Search Results - "El Bouchti, Abdelali"
-
1
Supply Chain Management based on Blockchain: A Systematic Mapping Study
Published in MATEC Web of Conferences (01-01-2018)“…Groundbreakingly, blockchain technology (BCT) has gained widespread acceptance and importance in the last few years. Implemented in different areas of…”
Get full text
Journal Article Conference Proceeding -
2
Logistics and Supply Chain Analytics: Benefits and Challenges
Published in 2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (01-10-2018)“…With the aim of reviewing and characterizing the potential use of supply chain and logistics analytics. The present paper uses a systematic literature review…”
Get full text
Conference Proceeding -
3
Optimal admission control in high speed downlink packet access network
Published in 2016 Fifth International Conference on Future Generation Communication Technologies (FGCT) (01-08-2016)“…High Speed Downlink Packet Access (HSDPA) defines a new High Speed Shared Channel (HS-DSCH) which allows for practical speeds up to 10 Mbps. Among all the…”
Get full text
Conference Proceeding -
4
Cyber security modeling for SCADA systems using stochastic game nets approach
Published in 2016 Fifth International Conference on Future Generation Communication Technologies (FGCT) (01-08-2016)“…The security of SCADA (Supervisory Control and Data Acquisition) and realtime systems represents a significant challenge in today's world. The research in…”
Get full text
Conference Proceeding -
5
Encryption as a service for data healthcare cloud security
Published in 2016 Fifth International Conference on Future Generation Communication Technologies (FGCT) (01-08-2016)“…Data security continues to be one of the top concerns for cloud computing, an issue that's been intensified by recent high-profile attacks in healthcare. The…”
Get full text
Conference Proceeding -
6
Access control of multimedia traffic in a 3.5G wireless network
Published in 2011 International Conference on Multimedia Computing and Systems (01-04-2011)“…The High Speed Downlink Packet Access (HSDPA) is used more in the radio operator interface of the access network of the UMTS. Its principle is to share a…”
Get full text
Conference Proceeding -
7
Queueing performance analysis of CAC scheme in OFDMA based WiMAX system
Published in 2011 3rd International Conference on Next Generation Networks and Services (NGNS) (01-12-2011)“…This paper presents a problem of queueing theoretic performance modeling and analysis of Orthogonal Frequency Division Multiple Access (OFDMA) under broad-band…”
Get full text
Conference Proceeding -
8
Performance Analysis for Bandwidth Allocation in IEEE 802.16 Broadband Wireless Networks using BMAP Queueing
Published 08-03-2012“…International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 1, February 2012 This paper presents a performance analysis for the bandwidth…”
Get full text
Journal Article -
9
Quality of service analysis of access scheme of multimedia traffic in HSDPA channel using stochastic reward Nets
Published in 2012 International Conference on Multimedia Computing and Systems (01-05-2012)“…High Speed Downlink Packet Access (HSDPA) is being increasingly deployed to enhance UMTS Radio Access Networks. Scheduling of Node B (base station) buffered…”
Get full text
Conference Proceeding -
10
Performance measures of CAC mechanism in OFDMA system using shadow server approximation
Published in 2012 International Conference on Multimedia Computing and Systems (01-05-2012)“…We study in this paper the problem of queueing theoretic of OFDMA-based WiMAX with two classes of connections, connections with High Priority (HP) and…”
Get full text
Conference Proceeding -
11
Big Data Analytics Adoption in Warehouse Management: A Systematic Review
Published in 2018 IEEE International Conference on Technology Management, Operations and Decisions (ICTMOD) (01-11-2018)“…Purpose: To overview and characterize the potential adoption of big data analytics (BDA) in warehouse management (WM). Methodology: The paper uses a systematic…”
Get full text
Conference Proceeding -
12
Fraud detection in banking using deep reinforcement learning
Published in 2017 Seventh International Conference on Innovative Computing Technology (INTECH) (01-08-2017)“…Deep learning and machine learning are hot topics in the financial services nowadays. They allow financial entities to define products and segment clients,…”
Get full text
Conference Proceeding -
13
Forecasting Financial Risk using Quantum Neural Networks
Published in 2018 Thirteenth International Conference on Digital Information Management (ICDIM) (01-09-2018)“…There has been enormous attention in quantum algorithms for reinforcing machine learning (ML) algorithms. In the current paper, we present quantum neural…”
Get full text
Conference Proceeding -
14
Performance analysis of dynamic connection admission control mechanism for IEEE 802.16e wireless networks
Published in 2014 International Conference on Multimedia Computing and Systems (ICMCS) (01-04-2014)“…Connection admission control is an effective mechanism to guarantee resilient, efficient, and Quality of Service (QoS) in IEEE 802.16e wireless mobile…”
Get full text
Conference Proceeding -
15
Performance analysis of admission control and degradation service mechanism for multiclass services in LTE system
Published in Fourth edition of the International Conference on the Innovative Computing Technology (INTECH 2014) (01-08-2014)“…The main goal of LTE system is to provide high data transfer rate, low latency, increased flexible and effective bandwidth, and improve quality of service to…”
Get full text
Conference Proceeding -
16
Non-cooperative game for admission control and bandwidth allocation in WiMAX networks
Published in Fourth edition of the International Conference on the Innovative Computing Technology (INTECH 2014) (01-08-2014)“…In this paper, we propose an adaptive bandwidth allocation (BA) and connection admission control (CAC) mechanism based on game theory for polling services in…”
Get full text
Conference Proceeding -
17
Modeling cyber-attack for SCADA systems using CoPNet approach
Published in 2012 IEEE International Conference on Complex Systems (ICCS) (01-11-2012)“…With the rise of cyber-attack activities in the recent years, research in this area has gained immense emphasis. One of such research efforts is modeling of…”
Get full text
Conference Proceeding -
18
Performance Analysis of Connection Admission Control Scheme in IEEE 802.16 OFDMA Networks
Published 12-08-2013“…IEEE 802.16 OFDMA (Orthogonal Frequency Division Multiple Access) technology has emerged as a promising technology for broadband access in a Wireless…”
Get full text
Journal Article -
19
An Enhanced Time Space Priority Scheme to Manage QoS for Multimedia Flows transmitted to an end user in HSDPA Network
Published 12-08-2013“…(IJCSIS) International Journal of Computer Science and Information Security, Vol. 9, No. 2, February 2011 When different type of packets with different needs…”
Get full text
Journal Article -
20
Performances Evaluation of Enhanced Basic Time Space Priority combined with an AQM
Published 11-04-2013“…International Journal of Computer Science and Information Security,Vol. 9, No. 8, August 2011 Active Queue Management(AQM) is an efficient tool in the network…”
Get full text
Journal Article