Systems Journal 2, no. 6: 40-48.
Maroua Nouiri; Abdelghani Bekrar; Abderrazak Jemai; Damien Trentesaux; Ahmed Chiheb Ammari; Smail Niar. Two stage particle swarm optimization to solve the flexible job shop predictive scheduling problem considering possible machine breakdowns. Computers & Industrial Engineering 2017, 112, 595 -606.
AMA StyleMaroua Nouiri, Abdelghani Bekrar, Abderrazak Jemai, Damien Trentesaux, Ahmed Chiheb Ammari, Smail Niar. Two stage particle swarm optimization to solve the flexible job shop predictive scheduling problem considering possible machine breakdowns. Computers & Industrial Engineering. 2017; 112 ():595-606.
Chicago/Turabian StyleMaroua Nouiri; Abdelghani Bekrar; Abderrazak Jemai; Damien Trentesaux; Ahmed Chiheb Ammari; Smail Niar. 2017. "Two stage particle swarm optimization to solve the flexible job shop predictive scheduling problem considering possible machine breakdowns." Computers & Industrial Engineering 112, no. : 595-606.
Kamel Smiri; Habib Smei; Nourhen Fourati; Abderrazak Jemai. Fault-Tolerant in Embedded Systems (MPSoC): Performance Estimation and Dynamic Migration Task. Advances in Science, Technology and Engineering Systems Journal 2017, 2, 1188 -1195.
AMA StyleKamel Smiri, Habib Smei, Nourhen Fourati, Abderrazak Jemai. Fault-Tolerant in Embedded Systems (MPSoC): Performance Estimation and Dynamic Migration Task. Advances in Science, Technology and Engineering Systems Journal. 2017; 2 (3):1188-1195.
Chicago/Turabian StyleKamel Smiri; Habib Smei; Nourhen Fourati; Abderrazak Jemai. 2017. "Fault-Tolerant in Embedded Systems (MPSoC): Performance Estimation and Dynamic Migration Task." Advances in Science, Technology and Engineering Systems Journal 2, no. 3: 1188-1195.