Communications Internationales

Permanent URI for this collectionhttps://dspace.univ-boumerdes.dz/handle/123456789/11

Browse

Search Results

Now showing 1 - 10 of 13
  • Item
    Valuation of Physical Layer Security Under Jamming Attacks Utilizing RIS
    (2025) Refas, Souad; Meraihi, Yassine; Ivanova, Galina; Baiche, Karim; Cherif, Amar Ramdane; Acheli, Dalila
    Vehicular visible light communication (V VLC) systems, when combined with reconfigurable intelligent surfaces (RIS), present promising opportunities for improving communication reliability and efficiency in vehicle to vehicle (V2V) environments. Nevertheless, safeguarding these systems at the physical layer remains a critical challenge, particularly given their exposure to jamming threats. In this study, we investigate the physical layer security performance of RIS assisted V2V VLC systems under jamming scenarios, employing realistic V2V VLC channel models. We develop a methodology to examine the impact of various security strategies in mitigating the adverse effects of jamming. Our analysis examines key parameters including the signal to noise ratio SNR, the secure communication rate and the count of RIS units. Simulation results confirm that the proposed security systems significantly enhance the resilience of V2V VLC networks in the presence of jamming attacks. These results offer useful perspectives for the reliable design structure and deployment of RIS based V2V VLC systems in practical vehicular communication settings.
  • Item
    Hybrid whale optimization algorithm with simulated annealing for the UAV placement problem
    (Springer Nature, 2024) Taleb, Sylia Mekhmoukh; Meraihi, Yassine; Yahia, Selma; Ramdane-Cherif, Amar; Gabis, Asma Benmessaoud; Acheli, Dalila
    This chapter suggests a hybrid algorithm based on the combination of whale optimization algorithm (WOA) with simulated annealing (SA), called WOA-SA, for solving the unmanned aerial vehicle (UAV) placement problem. WOA-SA combines WOA’s global search functionality with SA’s local search functionality. The main objective of our work is to determine the optimal position of the UAV in order to maximize the total throughput, depending on a given set of user locations and traffic demands. The WOA-SA algorithm is validated in terms of the total throughput using 18 distinct instances with various numbers of users, taking into account the effect of the distribution of user positions. The results of simulation using Matlab demonstrated that the WOA-SA algorithm obtains better results than WOA, SA, Particle Swam Optimization (PSO), Genetic Algorithm (GA), and Bat Algorithm (BA).
  • Item
    Energy harvesting based on SLIPT in I2V-VLC system
    (IEEE, 2023) Refas, Souad; Acheli, Dalila; Yahia, Selma; Meraihi, Yassine
    Vehicular connectivity is mostly based on wireless access. The vehicular applications may be limited due to the limited battery life of the equipment involved. To address this issue, a method based on simultaneous light wave information and power transfer (SLIPT) is proposed for harvesting the energy in the Infrastructure-to-Vehicle Visible Light Communication (I2VVLC) system. The purpose of SLIPT is to harvest energy using light sources while decoding information. This article studies the effect of SLIPT in an I2V-VLC system. In this method, the received light from the traffic light source at the vehicle is harvested while decoding the information signal. First, for I2VVLC channel modeling, a recent realistic channel model using the ray-tracing method is utilized. Then, we propose the energy harvesting analysis based on the SLIPT strategy. After that, we investigate the impact of both the longitudinal and lateral distance between the vehicle and the traffic light on the amount of harvested energy. Furthermore, we investigate the relationship between the achievable information rate and the harvested energy amount. The obtained results demonstrate the significant impact of the communication distance and the required information rate on the quantity of harvested energy
  • Item
    Enhanced Whale Optimization Algorithm for mesh routers placement problem in wireless mesh networks
    (IEEE, 2022) Mekhmoukh Taleb, Sylia; Meraihi, Yassine; Yahia, Selma; Benmessaoud Gabis, Asma; Ramdane-Cherif, Amar; Acheli, Dalila
    In order to address the placement issue for mesh routers in wireless mesh networks, this study suggests an enhanced variant of the Whale optimization Algorithm (WOA), called ELG-WOA. The Generalized Opposition Based-Learning (GOBL) and the Levy Flight Distribution (LFD) are two methods that were incorporated into the original WOA to form the foundation of the ELG-WOA. Four performance indicators, including coverage, connectivity, load balancing, and fitness value, are used to validate the performance of ELG-WOA. The simulation results showed that ELG-WOA outperformed WOA and Bat Algorithm (BA)
  • Item
    Energy harvesting based on SLIPT in V2V-VLC system under atmospheric weather conditions
    (2022) Refas, Souad Ikram; Acheli, Dalila; Yahia, Selma; Meraihi, Yassine; Ramdane-Cherif, Amar; Benmessaoud Gabis, Asma
  • Item
    Advances in coyote optimization algorithm : variants and applications
    (Springer, 2023) Meraihi, Yassine; Gabis, Asma Benmessaoud; Ramdane-Cherif, Amar; Acheli, Dalila
    Coyote Optimization Algorithm (COA) is a recent population-based technique inspired by the attitude of coyotes in nature. COA has been widely applied to tackle different optimization issues in several areas and has proved its successfulness compared to several methods found in the literature. In this paper, we describe a brief overview of COA and its variants including adjusted and hybridized versions. Additionally, we present COA applications in various fields such as image segmentation, wireless mesh networks, economic dispatch, electric power systems, distributed generation, and other engineering issues. Finally, we recommend some interesting future research areas directions for COA
  • Item
    Strategy of detecting abnormal behaviors by fuzzy logic
    (IEEE, 2017) Chebi, Hocine; Acheli, Dalila; Kesraoui, Mohamed
    This work falls within the framework of the video surveillance research axis. This work falls within the scope of video surveillance. It involves a link between automatic processing and problems related to video surveillance. The job is to analyze video streams coming from a network of surveillance cameras, deployed in an area of interest in order to detect abnormal behavior. Our approach in this article relies on the new application and the use of fuzzy logic in the case of division and fusion of the crowd. The detection of these behaviors will increase the speed of response of the security services in order to perform accurate analysis and detection of events in real time
  • Item
    Heuristic and learning method for obstacle avoidance with mobile robot
    (IEEE, 2020) Lachekhab, Fadhila; Acheli, Dalila; Tadjine, Mohamed; Meraihi, Yassine
    In this paper, a fuzzy controller obstacle avoidance of the mobile robot Pioneer II is proposed. The fuzzy inference system FIS of this controller is performed by two methods: heuristic and reinforcement learning. the manual tuning of the fuzzy control system can be long and difficult. In contrast, reinforcement learning has proven theoretically and practically its ability to automatically optimize some parameters of the FIS. For that, the Fuzzy Actor-Critic Learning algorithm allows the determination of the parameters of the conclusions among of an available set fixed by the operator. The proposed algorithm allows the automatic determination of the parameters of the conclusions of the fuzzy rules. The simulations show that the two controllers (heuristic, RL controller) are able to avoid the different shapes of obstacles contained in known environments, and they show exceptionally good robustness when changing the environment (shape of obstacles, location of obstacles in the environment
  • Item
    Sun trajectory and PV module I–V characteristics estimation using neural networks
    (IEEE, 2017) Miloudi, Lalia; Acheli, Dalila; Kesraoui, Mohamed
  • Item
    Strategy of detections abnormal behavior by fuzzy logic
    (IEEE, 2017) Chebi, Hocine; Acheli, Dalila; Kesraoui, Mohamed