Skip to main content

Showing 1–13 of 13 results for author: Feham, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2207.00152  [pdf

    cs.NI eess.SP

    UWB patch antenna design and realization in the bandwidth 780 MHz to 4.22 GHz

    Authors: Chemseddine Benkalfate, Mohammed Feham, Achour Ouslimani, Abed-Elhak Kasbari

    Abstract: The proposed UWB antenna covers mobile communications (GSM, EDG, UMTS(3G), LTE(4G)) and wireless networks (WIFI, WiMAX), within a theoretical bandwidth defined from 780MHz to 4.22GHz. The UWB antenna is designed and realized on a FR-4 substrate with an electrical permittivity of 4.4. It presents a 98.75% average analytical efficiency and an omnidirectional radiation within the previous bandwidth.… ▽ More

    Submitted 25 May, 2022; originally announced July 2022.

    Comments: 10 Pages, 13 Figures

  2. arXiv:1404.2888  [pdf

    cs.OH

    Substrate integrated waveguide power divider, circulator and coupler in [10-15] GHz band

    Authors: Bouchra Rahali Mohammed Feham

    Abstract: The Substrate Integrated Waveguide (SIW) technology is an attractive approach for the design of high performance microwave and millimeter wave components, as it combines the advantages of planar technology, such as low fabrication costs, with the low loss inherent to the waveguide solution. In this study, a substrate integrated waveguide power divider, circulator and coupler are conceived and opti… ▽ More

    Submitted 10 April, 2014; originally announced April 2014.

    Journal ref: International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.1/2, March 2014

  3. arXiv:1403.3779  [pdf

    cs.NI

    Geographic routing protocols for underwater wireless sensor networks:a survey

    Authors: Sihem Souiki, Maghnia Feham, Mohamed Feham, Nabila Labraoui

    Abstract: Underwater wireless sensor networks (UWSN), similar to the terrestrial sensor networks, have different challenges such as limited bandwidth, low battery power, defective underwater channels, and high variable propagation delay. A crucial problem in UWSN is finding an efficient route between a source and a destination. Consequently, great efforts have been made for designing efficient protocols whi… ▽ More

    Submitted 15 March, 2014; originally announced March 2014.

    Comments: 19 pages, IJWMN journal

  4. arXiv:1312.4082  [pdf

    cs.NI

    Wireless sensor networks localization algorithms: a comprehensive survey

    Authors: Asma Mesmoudi, Mohammed Feham, Nabila Labraoui

    Abstract: Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently on… ▽ More

    Submitted 14 December, 2013; originally announced December 2013.

    Comments: 20 pages

  5. RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks

    Authors: Omar Rafik Merad Boudia, Mohamed Feham

    Abstract: Recently, secure in-network aggregation in wireless sensor networks becomes a challenge issue, there is an extensive research on this area due to the large number of applications where the sensors are deployed and the security needs. In the last few years, aggregation of encrypted data has been proposed in order to maintain secrecy between the sensors and the sink, so the end-to-end data confident… ▽ More

    Submitted 11 December, 2012; originally announced December 2012.

    Comments: 15 pages

  6. Seamless Infrastructure independent Multi Homed NEMO Handoff Using Effective and Timely IEEE 802.21 MIH triggers

    Authors: Zohra Slimane, Mohamed Feham, Abdelhafid Abdelmalek

    Abstract: Handoff performance of NEMO BS protocol with existent improvement proposals is still not sufficient for real time and QoS-sensitive applications and further optimizations are needed. When dealing with single homed NEMO, handoff latency and packet loss become irreducible all optimizations included, so that it is impossible to meet requirements of the above applications. Then, How to combine the dif… ▽ More

    Submitted 9 July, 2012; originally announced July 2012.

    Journal ref: International Journal of Wireless & Mobile Networks (IJWMN)Vol. 4, No. 3, June 2012, 119-139

  7. arXiv:1205.6910  [pdf

    cs.NI cs.ET

    A New Architecture of a Ubiquitous Health Monitoring System: A Prototype Of Cloud Mobile Health Monitoring System

    Authors: Abderrahim Bourouis, Mohamed Feham, Abdelhamid Bouchachia

    Abstract: Wireless Body Area Sensor Networks (WBASN) is an emerging technology which uses wireless sensors to implement real-time wearable health monitoring of patients to enhance independent living. In this paper we propose a prototype of cloud mobile health monitoring system. The system uses WBASN and Smartphone application that uses cloud computing, location data and a neural network to determine the sta… ▽ More

    Submitted 31 May, 2012; originally announced May 2012.

  8. BSK-WBSN: Biometric Symmetric Keys to Secure Wireless Body Sensors Networks

    Authors: Samira Mesmoudi, Mohammed Feham

    Abstract: The Wireless Sensors Network (WSN) is an emergent technology resulting from progress of various fields. Many applications of networks WSN are born. One of the applications which have an operational effectiveness relates to the field of health and allows a medical remote support. Miniature wireless sensors, strategically placed on the human body, create a Wireless Body Sensor Network (WBSN) which a… ▽ More

    Submitted 8 October, 2011; originally announced October 2011.

    Comments: 12 pages; International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.5, Sep 2011

  9. Novel hybrid intrusion detection system for clustered wireless sensor network

    Authors: Hichem Sedjelmaci, Mohamed Feham

    Abstract: Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect the network against malicious attacks or unaut… ▽ More

    Submitted 12 August, 2011; originally announced August 2011.

    Comments: 14 pages

  10. arXiv:1108.1334  [pdf

    cs.NI cs.CR

    Secure and Robust IPV6 Autoconfiguration Protocol For Mobile Adhoc Networks Under Strong Adversarial Model

    Authors: Zohra Slimane, Abdelhafid Abdelmalek, Mohamed Feham, Abdelmalik Taleb-Ahmed

    Abstract: Automatic IP address assignment in Mobile Ad hoc Networks (MANETs) enables nodes to obtain routable addresses without any infrastructure. Different protocols have been developed throughout the last years to achieve this service. However, research primarily focused on correctness, efficiency and scalability; much less attention has been given to the security issues. The lack of security in the desi… ▽ More

    Submitted 5 August, 2011; originally announced August 2011.

    Journal ref: IJCNC, pp.208-227, Vol.3, No.4, July 2011

  11. arXiv:1107.3695  [pdf

    cs.NI

    Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE)

    Authors: Abderrahim Bourouis, Mohamed Feham, Abdelhamid Bouchachia

    Abstract: Recent research in ubiquitous computing uses technologies of Body Area Networks (BANs) to monitor the person's kinematics and physiological parameters. In this paper we propose a real time mobile health system for monitoring elderly patients from indoor or outdoor environments. The system uses a bio- signal sensor worn by the patient and a Smartphone as a central node. The sensor data is collected… ▽ More

    Submitted 19 July, 2011; originally announced July 2011.

    Comments: 9 pages,5 figures

    Journal ref: International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011

  12. A Light Weight Protocol to Provide Location Privacy in Wireless Body Area networks

    Authors: Mohammed Mana, Mohammed Feham, Boucif Amar Bensaber

    Abstract: Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs). An eavesdropper can keep track of the place and time devices are communicating. To make things even worse, the attacker does not have to be physically close to the communicating devices, he can use a device with a stronger antenna. The unique hardware address of a mobile device can often be linked to t… ▽ More

    Submitted 16 March, 2011; originally announced March 2011.

    Comments: 11 pages

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011

  13. arXiv:1002.1954  [pdf

    cs.NI

    High Throughput of WiMAX MIMO OFDM Including Adaptive Modulation and Coding

    Authors: Hadj Zerrouki, Mohamed Feham

    Abstract: WiMAX technology is based on the IEEE 802.16 specification of which IEEE 802.16-2004 and 802.16e amendment are Physical (PHY) layer specifications. IEEE 802.16-2004 currently supports several multiple-antenna options including Space-Time Codes (STC), Multiple-Input Multiple-Output (MIMO) antenna systems and Adaptive Antenna Systems (AAS). The most recent WiMAX standard (802.16e) supports broadba… ▽ More

    Submitted 9 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 86-91, January 2010, USA