ouvrages et livres

Ouvrages : 

2014

 

1-S. Bitam et A. Mellouk, “ Bio-inspired Routing Protocols for Vehicular Ad Hoc Networks,” Edition Wiley & Sons, ISBN : 978-1-8482-1663-1, DOI: 10.1002/9781119004967, nombre de pages : 160, date de publication : septembre 2014.

 

2013

 

1-N. Khelil, L. Djerou, Apprentissage et adaptation dans les systèmes bio inspirés, ISBN, 978-3-8416-2306-5, Presses académiques francophones.

 

2-N. Khelil, L. Djerou, Optimisation par Essaim de Particules contre le phénomène deRunge, ISBN-13 :978-613-1-5748-7, Maison d'édition : Editions universitairesEuropeans. Site Web: Https: //www.editions-ue.com/.

 

3-N. Khelil, L. Djerou, Intégration numérique 2D basée sur l’intelligence en Essaim,ISBN-13 :978-613-1-56932-6, Maison d'édition : Editions universitaires européennes.Site Web: https ://www.editions-ue.com/

 

2012

 

1-S. Bitam, “Le routage intelligent pour les réseaux mobiles Ad Hoc”, Editions universitaires Européennes Press, Allemagne, ISBN : 978-3-8417-8991-4, nombre de pages : 109, Mars 2012, (publication de thèse de Doctorat).

 

2-Djeffal Abdelhamid, Les machines à vecteurs supports dans l’analyse des bases de données : Techniques d’accélération pour l’analyse des grandes bases de données 2012, Berlin, Allemagne, Presses Académiques Francophones

 

2010

 

1-Cherif Foudil -  Animation comportementale: simulation de foule d'humains virtuels,  Editions Universitaires Européennes (Octobre 2010),       ISBN-10: 6131541213,  ISBN-13: 978-6131541216

 

 

Chapter book : 

2016  

1-Belkacem Khaldi, Cherif Foudil, A Virtual Viscoelastic Based Aggregation Model for Self-organization of Swarm Robots System, , Towards Autonomous Robotic Systems, Jun 2016

 

2-Narimen SAAD, NourEddine Djedi, Recognition of 3D Faces with Missing Parts Based onSIFT and LBP Methods, Chapter Biometric Security and Privacy, Part of the series SignalProcessing for Security Technologies pp 273-297, 24 December 2016, Springer

 

2015

 

1-S. Bitam et A. Mellouk, “Cloud Computing–based Message Dissemination Protocol for Vehicular Ad Hoc Networks,” in Wired/Wireless Internet Communications, Volume 9071 of the series Lecture Notes in Computer Science, Springer, ISBN: 978-3-319-22571-5,

DOI:10.1007/978-3-319-22572-2_3, pp 32-45, 2015.

 

2-Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Benmohammed Mohamed, Weaknesses in Two RFID Authentication Protocols, Codes, Cryptology, and Information Security Lecture Notes in Computer Science Volume 9084,  May 2015

 

2013

 

1-Khaled Khalfaoui, Allaoua Chaoui, Cherif Foudil and Elhillali Kerkouche -

Automatic Generation of SPL Structurally Valid Products Using Graph Transformations Approach in : Modeling Approaches and Algorithms for Advanced Computer Applications, Studies in Computational Intelligence,Springer, Vol 488, April 2013, pp.347-356

ISSN 1860-949X ISSN 1860-9503, ISBN 978-3-319-00559-1 ISBN 978-3-319-00560-7,  DOI 10.1007/978-3-319-00560-7

http://link.springer.com/chapter/10.1007/978-3-319-00560-7_38#page-2

 

2-Noureddine Chikouche, Foudil Cherif and Benmohammed Mohammed -Algebraic Replay Attacks on Authentication in RFID Protocols in: Advances in Security of Information and Communication Networks Volume 381 2013, DOI 10.1007/978-3-642-40597-6

Print ISBN 978-3-642-40596-9,  Publisher Springer Berlin Heidelberg

http://link.springer.com/book/10.1007/978-3-642-40597-6/page/1

 

2012

 

1-S. Bitam, M. Batouche et E-G. Talbi, “A Bees Life Algorithm for Cloud Computing Services Selection,” in Multidisciplinary Computational Intelligence Techniques: Applications in Business, Engineering, and Medicine, (A.B.M.S. Ali, N. Abbadeni, and M. Batouche Ed.), IGI-Global Press, ISBN: 978-1-4666-1830-5, pages de 31 à 46, 2012.

 

2-Khaldi Belgacem, Cherif Foudil -  An Any Logic Agent based model for the Lymph Node Lymphocytes First Humoral Immune Response 2012  International Conference on Bioinformatics and Computationnal Biology (ICBCB 2012) Kuala Lumpur, Malaysia, April, 2012.  Edited by International Proceedings on Computer science and information technology, ISSN 2010-460X, www.ipcsit.com

 

3-L. Djerou, N. Khelil, N.H.Dehimi and M. Batouche, A multilevel thresholding methodbased on multi objective optimization for non-supervised image segmentation,pp.182-201, DOI : 10.4018/978-1-4666-1830-5. ch011,2012

 http://www.igiglobal.com/book/multidisciplinary-computational-intelligencetechniques/62627.

 

4-N. Khelil and L.Djerou, Numerical Integration using swarm intelligence techniques,pp 171-181, DOI :10.4018/978-1-4666-1830-5.ch010,2012. http ://www.igiglobal.com/book/multidisciplinary-computational-intelligence-techniques/62627.

 

5-Nesrine OUANNES, NourEddine DJEDI, Yves DUTHEN and Hervé LUGA, Gaitevolution for humanoid robot in a physically simulated environment. Dans : IntelligentComputer Graphics. Dimitri Plemenos, Georgios Miaoulis (Eds.), Springer(2012).

 

6-Nesrine OUANNES, NourEddine DJEDI, Yves DUTHEN and Hervé LUGA, Followingfood sources by artificial creatures in a virtual ecosystem, in Virtual Worlds – ArtificialEcosystems and Digital Art Exploration book (ISBN 979-10-91245-06-7). Edited by Jean-Claude Heudin 2012.

 

2009

 

1-A. Ouadjaout, Y. Challal, A. Bachir, N. Lasla, M. Bagaa, L. Khelladi, Information Security in Wireless Sensor Networks. Encyclopedia of Ad hoc and Ubiquitous Computing, ISBN: 978-981-283-348-8, Sept 2009. http://www.worldscientific.com/worldscibooks/10.1142/6960

 

2-L. Djerou, N. Khelil, A. Zerarka and M. Batouche, Searching for the best Points of

interpolation using swarm intelligence techniques, chapter book 'Particle swarmoptimization ISBN 978-953-7619-48-0. Itech Education and Publishing, Vienna, Austria.

 

2006

 

1-A. Benslimane, A. Bachir, Ad hoc mobile networks: inter-vehicle geocast. Management, Control and Evolution of IP Networks. ISBN 1905209479, March 2006. http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1905209479.html

 

2004

 

1-A. Bachir, A. Benslimane, Multicast dans les Réseaux Ad hoc, géodiffusion inter véhicules. Chapitre du livre l'Internet Ambiant, pp 215-235, Hermès science publications 2004.

 

Laboratoire de Recherche des Systèmes Experts, Imagerie et leurs Applications dans l’ingénierie " LESIA" Université Mohamed Khider Biskra BP 145 RP, 07000 Biskra, Algérie

Please publish modules in offcanvas position.