-
Implementation of Fuzzy Logic Controller (FLC) for DC-DC Boost Converter Using Matlab/Simulink
Kaoutar Bendaoud,
Salahddine Krit,
Mustapha Kabrane,
Hassan Ouadani,
Mohamed Elaskri,
Khaoula Karimi,
Hicham Elbousty,
Lahoucine Elmaimouni
Issue:
Volume 5, Issue 5-1, September 2017
Pages:
1-5
Received:
21 March 2017
Accepted:
27 March 2017
Published:
15 April 2017
DOI:
10.11648/j.ijssn.s.2017050501.11
Downloads:
Views:
Abstract: Nowadays, DC-DC converters circuits are widely used in electronics systems in order to obtain a stabilized output voltage from a given input DC Voltage. Performance of DC-DC converters is dependent on the choice of control methods. Consequently, controlling of DC-DC converter represents essential task in power conversion.The research problem addressed in this paper is to model a controlling system for Boost DC-DC converter. In this way a logic fuzzy controller is used and simulated using MATLAB/SIMULINK to increase converter efficiency and power efficiency.
Abstract: Nowadays, DC-DC converters circuits are widely used in electronics systems in order to obtain a stabilized output voltage from a given input DC Voltage. Performance of DC-DC converters is dependent on the choice of control methods. Consequently, controlling of DC-DC converter represents essential task in power conversion.The research problem addres...
Show More
-
Energy Efficient in Wireless Sensor Networks Using Cluster-Based Approach Routing
Hassan Oudani,
Salahddine Krit,
Mustapha Kabrane,
Kaoutar Bandaoud,
Mohamed Elaskri,
Khaoula Karimi,
Hicham Elbousty,
Lahoucine Elmaimouni
Issue:
Volume 5, Issue 5-1, September 2017
Pages:
6-12
Received:
22 March 2017
Accepted:
7 April 2017
Published:
13 May 2017
DOI:
10.11648/j.ijssn.s.2017050501.12
Downloads:
Views:
Abstract: In wireless sensor networks, the energy consumed by each node of the network influences the lifetime of the networks, more than the consumption of energy increases more than the lifetime of the networks decreases, this is why the increase of the lifetime of the networks requires a strategy (protocol) which reduces the power consumption of the transmission or reception of data by the sensor nodes. In recent years much research has been done to maximize a life time of network sensor. To deal with this, the hierarchical protocols (Cluster based-approach, chain based-approach) have been developed in order to reduce the network traffic toward the sink and therefore prolong the network lifetime. In this paper, the focus is mainly driven over the survey of the energy-efficient using hierarchical cluster-based approach namely LEACH (Low Energy Adaptive Clustering Hierarchy Protocol), in order to propose a new method to maximize more the life time of network sensor. Our method is to conserve energy consumption when transmitting data to the Base Station (BS). We evaluated the performance of the LEACH protocol with our proposed method simulated, the results of our method are demonstrated by the simulation results using Matlab Simulink.
Abstract: In wireless sensor networks, the energy consumed by each node of the network influences the lifetime of the networks, more than the consumption of energy increases more than the lifetime of the networks decreases, this is why the increase of the lifetime of the networks requires a strategy (protocol) which reduces the power consumption of the trans...
Show More
-
Mining the Web for Learning Ontologies: State of Art and Critical Review
Mohamed El Asikri,
Salahddine Krit,
Hassan Chaib,
Mustapha Kabrane,
Hassan Ouadani,
Khaoula Karimi,
Kaouthar Bendaouad,
Hicham Elbousty
Issue:
Volume 5, Issue 5-1, September 2017
Pages:
13-17
Received:
30 March 2017
Accepted:
7 April 2017
Published:
13 May 2017
DOI:
10.11648/j.ijssn.s.2017050501.13
Downloads:
Views:
Abstract: The aim of the paper is to investigate and present the subject of building ontologies using the Semantic Web Mining that is defined as the combination of the two fast-developing research areas Semantic Web and Web Mining.Web mining is the application of data mining techniques to the content, structure, and usage of Web resources and The Semantic Web is the second-generation WWW, enriched by machine-processable information which supports the user in his tasks.. This can help to discover global as well as local structure “models” or “patterns”within and between Web pages and ontology extraction witch is the automatic or semi-automatic creation of ontologies, including extracting the corresponding domain's terms and the relationships between those concepts, and encoding them with an ontology language for easy retrieval. As building ontologies manually is extremely labor-intensive and time-consuming, there is great motivation to automate the process. This paper gives an overview of where the two areas meet today, and discuss ways of how a closer integration could be profitable.
Abstract: The aim of the paper is to investigate and present the subject of building ontologies using the Semantic Web Mining that is defined as the combination of the two fast-developing research areas Semantic Web and Web Mining.Web mining is the application of data mining techniques to the content, structure, and usage of Web resources and The Semantic We...
Show More
-
Novel Application to Managing Windows Embedded Firewall Programmatically in Network Security
Salah-ddine Krit,
Elbachir Haimoud
Issue:
Volume 5, Issue 5-1, September 2017
Pages:
18-24
Received:
24 March 2017
Accepted:
25 March 2017
Published:
9 June 2017
DOI:
10.11648/j.ijssn.s.2017050501.14
Downloads:
Views:
Abstract: Due to the increasing threat of network attacks, Firewall has become crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is to examine each packet that passes through it and decide whether to letting them pass or halting them based on preconfigured rules and policies, so firewall now is the first defense line against cyber attacks. However most of people doesn't know how firewall works, and the most users of windows operating system doesn't know how to use the windows embedded firewall. This paper explains how firewall works, firewalls types, and all you need to know about firewall policies, then presents a novel application (Quds Wall) developed by authors that manages windows embedded firewall and make it easy to use.
Abstract: Due to the increasing threat of network attacks, Firewall has become crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is to examine each packet that passes through it and decide whether to letting them pass or halting them based on preco...
Show More
-
Security of Hardware Architecture, Design and Performance of Low Drop-Out Voltage Regulator LDO to Protect Power Mobile Applications
Salah-ddine Krit,
Mohamed Benaddy,
Brahim El Habil,
Mourad El Ouali,
Othmane El Meslouhi
Issue:
Volume 5, Issue 5-1, September 2017
Pages:
25-31
Received:
24 March 2017
Accepted:
25 March 2017
Published:
9 June 2017
DOI:
10.11648/j.ijssn.s.2017050501.15
Downloads:
Views:
Abstract: His paper present a new Low Drop-Out Voltage Regulator (LDO) and highlight the topologies and the advantages of the LDO for hardware security protection of Wireless Sensor Networks (WSNs), this integrated circuits are considered as an ideal solution in low power System on-chip applications (SOC) for their compact sizes and low cost. The advancement in low-power design makes it possible that ubiquitous device can be powered by low-power energy source such as ambient energy or small size batteries. In many well supplied devices the problem related to power is essentially related to cost. However for low-powered devices the problem of power is not only economics but also becomes very essential in terms of functionality. Due to the usual very small amount of energy or unstable energy available the way the engineer manages power becomes a key point in this area. Therefore, another focus of this dissertation is to try finding ways to improve the security of power management problems. Complementary metal oxide-semiconductor (CMOS) has become the predominant technology in integrated circuit design due to its high density, power savings and low manufacturing costs. The whole integrated circuit industry will still continue to benefit from the geometric downsizing that comes with every new generation of semiconductor manufacturing processes. Therefore, only several CMOS analog integrated circuit design techniques are proposed for low-powered ubiquitous device in this dissertation. This paper reviews the basics of LDO regulators and discusses the technology advances in the latest generation of LDOs that make them the preferred solution for many points of load power requirements. The paper will also introduce characteristics of CMOS LDO regulators and discuss their unique benefits in portable electronics applications. these new device offer a real advantages for the power management security of new applications mobile. Power efficiency and some practical issues for the CMOS implementation of these LDO structures are discussed.
Abstract: His paper present a new Low Drop-Out Voltage Regulator (LDO) and highlight the topologies and the advantages of the LDO for hardware security protection of Wireless Sensor Networks (WSNs), this integrated circuits are considered as an ideal solution in low power System on-chip applications (SOC) for their compact sizes and low cost. The advancement...
Show More
-
A Mutlipath Routing Algorithm for Wireless Sensor Networks Under Distance and Energy Consumption Constraints for Reliable Data Transmission
Mohamed Benaddy,
Brhim El Habil,
Othmane El Meslouhi,
Salah-ddine. Krit
Issue:
Volume 5, Issue 5-1, September 2017
Pages:
32-35
Received:
23 April 2017
Accepted:
15 May 2017
Published:
11 July 2017
DOI:
10.11648/j.ijssn.s.2017050501.16
Downloads:
Views:
Abstract: Many applications of wireless sensor networks are critical such as, medical, crisis management, environmental, military, transportation, emergency, security applications. These applications require reliable data collection and achievement. Researchers have been investigated in this area proposing many techniques for WSN reliability meet, such as redundancy or retransmission mechanisms or multipaths routing protocols, some of these techniques dont care about the WSN limitation resources such as energy consumption. In this paper we propose a multipath routing algorithm for WSN for reliability data transmission, considering distance and energy consumption constraints.
Abstract: Many applications of wireless sensor networks are critical such as, medical, crisis management, environmental, military, transportation, emergency, security applications. These applications require reliable data collection and achievement. Researchers have been investigated in this area proposing many techniques for WSN reliability meet, such as re...
Show More
-
Health Care Service Through Internet Communication Technology
Issue:
Volume 5, Issue 5-1, September 2017
Pages:
36-39
Received:
29 April 2017
Accepted:
23 June 2017
Published:
11 July 2017
DOI:
10.11648/j.ijssn.s.2017050501.17
Downloads:
Views:
Abstract: The health care is prime issue in India and what is a scenario today is discussed and in a present situation, using technology available today, what can be done and how the situation can be improved and/or managed is explained in this paper. Rural area always lack with resources and infrastructures. The one of the solutions is to use wireless communication system to help the rural population. Major part of India is in remote or rural where the facilities lack. The tele-medicine and remotely operated medical services and its network infrastructure is the solution for the rural India and the best use of Internet communication Technology (ICT) wirelessly, is a solution to provide latest health care facility from world best experts from anywhere.
Abstract: The health care is prime issue in India and what is a scenario today is discussed and in a present situation, using technology available today, what can be done and how the situation can be improved and/or managed is explained in this paper. Rural area always lack with resources and infrastructures. The one of the solutions is to use wireless commu...
Show More