limed-03.jpg

News

 

2019

 

 

 

1. A. Brighen, H. Slimani, A. Rezgui and H. Kheddouci, Listing all maximal cliques in large graphs on vertex centric model. The Journal of Supercomputing (2019). DOI: 10.1007/s11227-019-02770-4



2. K. Akilal, H. Slimani and M. Omar, A very fast and robust trust inference algorithm in weighted signed social networks using controversy, eclecticism, and reciprocity. Computers & Security 83, pp. 68-78 (2019). https://doi.org/10.1016/j.cose.2019.01.013



3. F. Bouchebbah and H. Slimani. Levels propagation approach to image segmentation: application to breast MR images. Journal of Digital Imaging (2019) DOI: 10.1007/s10278-018-00171-2



4. K. Akilal, H. Slimani and M. Omar, A robust trust inference algorithm in weighted signed social networks based on collaborative filtering and agreement as a similarity metric, Journal of Network and Computer Applications 126, pp. 123–132 (2019). https://doi.org/10.1016/j.jnca.2018.11.008



5. T. Antczak and H. Slimani, Nondifferentiable minimax programming problem with second-order (p,r)-invex functions. Journal of Nonlinear and Convex Analysis 20(2), pp. 229-249, 2019 (2019).



6. M. E. Khanouche, F. Attal, Y. Amirat, A. Chibani, and M. Kerkar, “Clustering-based and QoS-aware services Composition Algorithm for ambient intelligence,” Information Sciences, vol. 482, pp. 419-439, Jan. 2019.



7. Mustapha Sadi, Mourad Amad, Nadjib Badache: HiCo-MoG: Hierarchical consensus-based group membership service in mobile Ad Hoc Newroks. Journal of High Speed Networks, DOI 10.3233/JHS-190609, IO Press, 2019.



8. Mustapha Sadi, Mourad Amad, Nadjib Badache: Improving performance overhead of a trust-clustering key management protocol in ad hoc networks. Int. J. Electronic Security and Digital Forensics, In Press, InderScience, 2019.


9. Bournane Abbache, Sofiane Aissani, Mawloud Omar , Farah-Sarah Ouada , Nawel Yessad , Mohamed Azni et Abdelkamel Tari, "Dissimulation-based and load-balance-aware routing protocol for request and event oriented mobile wireless sensor networks". International Journal Electronic and Communications. (AEU) 264-283 (2019).



10. Automatic segmentation of the sphenoid sinus in CT-scans volume with DeepMedics 3D CNN architecture Kamal SOUADIH, Ahror Belaid, Douraied Ben Salem Medical Technologies Journal 1 (3), 334-346



11. F. Kacimi, A. Tari and H. Kheddouci, Business Process Graph Matching based on Vectorial Signatures, International Journal of Business Process Integration and Management, 9(2), pp. 76-89 (2019). DOI: 10.1504/IJBPIM.2019.099869.



12. A. Sebaa, A. Nouicer, and A. Tari, Impact of Technology Evolution on the Materialised Views: Current Issues and Future Trends, International Journal of Business Information Systems, 30(4), pp. 427-462 (2019). https://doi.org/10.1504/IJBIS.2019.099305.



13. S. Chibani Sadouki and A. Tari, Multi-objective and discrete Elephants Herding Optimization algorithm for QoS aware web service composition, RAIRO-Oper. Res., 53(2), 445-459 (2019). DOI: https://doi.org/10.1051/ro/2017049.



14. A. Sebaa, and A. Tari, Query optimization in cloud environments: challenges, taxonomy, and techniques, The Journal of Supercomputing, pp. 1-31 (2019). https://doi.org/10.1007/s11227-019-02806-9.



15. A. Sebaa, and A.Tari, Materialized View Maintenance: Issues, Classification, and Open Challenges, International Journal of Cooperative Information Systems, 28 (1) (2019). https://doi.org/10.1142/S0218843019300018.


16. M. Naili, M. Bourahla, M. Naili and A. Tari, Stability-based Dynamic Bayesian Network method for dynamic data mining, Engineering Applications of Artificial Intelligence, Volume 77, pp. 283-310 (2019). https://doi.org/10.1016/j.engappai.2018.09.016.



17. A. Ahmed Nacer, C. Godart, G. Rosinosky, A. Tari and S. Youcef, Business process outsourcing to the cloud: Balancing costs with security risks, Computers in Industry, Volume 104, pp. 59-74 (2019). https://doi.org/10.1016/j.compind.2018.10.003.



18. F. Boudries, S. Sadouki, A. Tari, A bio-inspired algorithm for dynamic reconfiguration with end-to-end constraints in web services composition, International Journal Service Oriented Computing and Applications, In Press (2019).



19. A. Khelaifa, S. Benharzallah, L. Kahloul, R. Euler, A. Laouid, and A. Bounceur, , A comparative analysis of adaptive consistency approaches in cloud storage, Journal of Parallel and Distributed Computing, Volume 129, pp. 36-49 (2019). https://doi.org/10.1016/j.jpdc.2019.03.006.

 

 

 

2018

 

 

 

20. S. Albane, H. Slimani and H. Kheddouci. Graph grammars according to the type of input and manipulated data: A survey, Computer Science Review 28, pp. 178–203 (2018). DOI 10.1016/j.cosrev.2018.04.001


21. S. Ait Taleb, H. Slimani and H. Kheddouci. (N, p)-equitable b-coloring of graphs. Discrete Applied Mathematics 235, pp. 1–15 (2018). http://dx.doi.org/10.1016/j.dam.2017.09.004


22. N. Yousfi-Halimi, M.S. Radjef and H. Slimani, Refinement of pure Pareto Nash equilibria in finite multicriteria games using preference relations, Annals of Operations Research 267, pp 607–628 (2018). https://doi.org/10.1007/s10479-017-2570-8


23. K. Ouazine, H. Slimani and A-K. Tari, Alliances in graphs: parameters, properties and applications - a survey, AKCE International Journal of Graphs and Combinatorics 15, pp. 115–154 (2018). https://doi.org/10.1016/j.akcej.2017.05.002


24. H. Benkerrou, M. Omar, F. Bouchebbah, Y Ait-Mouhoub, A Dependable and Lightweight Trust Proliferation Approach for the Collaborative IoT Systems, International Journal of Internet Technology and Secured Transactions, 8 :277-293 (2018). DOI: 10.1504/IJITST.2018.093381


25. A. Achroufene, Y. Amirat and A. Chibani, RSS-Based Indoor Localization Using Belief Function Theory. IEEE Transactions on Automation Science and Engineering, (2018). https://doi.org/10.1109/TASE.2018.2873800


26. Bournane Abbache, Sofiane Aissani, Mawloud Omar, Farah-Sarah Ouada, Nawel Yessad, Mohamed Azni, Abdelkamel Tari. “Dissimulation-based and load-balance-aware routing protocol for request and event oriented mobile wireless sensor networks”. Int. J. Electron. Commun. 99 (2019), pp. 264-283 (AEÜ). https://doi.org/10.1016/j.aeue.2018.12.003


27. Lynda Inouri, Soraya Tighidet, Mohamed Azni, Abdelkrim Khireddine, Khaled Harrar. ‘‘A Fast and Efficient Approach for Image Compression Using Curvelet Transform’’, Sensing and Imaging, vol. 19 (1) pp. 26-49, 2018.


28. Ouamri Mohamed Amine, Zenadji Sylia, Khellaf Selia and Azni Mohamed. ‘‘Optimal base station location in LTE heterogeneous network using non-dominated sorting genetic algorithm II’’. International journal of wireless and mobile computing, Vol. 14 (04), pp. 328-334, 2018


29. Sofiane Aissani, Mawloud Omar, Abdelkamel Tari, Feriel Bouakkaz: " uKMS : micro key management system for WSNs". IET Wireless Sensor Systems 8(2): 87-97 (2018).


30. Assia Hammamouche, Mawloud Omar, Nabil Djebari, Abdelkamel Tari: Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. J. Inf. Sec. Appl. 43: 12-20 (2018).


31. Mawloud Omar, Imene Belalouache, Samia Amrane and Bournane Abbache. Efficient and energy-aware key management framework for dynamic sensor networks. Computers & Electrical Engineering, 72 : 990-1005, 2018.


32. K. Adi, L. Hamza and L. Pene, Automatic security policy enforcement in computer systems. Computers & Security 73, pp. 156-171 (2018). https://doi.org/10.1016/j.cose.2017.10.012


33. N. Yessad and M. Omar. Reliable and efficient data communication protocol for BAN-based healthcare systems. International Journal of E-Health and Medical Communications (IGI-Global), Volume 9, Issue 2, Pages 19-3 7 (2018).


34. N . Yessad, M. Omar, A. Tari and A. Bouabdallah. QoS-based Routing in Wireless Body Area Networks: A Survey and Taxonomy. Computing (Springer), Volume 100, Number 3, Pages 245-275 (2018)


35. Lynda Ben Boudaoud, Basel Solaiman, Abdelkamel Tari, Modified ZS thinning algorithm by a hybrid approach." The Visual Computer 34(5): 689-706 (2018)


36. Kenza Tamiti, Megdouda Ourbih-Tari, Abdelouhab Aloui, Khelidja Idjis. The use of variance reduction, relative error and bias in testing the performance of M/G/1 retrial queues estimators in Monte Carlo simulation. Monte Carlo Methods and Applications 24:3, pages 165-178.


37. Megdouda OURBIH-TARI, Sofia GUEBLI, Abdelouhab ALOUI Applying Refined Descriptive Sampling on the vibrating string model,  International Journal of Computing Science and Mathematics


38. S. SABRI, A.AlOUI 'A new approach for the recognition of human activities', International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), 2018


39. Z Rachida, A Belaid, DB Salem A Segmentation Method of Skin MRI 3D High Resolution in vivo Medical Technologies Journal 2 (3), 255-261.


40. A Belaid, D Boukerroui Local maximum likelihood segmentation of echocardiographic images with Rayleigh distribution Signal, Image and Video Processing 12 (6), 1087–1096


41. Semi-automatic method for low-grade gliomas segmentation in magnetic resonance imaging R Zaouche, A Belaid, S Aloui, B Solaiman, L Lecornu, DB Salem, S Tliba IRBM 39 (2), 116-128


42. Kendi. N., Hidra. Y. & Kaïd-Tlilane. N.,. La culture du tabac en Algérie : un coût d’opportunité important sur le développement durable. XXXIIIES journées sur le développement : «Agricultures, ruralités et développement», les cahiers de l'Association Tiers-Monde, n°33 – 2018 (pp 65-74).


43. Ould Abdeslam. S , Kaïd Tlilane. N, La modélisation des déterminants des dépenses de santé en Algérie par l'approche ARDL. Les cahier du CEDIMES, Volume 12, n°2, 2018. pp. 649-662. http://www.cedimes.com/attachments/article/66/Cahiers%20n28_31iul.pdf


44. A. Sebaa, F. Chikh, A. Nouicer, and A. Tari, Medical Big Data Warehouse: Architecture and System Design, a Case Study: Improving Healthcare Resources Distribution, Journal of Medical Systems, 42(4), pp. 59 (2018). https://doi.org/10.1007/s10916-018-0894-9.


45. A. Ahmed Nacer, E. Goettelmann, S. Youcef, A. Tari and C. Godart, A Design-Time Semi-Automatic Approach for Obfuscating a Business Process Model in a Trusted Multi-Cloud Deployment: A Design-Time Approach for BP Obfuscation. International Journal of Web Services Research (IJWSR), 15(4), pp. 61-81 (2018). doi:10.4018/IJWSR.2018100104.


46. S. Ikken, E. Renault, A. Tari and M. T. Kechadi. Exact and heuristical data workflow placement algorithms for big data computing in cloud datacenters. Scalable Computing : Practice and Experience, 19 (3), pp. 223-244 (2018). DOI : 10.12694/scpe.v19i3.1365.


47. M. Bendechache, A. Tari and M. T. Kechadi, Parallel and distributed clustering framework for big spatial data mining, International Journal of Parallel, Emergent and Distributed Systems , pp. 1-19 (2018). https://doi.org/10.1080/17445760.2018.1446210.


48. A. Laouid, A. Dahmani, A. Bounceur, R. Euler, F. Lalem, H-R. Hassan and A. Tari, A Self-managing Volatile Key Scheme for Wireless Sensor Networks, Journal of Ambient Intelligence and Humanized Computing, pp 1–16 (2018). https://doi.org/10.1007/s12652-018-0772-9.


49. M. Naili, M. Naili and A. Tari, Uncertainty In The Pert’s Critical Path. MATTER: International Journal of Science and Technology, 4(1) (2018). https://dx.doi.org/10.20319/mijst.2018.41.0109.


50. A. Elci, S. Kedjar, A. Tari and P. Bertok, An official publication of the Information Resources Management Association. International Journal of Distance Education Technologies, 16(3), (2018).


51.I.Kertiou, S. Benharzallah, L. Kahloul, M. Beggas, R. Euler, A. Laouid, and A. Bounceur, A dynamic skyline technique for a context-aware selection of the best sensors in an IoT architecture. Ad Hoc Networks, Volume 81, pp. 183-196 (2018). https://doi.org/10.1016/j.adhoc.2018.08.011.

 

 

 

 

 

 

 

 

 

2017

 

 

 

 

52. H. Nacer, N. Djebari, H. Slimani and D. Aissani, A distributed authentication model for composite web services, Computers & Security 70, pp 144-178 (2017). https://doi.org/10.1016/j.cose.2017.05.008
53. K. Bouibed, H. Slimani and M.S. Radjef. Global efficiency for multiobjective bilevel programming problems under generalized invexity. Journal of Applied Mathematics and Computing 53(1), 507-530 (2017), DOI: 10.1007/s12190-015-0979-2
54. A. Sebaa, A. Nouicer, A. Tari, R. Tarik and A. Ouhab. Decision support system for health care resources allocation. Electronic physician 9(6), pp. 4661-4668, 2017. http://dx.doi.org/10.19082/4661
55. Farah Zoubeyr, Yamine Aït Ameur, Meriem Ouederni, Kamel Tari:
A correct-by-construction model for asynchronously communicating systems. STTT 19(4): 465-485 (2017).
56. L. Cheklat, M. Amad, and A. Boukerram. A Limited Energy Consumption Model for P2P Wireless Sensor Networks. Wireless Personal Communications (Springer Publisher), 96(4), pp. 6299-6324, 2017. 
57. L. Cheklat, M. Amad, and A. Boukerram. Wireless Sensor Networks, State of Art and Recent Challenges: A survey. Sensor Letters (American Scientific Publishers), 15(9), pp. 697-719, 2017.
58. R. Boudjadja, M. Azni, A. Dahmani and M. N. Zennir. ‘‘Efficient Mobile Video Transmission based on a Joint Coding Scheme’’. Journal of Information and Communication Technology, Vol. 16, No. 2 (Dec) 2017, pp: 336–353.
59. Yessad Nawel, Siham Bouchelaghem, F.S. Ouada and M. Omar. (2017). "Secure and reliable patient body motion based authentication approach for medical body area networks", Pervasive and Mobile Computing - Journal. 42, 351-370.
60. Mohammedi, M. Omar, and A. Bouabdallah. Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments. Journal of Ambient Intelligence and Humanized Computing (Springer Publisher), DOI: https://doi.org/10.1007/s12652-017-0574-5, 2017.
61. Zebboudj, F. Cherif, M. Mohammedi, and M. Omar. Secure and efficient ECG- based authentication scheme for medical body area sensor networks. Smart Health (Elsevier Publisher), DOI: https://doi.org/10.1016/j.smhl.2017.07.001, 2017.
62. K. GHIDOUCHE, A. SIDER, R. COUTURIER, and C.GUYEUX icient high degree polynomial root finding using GPU.” in Journal of Computational Science. Vol 18, pp :46-56. doi: http://10.1016/j.jocs2016.12.004. January 2017.
63. Megdouda Ourbih-Tari, Arezki Zioui & Abdelouhab Aloui,  Variance reduction in the simulation of a stationary M/G/1 queuing system using refined descriptive sampling,Communications in Statistics - Simulation and Computation Volume 46, 2017 - Issue 5
64. S.Zeboudj, F. Cherifi, M. Mohammedi,  M. Omar, Secure and Efficient ECG-based Authentication Scheme for Medical Body Area Sensor
Networks, Smart Health journal, Volumes 3–4,  75-84, (2017)
65. Hidra. Y, Kaid Tlilane. N. Evaluation du cadre juridique et réglementaire en termes de lutte contre l’insécurité routière en Algérie. Publication dans l’ouvrage “Sécurité routière : état des lieux et initiatives dans le monde", dirigé par Sandrine Gaymard et Teodor Tiplica. Edition l'Harmattan  logique sociale. Décembre 2017, ISBN : 978-2-343-13076-7, pp 167-196. 
66. Hidra. Y, Kaid Tlilane. N. Analyse des déterminants comportementaux des usagers de la route dans les accidents en Algérie. Publication dans  l'ouvrage "sécurité routière: un défi à l'aube du XXI siècle" dirigé par Sandrine Gaymard et Teodor Tiplica Edition l'Harmattan  logique sociale février 2017, ISBN:978-2-343-10404-1 pp 233 – 252.
67. Idres. B, Kaid Tlilane. N., Évolution du parc automobile et des infrastructures routières : quelles incidences sur la sécurité routière en Algérie ? In : Gaymard S., Tiplica T Sécurité routière : Un défi à l'aube Du XXIème Siècle. Ed,  L'harmattan. France. (2017). PP 89 – 120. ISBN : 978-2-343-10404-1
68. Messaïli M., Kaïd Tlilane N., Dépenses publiques de santé et santé de la population en Algérie : une analyse économétrique. Recherche Originale. Revue Santé Publique (France), volume 29 / n° 3 mai – juin 2017. PP. 383-392. ISSN : 0995-3914. Revue indexée : Thomson Reuters et Scopus 2017.
69. A. Sebaa, A. Nouicer, A. Tari, T.Ramtani, and A. Ouhab, Decision support system for health care resources allocation, Electronic Physician, 9(6), pp. 4661-4668 (2017). https://doi.org/10.19082/4661. 
70. A. Laouid, A. Dahmani, A. Bounceur, R. Euler, F. Lalem and A. Tari, A distributed multi-path routing algorithm to balance energy consumption in wireless sensor networks, Ad Hoc Networks, Volume 64, pp. 53-64 (2017). https://doi.org/10.1016/j.adhoc.2017.06.006.
71. S. S. Chibani and A. Tari, Elephant herding optimization for service selection in QoS-aware web service composition, Int. J. Comput. Electr. Autom. Control Inf. Eng, Volume 11, pp. 1063-1067 (2017).
72. A. Sebaa, F. Chick, A. Nouicer and A. Tari, Research in big data warehousing using Hadoop, Journal of Information Systems Engineering & Management, 2(2), pp. 10 (2017). doi: 10.20897/jisem.201710.
73.A. Laouid, A. Dahmani, A. Bounceur, R. Euler, F. Lalem and A. Tari, A distributed multi-path routing algorithm to balance energy consumption in wireless sensor networks. Ad Hoc Networks, Volume 64, pp. 53-64 (2017). https://doi.org/10.1016/j.adhoc.2017.06.006.
74. M. Saoudi, F. Lalem, A. Bounceur, R. Euler, M-T. Kechadi, A. Laouid, M. Bezoui, and M. Sevaux, D-LPCN: A distributed least polar-angle connected node algorithm for finding the boundary of a wireless sensor network, Ad Hoc Networks, Volume 56, pp. 56-71 (2017). https://doi.org/10.1016/j.adhoc.2016.11.010.

 

 

 

 

 

 

2016

 

 

75. H. Slimani and M.S. Radjef. Weak pseudo-invexity and characterizations of solutions in multiobjective programming. Applied Mathematics & Information Sciences: An International Journal, 10, No. 3 pp. 949-959 (2016). http://dx.doi.org/10.18576/amis/100313



76. M. Naili, A. Achroufene, M. Naili, Election-based method for fault tolerance in a hierarchical sensor network (EFTOHSN): a case study of an indoor localisation system. IJSNet 22(3): 158-165 (2016). https://www.inderscienceonline.com/doi/abs/10.1504/IJSNET.2016.080202



77. M. E. KHANOUCHE, Y. AMIRAT, A. CHIBANI, M. KERKAR. and A. YACHIR, “Energy-centered and QoS-aware services selection for Internet of Things,” IEEE Tran. On Automation Science and Engineering, vol. 13, no. 3, pp. 1256–1269, Jul. 2016.



78. F.S. Ouada, M. Omar, A. Bouabdallah and A. Tari. "Lightweight identity-based authentication protocol for wireless sensor networks. International Journal of Information and Computer Security", Inderscience, Volume 8, Number 2, Pages 121-138, 2016.



79. K. Amroun, Z. Habbas, W. Aggoune-Mtalaa, A compressed Generalized Hypertree Decomposition-based solving technique for non binary Constraint Satisfaction problems. AI COMMUNICATIONS journal, Volume 29, issue 2, pp 371-392, (2016).



80. Z. Habbas, K. Amroun, D. Singer, Generalized Hypertree Decomposition for solving non binary CSP with compressed table constraints. Rairo - Operations Research, Volume 50, issue 2, pp 241-267, (2016).



81. Foudi B., Kaïd Tlilane N. Les acteurs publics et privés dans le système de santé algérien : de la concurrence à la complémentarité’’. Revue des Régions Arides (Tunisie), n° 40 (2/2016) – Numéro spécial. Editions Institut des Régions Arides Médenine. PP 301 – 311. ISSN : 0330 – 7956



82. N. Bouadem, R. Kacimi And A. Tari, Impact of Duty-Cycling: Towards Mostly-Off Sensor Networks, International Journal of Business Data Communications and Networking, 12(1) , pp. 16-34 (2016). 10.4018/IJBDCN.2016010102.



83. N. Bouadem, R. Kacimi And A. Tari, Impact of Duty-Cycling: Towards Mostly-Off Sensor Networks, International Journal of Business Data Communications and Networking, 12(1) , pp. 16-34 (2016). 10.4018/IJBDCN.2016010102.



84. R. Houari, A. Bounceur, M-T. Kechadi, A. Tari, R. Euler, Dimensionality reduction in data mining: A Copula approach, Expert Systems with Applications, Volume 64, pp. 247-260 (2016), https://doi.org/10.1016/j.eswa.2016.07.041.



85. F. Bouakkaz, M. Omar, S. Laib, L. Guermouz, A. Tari and A. Bouabdallah. Lightweight Sharing Scheme for Data Integrity Protection in WSNs, Wireless Pers Commun, Volume 89, pp. 211-226 (2016). https://doi.org/10.1007/s11277-016-3261-5.



86. B. Brahimi, M. Touahria, and A. Tari, Data and Text Mining Techniques for Classifying Arabic Tweet Polarity, Journal of Digital Information Management, 14(1), pp. 15-25 (2016).



87. M. Omar, H. Boufaghes, L. Mammeri, A. Taalba and A. Tari, Secure and reliable certificate chains recovery protocol for mobile ad hoc networks, Journal of Network and Computer Applications, Volume 62, pp. 153-162, (2016). https://doi.org/10.1016/j.jnca.2016.01.007.



88. S. Kedjar, A. Tari and P. Bertok, Access Control and Information Flow Control for Web Services Security, International Journal of Information Technology and Web Engineering (IJITWE), 11(1), pp. 44-76 (2016). doi:10.4018/IJITWE.2016010103.



89. T. Iggui, H. Nacer, Y. Sklab and T-A. Radi, Web Application for User Profiling, International Journal of Information Systems in the Service Sector (IJISSS), 8(2), pp. 44-56 (2016). DOI: 10.4018/IJISSS.2016040104.


 

 

 

 

2015

 

 

 

 90. H. Slimani and M.S. Radjef. Generalized Fritz John optimality in nonlinear programming in the presence of equality and inequality constraints. Operational Research: An International Journal, 16(2), pp 349–364 (2015). https://doi.org/10.1007/s12351-015-0206-9



91. H. Slimani and H. Kheddouci. Saturated boundary k-alliances in graphs. Discrete Applied Mathematics 185 pp. 192–207 (2015). https://doi.org/10.1016/j.dam.2014.11.030



92. H. Slimani and M.S. Radjef. Fritz John type optimality and duality in nonlinear programming under weak pseudo-invexity. RAIRO-Operations Research 49, pp. 451–472 (2015). https://doi.org/10.1051/ro/2014046



93. A. Sebaa, A. Tari, T. Ramtani and A. Ouhab. DW RHSB: A framework for optimal allocation of health resources. International Journal of Computer Science, Communication & Information Technology (CSCIT), 2(1). pp. 12-17, 2015.



94. M. Naili, A. Boubetra, A. Tari, Y. Bouguezza, A. Achroufene, Brain-inspired method for solving fuzzy multi-criteria decision making problems (BIFMCDM). Expert Syst. Appl. 42(4): 2173-2183 (2015). https://doi.org/10.1016/j.eswa.2014.07.047



95. Mawloud Omar, Sabrine Hedjaz, Souhila Rebouh, Katia Aouchar, Bournane Abbache and Abdelkamel Tari. On-demand source routing with reduced packets protocol in mobile ad-hoc networks. AEU-International Journal of Electronics and Communications, 69(10) :1429–1436, 2015.



96. Aloui, A., Zioui, A., Ourbih-Tari, M. et al. A general purpose module using refined descriptive sampling for installation in simulation systems; June 2015, Volume 30, Issue 2, pp 477–490



97. Z. Habbas, K. Amroun,D. Singer, A forward Checking algorithm based on a Generalised Hypertree Decomposition for solving non-binary Constraint Satisfaction Problems. Journal of experimental and theoretical Artificial Intelligence. Volume 27, issue 5, pp 649-671, 2015. http://dx.doi.org/10.1080/0952813X.2014.993507



98. M. Khammari, Y.Tlili, C.Bencheriet, “Robust Face Detection using Haar Features with Weber Local Descriptor and Local Binary Pattern “, International Journal of Knowledge-Based and Intelligent Engineering Systems, IOS Press, Vol 19, pp 117–123, 2015



99. M. Naili, A. Boubetra, A. Tari, Y. Bouguezza and A. Achroufene, Brain-inspired method for solving fuzzy multi-criteria decision making problems (BIFMCDM), Expert Systems with Applications, 42(4), pp. 2173-2183 (2015). https://doi.org/10.1016/j.eswa.2014.07.047.



100. Dhai Eddine Salhi, Abdelkamel Tari, M-Tahar Kechadi, Clustering of optimized data for email forensics, RAIRO-Oper. Res. Volume 50, pp. 951-963 (2016). DOI: 10.1051/ro/2015057.


 

 

2014

 

 

 

 

 101. H. Slimani and S.K. Mishra. Multiobjective fractional programming involving generalized semilocally V-type I-preinvex and related functions . International Journal of Mathematics and Mathematical Sciences, vol. 2014, Article ID 496149, 12 pages, (2014). DOI:10.1155/2014/496149



102. N. Battat, H. Seba and H. Kheddouci. Monitoring in mobile ad hoc networks: A survey. Computer Networks 69 pp. 82-100 (2014). https://doi.org/10.1016/j.comnet.2014.04.013



103. A new generalised α scale spaces quadrature filters A Belaid, D Boukerroui Pattern Recognition 47 (10), 3209-3224



104. H. EL Bouhissi, M. Malki and Mohamed Amine Sidi Ali Cherif, From User’s Goal to Semantic Web Services Discovery: Approach Based on Traceability, International Journal of Information Technology and Web Engineering (IJITWE), 9(3), 15-39 (2014).


 

 

2013

 

 

 

105. H. El Bouhissi, M. Malki, D. Berramdane and R-E. Al-Qutaish, Using the Semantic Web Services to build a virtual medical analysis laboratory. American Journal of Software Engineering and Applications, 2(2) (2013).


106. H. El Bouhissi, M. Malki and D. Berramdane, Applying Semantic Web Services. International Journal of Computer and Technology (IJCTE), IAEME.


 

2012

M. Omar, Y. Challal, and A. Bouabdallah. Certification-based trust models in mobile ad hoc networks: A survey and taxonomy. Vol. 35, Issues 1, Pages 268-286, Journal of Network and Computer Applications (Elsevier), 2012.

S.Tighidet-Aloui and A. Khireddine. Evaluation of the results of supervised segmentation using a robust tool: the case of Zernike moments method applied to medical imaging. International journal of Computer engineering & technology (IJCET), Volume 3, Issues 1, Pages 106-114, 2012.

Kaïd Tlilane N. ’’Espace Méditerranéen : enjeux socioéconomiques, défis et perspectives’’. Ouvrage Collectif : Pasado y futuro del área mediterránea. Consideraciones sociales y económicas. Passé et futur de l’aire méditerranéenne. Considérations sociales et économiques. Seminario Científico Internacional conjunto con la Université Abderahmane Mira, Béjaïa, Argelia, celebrado el 24 de noviembre de 2011. Publicaciones de la Real Academia de Ciencias Económicas y Financieras, Barcelona. 101 pages. Ediciones Gráficas Rey, S.L.—c/Albert Einstein, 54 C/B, Nave 12-14-15 Cornellà de Llobregat—Barcelona, Janvier 2012. PP 65 – 80. ISBN-13: 978-84-615-8770-4.

2010

Z. Farah, A. Tari, and A-M. Ouksel. Backward validation of communicating complex state machines in web services environments. Distrib Parallel Databases 27: 255–270, 2010.

J-H. Bellec, T. Kechadi and A. Tari. Adaptive methodology for fault recognition in 3 G Telecommunication Networks. Knowledge and Information Systems journal, 2010.

BOUCHAAR Tareq, GARMOUCHE Nawal, FARAH Zoubeyr . Approche basée coordination, médiation et politiques privées pour la composition de services Web. Premières Journées Doctorales en Informatique, JDI'10.

ABBACHE Bournane, TARI Abdelkamel, FARAH Zoubeyr. Semantic-based service discovery for web services. Premières Journées Doctorales en Informatique, JDI'10.

 

Mohammed Said Radjef. Application de la théortie des jeux pour la technique de clustering en Data mining. Premières Journées Doctorales en Informatique, JDI'10.

 

2009

J-M. Bahi, R. Couturier, and A.Sider, Load Balancing Algorithms for Dynamic Networks, bookchapter, in Fundamentals of Grid Computing: Theory,Algorithms and Technologies, Editors Frédéric Magoules, Chapman and Hall/CRC Numerical Analy and Scientific Computing Series, 2009.

A. Tari, I. Eldjadwi and A. Dahmani: A Dual-Layered Model for Web Services Representation and Composition. Journal of Intelligent Information System (JIIS) 32, pp. 237-265, 2009.

Farah Zoubeyr, Abdelkamel Tari, Zahir Tari: Une Technique de Validation de Protocoles basée sur une Exploration avec Retour arrière des Automates Complexes. CIIA 2009.

Kaïd Tlilane N. ’’Le service public local au service du développement Durable’’. Ouvrage Collectif : Développement Durable et Responsabilité Sociale des Acteurs, 331 pages. Sous la direction de Celine Merlin-Brogniart, Marc-Hubert Depret et Pierre Le Masne. Editions L’Harmattan. Paris, Janvier 2009. PP 83 – 106.

M. Omar, Y. Challal, and A. Bouabdallah. Reliable and fully distributed trust model for mobile ad-hoc networks. Computers and Security, Elsevier Science, Volume 28 pp: 199-214, 2009.

A. Sider and R. Couturier. Fast Load Balancing with the most to least loaded policy in dynamic networks, the Journal of Supercomputing, , the Journal of Supercomputing, Vol. 43 N. 3. pp. 291-317. SpringerScience & BusinessMedia, 2009.

Megdouda OURBIH, Abdelouhab ALOUI & Amine  ALIOUI. A software component which generates regular numbers from refined descriptive sampling. Proccedings de la 23ième conférence “European Simulation and Modelling (ESM’2009)”. 26-28 Octobre, 2009. Leicester, Royaume-Uni. Edité par Marwan Al-Akaidi. Softbound, pp 23-25. ISBN 978-90-77381-52-6.

 Abdelouhab ALOUI & Megdouda OURBIH. The use of Refined Descriptive Sampling in Parallel Simulation. Proccedings of the Industrial Simulation Conference 2009 (ISC’2009). 1-3 Juin 2009. Loughborough, Royaume-Uni.Edité par Diganta Bhusan Das, Vahid Nassehi and Lipika Deka. Softbound. pp 13-20.ISBN 978-90-77381-4-89.

Megdouda Ourbih & Abdelouhab Aloui. Sampling methods and parallelism into Monte Carlo simulation. Journal of Statistics: Advances in Theory and Application (JSATA). Vol 1 (2) (2009)  pp 169-192.

H. Nacer-TalantikiteD. Aïssani, and N. BoudjlidaSemantic annotations for web services discovery and composition. Computer Standards & Interfaces 31(6): 1108-1117, 2009.

AZNI Mohamed, PYNDIAH Ramesh, MOKRANI KarimGUILLOUD Frédéric.Joint source and channel coding for real time H.264 coded video transmission using mobile hand-held devices”. IETE journal of research, july 2009, vol. 55, n° 4, pp. 154-161, 2009.

2007

Kaïd Tlilane N. ’’Les effets du contexte socioéconomique sur la santé en Algérie’’. Les Cahiers de L’Association Tiers-Monde, n° 22, 2007. PP. 89-98.

Kaïd Tlilane N. ’’Etude rétrospective des systèmes éducatif et de formation professionnelle algériens’’. Les Cahiers de Préludes, n° 9, 2007. PP. 15-28.

2005

Z. Tari, M. Malhotra, A. Tari, and M. Mckinlay: Toward the right communication protocole for web services. International Journal of Web Service Research, 2(2): 19-42, 2005.

Kaïd Tlilane N. ’’Espace, Emploi et Environnement : cas de l’Algérie’’. Février 2005 sur le Site Web : http://www.apreis.org

Kaïd Tlilane N. ‘’L’Insécurité Routière en Algérie’’. Revue ’’TEC : Transport/ Environnement/ Circulation’’, Paris, juillet – septembre 2005, n° 187. PP. 04 - 08.

2004

 Kaïd Tlilane N. ’’Ville-Santé : une gestion urbaine pour une protection de l’environnement et de la santé : Le cas de l’Algérie’’. Ouvrage Collectif : Gouvernance locale et développement territorial : Le cas des pays du Sud, 407 pages. Améziane Ferguène (Ed.). Editions L’Harmattan. Paris, Novembre 2004. PP 141 – 159.

Kaïd Tlilane N. : article publié en 04 langues ci-dessous (Anglais, Espagnole, Allemand et Français) dans une revue de classe A avec un facteur d’impact de 3,24. ’’Healthcare funding problems in Algeria’’. International Social Security Review. Vol. 57, n° 4, Geneva, october-december 2004. Ed. ISSA. AISS. IVSS. PP. 91-110. ISSN 0020-871X;

 Kaïd Tlilane N. ’’Los problemas de financiamiento de la atención de salud en Argelia’’. Revista Internacional de Seguridad Social. Vol. 57, NUM. 4, Geneva, Octubre-diciembre 2004. Ed. ISSA. AISS. IVSS. PP. 99-120. ISSN 0250-605X.

 Kaïd Tlilane N. ’’Zum Problem der Finanzierung der Gesundheitsversorgung in Algerien’’. Internationale Revue Für  Soziale Sicherheit. Bd. 57, Nr. 4, Geneva, Oktober-dezember 2004. Ed. ISSA. AISS. IVSS. PP. 109-131. ISSN 0379-0282.

Kaïd Tlilane N. ’’La problématique du financement des soins en Algérie’’. Revue Internationale de Sécurité Sociale. Vol. 57, N°4, Geneva, Octobre-décembre 2004. Ed. ISSA. AISS. IVSS. PP. 105-127. ISSN 0379-0312.

Kaïd Tlilane N. ’’Crise économique et état de santé des enfants algériens’’. Revue Santé Conjuguée, Bruxelles, juillet 2004, n° 29. PP 03-14. 

{2003}

Z. Tari, S. Setiawan, and A.Tari,CODAR - A POA-based CORBA Database Adaptor for WebService Infrastructures. D. Taniar eds., Idea-Group Publishing, pp. 266-298, 2003.

2002

Kaïd Tlilane N. ’’La place et le rôle de l’artisanat traditionnel dans le développement local en Algérie’’. Revue Finance et Développement au Maghreb, Tunis, décembre 2002, nos 29-30. PP. 42-49.

2001

Kaïd Tlilane N. ’’Gestion urbaine, environnement et santé : cas de l’Algérie’’. Revue Finance et Développement au Maghreb, Tunis, juin 2001, n° 27. PP. 55-65.

Communications in Statistics: Simulation and Computation

http://tandfonline.com/doi/full/10.1080/03610918.2015.1096374