Publications Scientifiques

Permanent URI for this communityhttps://dspace.univ-boumerdes.dz/handle/123456789/10

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    SISO modelling of a web server to be controlled by a feedback control scheme
    (IEEE, 2011) Badaoui, A.; Loudini, M.; Hidouci, W.-K.
    Performance modeling is an important topic in overload control for web servers. Several attempts have been made to create performance models for web servers. The paper describes modeling a Web server to be controlled by Feedback control scheme. Feedback command theory was initially used to control of industrial processes. Its use for the control of performance software is recent. It provides a number of mathematical tools which can be used to analyze the stability of the commanded system and find the best adjustment that responds to the performance criteria. Our approach proceeds in two steps: system identification and controller design. In system identification, we construct mathematical models of the target system in forms of discrete transfer function focused on single-input single-output (SISO) systems. The role of controller is to modify the transfer function of the target system with regard to the control error between the reference value and the output value
  • Item
    A distributed intrusion detection model based on a society of intelligent mobile agents for ad hoc network
    (IEEE, 2011) Bourkache, G.; Mezghiche, Mohamed; Tamine, K
    The evolution of wireless network technologies and the recent advances in mobile computing hardware have made possible the introduction of various applications in mobile adhoc networks. Not only is the infrastructure of these networks inherently vulnerable but they have increased requirements regarding their security as well. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient regarding security, we need a second line of defence, Intrusion Detection. The focus of this paper is on distributed and intelligent intrusion detection. We propose a model for building a distributed and behavioural intrusion detection system by using a classification method.