{"id":8773,"date":"2019-01-18T08:30:22","date_gmt":"2019-01-18T10:30:22","guid":{"rendered":"http:\/\/lagh-univ.dz\/laboratoires-des-recherches-lim-production-scientifique-publications\/"},"modified":"2020-02-13T21:04:59","modified_gmt":"2020-02-13T23:04:59","slug":"laboratoires-des-recherches-lim-production-scientifique-publications","status":"publish","type":"page","link":"http:\/\/lagh-univ.dz\/fr\/laboratoires-des-recherches-lim-production-scientifique-publications\/","title":{"rendered":"Laboratoires des recherches- LIM-Production scientifique-Publications"},"content":{"rendered":"<p style=\"text-align: center\"><strong>\u00a0Production scientifique (\u00e9quipe 1)<\/strong><\/p>\n<table class=\" aligncenter\">\n<tbody>\n<tr>\n<td width=\"121\"><strong>Type de publication<\/strong><\/td>\n<td width=\"38\"><strong>Nb<\/strong><\/td>\n<td width=\"255\"><strong>intitul\u00e9e<\/strong><\/td>\n<td width=\"201\"><strong>Journal \/ proceeding<\/strong><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"15\" width=\"121\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Publication<\/strong><\/p>\n<p><strong>internationale<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/td>\n<td rowspan=\"14\" width=\"38\"><strong>15<\/strong><\/td>\n<td width=\"255\">CLPS: context-based location privacy scheme for VANETs<\/td>\n<td width=\"201\">INT J AD HOC UBIQ CO<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">BRT: Bus-Based Routing Technique in Urban Vehicular Networks<\/td>\n<td width=\"201\">IEEE T INTELL TRANSP<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">UAVassisted supporting services connectivity in urban VANETs, 68(4), p 3944-3951<\/td>\n<td width=\"201\">IEEE T VEH TECHNOL<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Leveraging Communicating UAVs for Emergency VehicleGuidance in Urban Areas<\/td>\n<td width=\"201\">IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Routing in Flying Ad hoc Networks: Survey, Constraints and FutureChallenge Perspectives, 5, p 81057-81105<\/td>\n<td width=\"201\">IEEE ACCESS<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">ECaD: Energy-Efficient Routing in Flying Ad hocNetworks,<\/td>\n<td width=\"201\">INT J COMMUN SYST<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">U2RV:UAV-assisted reactive routing protocol for VANETs<\/td>\n<td width=\"201\">INT J COMMUN SYST<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Intelligent UAV-Assisted Routing Protocol for Urban VANETs, 107, p 93-111<\/td>\n<td width=\"201\">COMPUT COMMUN<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">A Survey on Position-based Routing Protocols for Flying Ad hoc Networks (FANETs)<\/td>\n<td width=\"201\">ELSEVIER SCIENCE BV<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">A Distributed Time-limited multicast algorithm for VANETs using incremental power strategy, 145, p 141-155<\/td>\n<td width=\"201\">COMPUT NETW<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Low overhead communication-induced checkpointing protocols ensuring rollback-dependency trackability property: Low overhead CIC protocols ensuring RDT property<\/td>\n<td width=\"201\">CONCURR COMP-PRACT E<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">EPRV: Efficient PseudonymRevocation in VANETs, vol38<\/td>\n<td width=\"201\">AD HOC SENS WIREL NE<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Optimal mobile beacon trajectories for nodes localisation in wireless sensor networks<\/td>\n<td width=\"201\">INT J AD HOC UBIQ CO<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">a novel fault-tolerant K-mutual exclusion\u00a0 algorithm for mobile and opportunistic ad hoc networks, 16(2), pp 176-197<\/td>\n<td width=\"201\">International Journal of Information and communication Technology<\/td>\n<\/tr>\n<tr>\n<td width=\"38\"><strong>\u00a0<\/strong><\/td>\n<td width=\"255\">Carrier Sense with Slotted-ALOHA Multiple Access MAC in Vehicular Network<\/td>\n<td width=\"201\">International Journal of Vehicle Information and Communication Systems<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"121\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Publication nationale<\/strong><\/td>\n<td width=\"38\"><strong>\u00a0<\/strong><\/td>\n<td width=\"255\"><strong>&#8211;<\/strong><\/td>\n<td width=\"201\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"38\"><strong>\u00a0<\/strong><\/td>\n<td width=\"255\"><strong>&#8211;<\/strong><\/td>\n<td width=\"201\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"38\"><strong>\u00a0<\/strong><\/td>\n<td width=\"255\"><strong>&#8211;<\/strong><\/td>\n<td width=\"201\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"4\" width=\"121\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Communication internationale<\/strong><\/td>\n<td rowspan=\"4\" width=\"38\"><strong>4<\/strong><\/td>\n<td width=\"255\">On-Demand Routing for Urban VANETs using Cooperating UAV<\/td>\n<td width=\"201\">2018 International Conference on Smart Communications in Network Technologies (SaCoNeT), AtElOued, Algeria<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">-UAV-assisted reactive routing for urban VANETs<\/td>\n<td width=\"201\">The 32nd ACM SIGAPP Symposium on Applied Computing-2017<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Location privacy scheme for VANETs<\/td>\n<td width=\"201\">International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Energy-Efficient Routing Protocol for Ad Hoc Networks<\/td>\n<td width=\"201\">Conference: International Conference on Engineering and Management Information Systems (ICEMIS 2016), At Agadir, Morocco<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"121\"><strong>Communication nationale<\/strong><\/td>\n<td rowspan=\"2\" width=\"38\"><strong>2<\/strong><\/td>\n<td width=\"255\">Conditional Privacy Preservation for VANET Safety Applications<\/td>\n<td width=\"201\">International Workshop on Cryptography and its Applications &#8211; IWCA\u2019 2016<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Design of an Interface for Authentication through the Electronic Directory Service OpenLDAP<\/td>\n<td width=\"201\">: The 2nd International Conference on Pattern Analysis and Intelligent Systems<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center\"><strong>\u00a0Production scientifique (\u00e9quipe 2)<\/strong><\/p>\n<table width=\"614\">\n<tbody>\n<tr>\n<td width=\"121\"><strong>Type de publication<\/strong><\/td>\n<td width=\"38\"><strong>Nb<\/strong><\/td>\n<td width=\"255\"><strong>intitul\u00e9e<\/strong><\/td>\n<td width=\"201\"><strong>Journal \/ proceeding<\/strong><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"21\" width=\"121\"><strong>\u00a0<\/strong><\/td>\n<td rowspan=\"21\" width=\"38\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>21<\/strong><\/td>\n<td width=\"255\">TFDD: A trust-based framework for reliable data delivery and DoS defense in VANETs<\/td>\n<td width=\"201\">ELSEVIER SCIENCE BV<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Intelligent UAV-assisted routing protocol for urban VANETs.<\/td>\n<td width=\"201\">COMPUT COMMUN<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">UAV-assisted technique for the detection of malicious and selfish nodes in VANETs<\/td>\n<td width=\"201\">ELSEVIER SCIENCE BV<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Renting Out Cloud Services in Mobile Vehicular Cloud<\/td>\n<td width=\"201\">IEEE T VEH TECHNOL<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">A distributed time-limited multicast algorithm for VANETs using incremental power strategy<\/td>\n<td width=\"201\">COMPUT NETW<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">On Link Stability Metric and Fuzzy Quantification for Service Selection in Mobile Vehicular Cloud<\/td>\n<td width=\"201\">IEEE T INTELL TRANSP<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">A MulticonstrainedQoS-Compliant Routing Scheme for Highway-Based Vehicular Networks<\/td>\n<td width=\"201\">WIREL COMMUN MOB COM<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">TACASHI: Trust-Aware Communication Architecture for Social Internet of Vehicles., 6(4): 5870-5877<\/td>\n<td width=\"201\">IEEE INTERNET THINGS<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Optimal mobile beacon trajectories for nodes localisation in wireless sensor networks. 29(1\/2): 64-76<\/td>\n<td width=\"201\">INT J AD HOC UBIQ CO<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">A Trusted Lightweight Communication Strategy for Flying Named Data Networking<\/td>\n<td width=\"201\">SENSORS-BASEL<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">EPRV: Efficient PseudonymRevocation in VANETs<\/td>\n<td width=\"201\">AD HOC SENS WIREL NE<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Low overhead communication-induced checkpointing protocols ensuring rollback-dependency trackability property<\/td>\n<td width=\"201\">CONCURR COMP-PRACT E<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">NextRoute: a lossless model for accurate mobility prediction, 1-21<\/td>\n<td width=\"201\">J AMB INTEL HUM COMP<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">UNION: A trust model distinguishing intentional and UNIntentional misbehavior in inter-UAV communicatiON<\/td>\n<td width=\"201\">J ADV TRANSPORT<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">A Trust Framework to Detect Malicious Nodes in Cognitive Radio Networks<\/td>\n<td width=\"201\">MDPI<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">GeoUAVs: A new geocast routing protocol for fleet of UAVs<\/td>\n<td width=\"201\">COMPUT COMMUN<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Introduction to the Special Section on Recent Advancements in Flying ad hoc Networks<\/td>\n<td width=\"201\">COMPUT ELECTR ENG<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Towards a Trusted Unmanned Aerial System Using Blockchain (BUAS) for the Protection of Critical Infrastructure<\/td>\n<td width=\"201\">T EMERG TELECOMMUN T<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Realization of Blockchain in Named Data Networking-based Internet-of-Vehicles<\/td>\n<td width=\"201\">IT PROF<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Secure and Privacy-Aware Incentives-based Witness Service in Social Internet of Vehicles Clouds<\/td>\n<td width=\"201\">IEEE INTERNET THINGS<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">MyRoute: A Graph-Dependency Based Model for Real-Time Route Prediction<\/td>\n<td width=\"201\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"15\" width=\"121\">\n<p style=\"text-align: center\"><strong>\u00a0<\/strong><\/p>\n<p style=\"text-align: center\"><strong>\u00a0<\/strong><\/p>\n<p style=\"text-align: center\"><strong>Communication internationale<\/strong><\/p>\n<p style=\"text-align: center\"><strong>\u00a0<\/strong><\/p>\n<p style=\"text-align: center\"><strong>\u00a0<\/strong><\/p>\n<p style=\"text-align: center\"><strong>\u00a0<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center\" rowspan=\"15\" width=\"38\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>17<\/strong><\/td>\n<td style=\"text-align: center\" width=\"255\">WeiSTARS: A weighted trust-aware relay selection scheme for VANET<\/td>\n<td style=\"text-align: center\" width=\"201\">2017 IEEE International Conference on Communications (ICC)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Vehicular Cloud Service Provider Selection: A Flexible Approach<\/td>\n<td width=\"201\">GLOBECOM 2017 &#8211; 2017 IEEE Global Communications Conference<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">On the Human Factor Consideration for VANETs Security Based on Social Networks<\/td>\n<td width=\"201\">2018 IEEE International Conference on Communications (ICC)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">LocRec: Rule-Based Successive Location Recommendation in LBSN<\/td>\n<td width=\"201\">2018 IEEE International Conference on Communications (ICC)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">GSS-VC: A game-theoretic approach for service selection in vehicular cloud<\/td>\n<td width=\"201\">15th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Behavior-aware UAV-assisted crowd sensing technique for urban vehicular environments<\/td>\n<td width=\"201\">15th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">PUBLISH: A Distributed Service Advertising Scheme for Vehicular Cloud Networks<\/td>\n<td width=\"201\">16th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">A New Machine Learning-based Collaborative DDoS Mitigation Mechanism in Software-Defined Network<\/td>\n<td width=\"201\">14 th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">On the Design, Development and Implementation of Trust Evaluation Mechanism in Vehicular Networks<\/td>\n<td width=\"201\">16th ACS\/IEEE International Conference on Computer Systems and Applications AICCSA<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Container-based Sandboxes for Malware Analysis: A Compromise Worth Considering<\/td>\n<td width=\"201\">\u00a012th IEEE\/ACM International Conference on Utility and Cloud Computing UCC<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">An EEG Based Key Generation Cryptosystem using Diffie-Hellman And AES<\/td>\n<td width=\"201\">2nd IEEE Middle East &amp; North Africa COMMunications Conference MENACOMM<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data Networking<\/td>\n<td width=\"201\">28th International Conference on Computer Communications and Networks (ICCCN)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Reputation-aware energy-efficient solution for FANET monitoring<\/td>\n<td width=\"201\">10th IFIP Wireless and Mobile Networking Conference (WMNC)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Fuzzy clustering for misbehavior detection in VANET<\/td>\n<td width=\"201\">7 th IEEE International Conference\u00a0 on\u00a0 Smart Communications in\u00a0 Network\u00a0 Technologies\u00a0 (SACONET)<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">Blockchain in Internet-of-Things: Architecture, Applications and Research Directions<\/td>\n<td width=\"201\">2019 International Conference on Computer and Information Sciences (ICCIS)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p dir=\"ltr\" style=\"text-align: center\"><strong>\u00a0Production scientifique (\u00e9quipe 3)<\/strong><\/p>\n<table style=\"height: 3656px\" width=\"619\">\n<tbody>\n<tr style=\"height: 80px\">\n<td style=\"text-align: center;height: 80px;width: 126px\"><strong>Type de publication<\/strong><\/td>\n<td style=\"text-align: center;height: 80px;width: 23px\"><strong>Nb<\/strong><\/td>\n<td style=\"text-align: center;height: 80px;width: 324px\"><strong>intitul\u00e9e<\/strong><\/td>\n<td style=\"text-align: center;height: 80px;width: 118px\"><strong>Journal \/ proceeding<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 120px\">\n<td style=\"text-align: center;height: 1336px;width: 126px\" rowspan=\"12\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Publication<\/strong><\/p>\n<p><strong>internationale<\/strong><\/td>\n<td style=\"text-align: center;height: 1336px;width: 23px\" rowspan=\"12\"><strong>\u00a0<\/strong><\/td>\n<td style=\"text-align: center;height: 120px;width: 324px\">Efficient geometric-based computation of the string subsequence kernel 32(2): 532-559<\/td>\n<td style=\"text-align: center;height: 120px;width: 118px\">DATA MIN KNOWL DISC<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"text-align: center;height: 104px;width: 324px\">From Tree Automata to Rational Tree Expressions. Int. J. Found. Comput. Sci. 29(6): 1045-1062<\/td>\n<td style=\"text-align: center;height: 104px;width: 118px\">INT J FOUND COMPUT S<\/td>\n<\/tr>\n<tr style=\"height: 80px\">\n<td style=\"text-align: center;height: 80px;width: 324px\">Crowdsourcing for Arabic Speech Corpus Annotation<\/td>\n<td style=\"text-align: center;height: 80px;width: 118px\">ProcediaComput<\/td>\n<\/tr>\n<tr style=\"height: 80px\">\n<td style=\"text-align: center;height: 80px;width: 324px\">Tree pattern matching from regular tree expressions. Kybernetika 54 (2), pp 221-242,<\/td>\n<td style=\"text-align: center;height: 80px;width: 118px\">KYBERNETIKA<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"text-align: center;height: 104px;width: 324px\">From Tree Automata to String Automata Minimization. Theory Comput. Syst. 62(5): 1203-1222<\/td>\n<td style=\"text-align: center;height: 104px;width: 118px\">THEOR COMPUT SYST<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"text-align: center;height: 104px;width: 324px\">A formal seriesbasedunication of the frequent itemset mining approaches. Knowl. Inf.Syst. 53(2): 439-477 (2017)<\/td>\n<td style=\"text-align: center;height: 104px;width: 118px\">KNOWL INF SYST<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"text-align: center;height: 104px;width: 324px\">Altruistic Crowdsourcing for Arabic Speech Corpus Annotation Procedia Computer Science by ELSEVIER, ACLING 2017: 137-144<\/td>\n<td style=\"text-align: center;height: 104px;width: 118px\">Procedia Computer Science<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"text-align: center;height: 104px;width: 324px\">2L-APD: A Two-Level Plagiarism Detection System for Arabic Documents.Cybernetics and Information Technologies, 18(1).<\/td>\n<td style=\"text-align: center;height: 104px;width: 118px\">Cybernetics and Information Technologies<\/td>\n<\/tr>\n<tr style=\"height: 128px\">\n<td style=\"text-align: center;height: 128px;width: 324px\">EfficientImplementation for DeterministicFiniteTreeAutomataMinimization. 24(4): 311-322<\/td>\n<td style=\"text-align: center;height: 128px;width: 118px\">Journal of Computing and Information Technology<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"text-align: center;height: 104px;width: 324px\">Prosody-based spoken Algerian Arabic dialect identification. Procedia Computer Science, 2018, vol. 128, p. 9-17.<\/td>\n<td style=\"text-align: center;height: 104px;width: 118px\">Procedia Computer Science<\/td>\n<\/tr>\n<tr style=\"height: 152px\">\n<td style=\"text-align: center;height: 152px;width: 324px\">AntMeans: A New Hybrid Algorithm based on Ant Colonies for Complex<br \/>\nData Mining, International Journal of Computer Applications IJCA<br \/>\nVol.60 (17): pp. 6 12,<\/td>\n<td style=\"text-align: center;height: 152px;width: 118px\">International Journal of Computers and Applications<\/td>\n<\/tr>\n<tr style=\"height: 152px\">\n<td style=\"text-align: center;height: 152px;width: 324px\">Algorithm and separating method for the optimisation of quadratic functions. IJCSM 8(2): 183-192 (2017)<\/td>\n<td style=\"text-align: center;height: 152px;width: 118px\">International Journal of Computing Science and Mathematics<\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"text-align: center;height: 168px;width: 126px\" rowspan=\"3\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Publication nationale<\/strong><\/td>\n<td style=\"text-align: center;height: 168px;width: 23px\" rowspan=\"3\"><strong>\u00a0<\/strong><\/td>\n<td style=\"text-align: center;height: 56px;width: 324px\">&#8211;<\/td>\n<td style=\"text-align: center;height: 56px;width: 118px\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"text-align: center;height: 56px;width: 324px\">&#8211;<\/td>\n<td style=\"text-align: center;height: 56px;width: 118px\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"text-align: center;height: 56px;width: 324px\">&#8211;<\/td>\n<td style=\"text-align: center;height: 56px;width: 118px\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 80px\">\n<td style=\"text-align: center;height: 1896px;width: 126px\" rowspan=\"12\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Communication internationale<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/td>\n<td style=\"text-align: center;height: 1640px;width: 23px\" rowspan=\"10\"><strong>12<\/strong><\/td>\n<td style=\"text-align: center;height: 80px;width: 324px\">Toward a Web-based Speech Corpus for Algerian Arabic Dialectal Varieties<\/td>\n<td style=\"text-align: center;height: 80px;width: 118px\">EACL European ACL\u00a0 (WANLP)<\/td>\n<\/tr>\n<tr style=\"height: 176px\">\n<td style=\"text-align: center;height: 176px;width: 324px\">Efficient inverted index with n-gram sampling for string matching in Arabic documents<\/td>\n<td style=\"text-align: center;height: 176px;width: 118px\">ACS\/IEEE International Conference on Computer Systems and Applications<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"text-align: center;height: 104px;width: 324px\">Toward a Rich Arabic Speech Parallel Corpus for Algerian Sub-Dialects<\/td>\n<td style=\"text-align: center;height: 104px;width: 118px\">LREC&rsquo;16, (OSACT2). Portoroz<\/td>\n<\/tr>\n<tr style=\"height: 128px\">\n<td style=\"text-align: center;height: 128px;width: 324px\">Enhencing the semantic Similarity for Arabic Sentences with vectors Weighting<\/td>\n<td style=\"text-align: center;height: 128px;width: 118px\">SEMEval International WorkSHOP on Semantic<\/td>\n<\/tr>\n<tr style=\"height: 200px\">\n<td style=\"text-align: center;height: 200px;width: 324px\">WeightedAutomataSequenceKernel.<\/td>\n<td style=\"text-align: center;height: 200px;width: 118px\">9th International Conference on Machine Learning and Computing Singapore<\/td>\n<\/tr>\n<tr style=\"height: 152px\">\n<td style=\"text-align: center;height: 152px;width: 324px\">Word Embedding-Based Approaches for Measuring Semantic Similarity of\u00a0 arabic documents<\/td>\n<td style=\"text-align: center;height: 152px;width: 118px\">6th International Conference on Arabic Language Processing<\/td>\n<\/tr>\n<tr style=\"height: 176px\">\n<td style=\"text-align: center;height: 176px;width: 324px\">Toward Integrals of Rational Tree Expression<\/td>\n<td style=\"text-align: center;height: 176px;width: 118px\">Conference-School on Discrete Mathematics and Computer Science<\/td>\n<\/tr>\n<tr style=\"height: 176px\">\n<td style=\"text-align: center;height: 176px;width: 324px\">Toward Integrals of Rational Tree Expression<\/td>\n<td style=\"text-align: center;height: 176px;width: 118px\">Conference-School on Discrete Mathematics and Computer Science<\/td>\n<\/tr>\n<tr style=\"height: 224px\">\n<td style=\"text-align: center;height: 224px;width: 324px\">plagiarism detection in arabic text documents<\/td>\n<td style=\"text-align: center;height: 224px;width: 118px\">2nd IEEE International Conference on Natural Language and Speech Processing, 2018, Algiers<\/td>\n<\/tr>\n<tr style=\"height: 224px\">\n<td style=\"text-align: center;height: 224px;width: 324px\">Spoken Arabic Algerian Dialect Identification.<\/td>\n<td style=\"text-align: center;height: 224px;width: 118px\">2nd IEEE International Conference on Natural Language and Speech Processing, 2018, Algiers<\/td>\n<\/tr>\n<tr style=\"height: 176px\">\n<td style=\"text-align: center;height: 256px;width: 23px\" rowspan=\"2\"><strong>\u00a0<\/strong><\/td>\n<td style=\"text-align: center;height: 176px;width: 324px\">Semantic\u00a0 Similarity of arabic Sentences with word Embedding<\/td>\n<td style=\"text-align: center;height: 176px;width: 118px\">2nd Workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS)<\/td>\n<\/tr>\n<tr style=\"height: 80px\">\n<td style=\"text-align: center;height: 80px;width: 324px\">Think Before Your Click: Data and Models for Adult Content in Arabic Twitter<\/td>\n<td style=\"text-align: center;height: 80px;width: 118px\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 176px\">\n<td style=\"text-align: center;height: 176px;width: 126px\">\n<p style=\"text-align: left\"><strong>Communication nationale<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center;height: 176px;width: 23px\"><strong>\u00a0<\/strong><\/td>\n<td style=\"text-align: center;height: 176px;width: 324px\">Bloom Taxonomy<\/td>\n<td style=\"text-align: center;height: 176px;width: 118px\">Towards New Practices in Learning &amp; Teaching in Higher Algerian Education<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p dir=\"ltr\" style=\"text-align: center\"><strong>\u00a0Production scientifique (\u00e9quipe 4)<\/strong><\/p>\n<table style=\"height: 872px\">\n<tbody>\n<tr style=\"height: 80px\">\n<td style=\"width: 126px;height: 80px;text-align: center\"><strong>Type de publication<\/strong><\/td>\n<td style=\"width: 38px;height: 80px;text-align: center\"><strong>Nb<\/strong><\/td>\n<td style=\"width: 255px;height: 80px;text-align: center\">\n<p dir=\"ltr\" style=\"text-align: center\"><strong>intitul\u00e9e<\/strong><\/p>\n<\/td>\n<td style=\"width: 201px;height: 80px;text-align: center\"><strong>Journal \/ proceeding<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"width: 126px;height: 368px;text-align: center\" rowspan=\"4\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Publication<\/strong><\/p>\n<p><strong>internationale<\/strong><\/td>\n<td style=\"width: 38px;height: 368px;text-align: center\" rowspan=\"4\"><strong>4<\/strong><\/td>\n<td style=\"width: 255px;height: 104px;text-align: center\">MAXPART: An efficient search-space pruning approach to vertical partitioning<\/td>\n<td style=\"width: 201px;height: 104px;text-align: center\">COMPUT INFORM<\/td>\n<\/tr>\n<tr style=\"height: 80px\">\n<td style=\"width: 255px;height: 80px;text-align: center\">Textual aggregation approaches in OLAP context: A survey,<\/td>\n<td style=\"width: 201px;height: 80px;text-align: center\">INT J INFORM MANAGE<\/td>\n<\/tr>\n<tr style=\"height: 80px\">\n<td style=\"width: 255px;height: 80px;text-align: center\">Efficiently mining frequent itemsets applied for textual aggregation<\/td>\n<td style=\"width: 201px;height: 80px;text-align: center\">APPL INTELL<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"width: 255px;height: 104px;text-align: center\">OLAP Textual Aggregation Approach using the Google Similarity Distance.<\/td>\n<td style=\"width: 201px;height: 104px;text-align: center\">&nbsp;<\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"width: 126px;height: 168px;text-align: center\" rowspan=\"3\"><strong>\u00a0<\/strong><\/p>\n<p><strong>Publication nationale<\/strong><\/td>\n<td style=\"width: 38px;height: 168px;text-align: center\" rowspan=\"3\"><strong>\u00a0<\/strong><\/td>\n<td style=\"width: 255px;height: 56px;text-align: center\"><strong>&#8211;<\/strong><\/td>\n<td style=\"width: 201px;height: 56px;text-align: center\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"width: 255px;height: 56px;text-align: center\"><strong>&#8211;<\/strong><\/td>\n<td style=\"width: 201px;height: 56px;text-align: center\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 56px\">\n<td style=\"width: 255px;height: 56px;text-align: center\"><strong>&#8211;<\/strong><\/td>\n<td style=\"width: 201px;height: 56px;text-align: center\"><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 128px\">\n<td style=\"width: 126px;height: 256px;text-align: center\" rowspan=\"2\"><strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Communication internationale<\/strong><\/td>\n<td style=\"width: 38px;height: 256px;text-align: center\" rowspan=\"2\"><strong>2<\/strong><\/td>\n<td style=\"width: 255px;height: 128px;text-align: center\">GOTA: Using the Google Similarity Distance for OLAP Textual Aggregation<\/td>\n<td style=\"width: 201px;height: 128px;text-align: center\">the 17th International Conference on Enterprise Information Systems (ICEIS)<\/td>\n<\/tr>\n<tr style=\"height: 128px\">\n<td style=\"width: 255px;height: 128px;text-align: center\">A New Tool for Textual Aggregation In Information Retrieval<\/td>\n<td style=\"width: 201px;height: 128px;text-align: center\">The 18th International Conference on Enterprise Information Systems (ICEIS 2016,\u00a0 Rome, Italy.)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Production scientifique (\u00e9quipe 1) Type de publication Nb intitul\u00e9e Journal \/ proceeding \u00a0 Publication internationale \u00a0 \u00a0 15 CLPS: context-based location privacy scheme for VANETs INT J AD HOC UBIQ CO BRT: Bus-Based Routing Technique in Urban Vehicular Networks IEEE T INTELL TRANSP UAVassisted supporting services connectivity in urban VANETs, 68(4), p 3944-3951 IEEE T [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"coauthors":[530],"class_list":["post-8773","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/lagh-univ.dz\/fr\/wp-json\/wp\/v2\/pages\/8773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/lagh-univ.dz\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/lagh-univ.dz\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/lagh-univ.dz\/fr\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"http:\/\/lagh-univ.dz\/fr\/wp-json\/wp\/v2\/comments?post=8773"}],"version-history":[{"count":3,"href":"http:\/\/lagh-univ.dz\/fr\/wp-json\/wp\/v2\/pages\/8773\/revisions"}],"predecessor-version":[{"id":26230,"href":"http:\/\/lagh-univ.dz\/fr\/wp-json\/wp\/v2\/pages\/8773\/revisions\/26230"}],"wp:attachment":[{"href":"http:\/\/lagh-univ.dz\/fr\/wp-json\/wp\/v2\/media?parent=8773"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"http:\/\/lagh-univ.dz\/fr\/wp-json\/wp\/v2\/coauthors?post=8773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}