- Electromagnetic Compatibility and Noise Suppression
- Lightning and Electromagnetic Phenomena
- Power Line Communications and Noise
- Mobile Ad Hoc Networks
- Thermal Analysis in Power Transmission
- Energy Efficient Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Differential Equations and Numerical Methods
- Numerical methods for differential equations
- Quantum Information and Cryptography
- Advanced Wireless Communication Techniques
- Cardiovascular Disease and Adiposity
- Nonlinear Differential Equations Analysis
- Microwave Engineering and Waveguides
- Privacy, Security, and Data Protection
- Biological Activity of Diterpenoids and Biflavonoids
- Advanced Photonic Communication Systems
- Advanced Optical Network Technologies
- IoT and Edge/Fog Computing
- Optical Network Technologies
- Security in Wireless Sensor Networks
- Quantum optics and atomic interactions
- Electromagnetic Simulation and Numerical Methods
- Advanced Malware Detection Techniques
- Pomegranate: compositions and health benefits
University of Carthage
2010-2024
University of Ha'il
2020-2024
University of Gafsa
2020
Carthage College
2015
Institut Supérieur des Études Technologiques en Communications de Tunis
2010
Tunis University
2007
Internet of things (IoT) is one the leading technologies that have been used in many fields, such as environmental monitoring, healthcare, and smart cities. The core IoT sensors; sensors form an autonomous network able to route messages from place another base station or sink. Recently, due rapid technological development sensors, wireless sensor networks (WSNs) become important part IoT. However, applications cities, WSNs with sink might not be suitable limited communication range wide area...
Wireless Sensor Networks (WSN) can be part of a tremendous number applications. Many WSN applications require real-time communication where the sensed data have to delivered sink node within predetermined deadline decided by application. In WSNs, sensor nodes' constrained resources (e.g. memory and power) lossy wireless links, give rise significant difficulties in supporting addition, many routing algorithms strongly emphasize energy efficiency, while delay is not primary concern. Thus, WSNs...
Abstract Human centric computing is a technique that gaining more attention nowadays and integrates innovative processing methods for analyzing extensive data collection. intelligent systems focus on handling the interactions between customers, companies, communities of to represent social institutional concepts effectively. However, this interaction companies customers will lead various privacy challenges in human systems. This paper briefly studies cyber‐physical In parallel, article...
It is important for designers to know if crosstalk problems may arise in their final designs. An analytical expression calculate the would help circuit locate pair of lines which most sensitive interference. In this paper, we propose a simple and easy technique reduce between three-PCB traces transmission lines. We used rectangular cross-section conductors immersed an inhomogeneous medium. First, present two electric equivalent models three-conductor These allow us conductors. Secondly,...
Buffering in all-optical networks is an important need and there are several approaches that have attempted to propose partial solutions, since optical memories out of reach, nowadays. In this paper, we review the major based on architectures using fixed length fiber delay lines (FDL). The main idea these lead packets profit from transmitting time transmitted signals. Secondly, study less bulky a combination components. principle systems transmit signal over specified path depending required...
The computer security has become a major challenge.Tools and mechanisms have been developed to ensure level of compliance.These include the Intrusion Detection Systems (IDS).The principle conventional IDS is detect attempts attack network identify abnormal activities behaviors.The reasons, including uncertainty in searching for types attacks increasing complexity advanced cyber-attacks, calls need integration methods such as Deep Neuron Networks (DNN) Recurring (RNN) more precisely long-term...
Recently, the demand for reliable and high-speed wireless communication has rapidly increased. Orthogonal frequency division multiplexing (OFDM) is a modulation scheme that newest competitor against other schemes used this purpose. OFDM mostly data transfer, although it may also be cable fiber optic connections. However, in many applications, suffers from burst errors high bit error rates. This paper presents utilization of helical interleaver with systems to efficiently handle channel allow...
In this paper we propose a rigorous method to evaluate the crosstalk performance for coupled non uniform transmission lines. method, width of line is subdivided into large number rigorously narrow So, lines can be considered as multi-conductor line. An electric equivalent model developed calculate between Determination per-unit length capacitance and inductance parameters introduced. Finally, demonstrate that give best in term compared microstrip
In this study, to valorize the pomegranate peels, phytochemical composition of methanolic extract Punica granatum L. peel (PPME) was characterized by high-resolution liquid chromatographymass spectrometry (LC/HRMS), while mineral determined ICP AES.In extract, thirty-five different compounds were identified LC/HRMS, and it that these mainly terpenoids, lipids flavonoids.Total polyphenol, flavonoid, tannins contents PPME as 211.43 mg GAE/g 20.7 QE/g flavonoids 11.5 TEA/g tannins.In order...
In this paper, we examine the oscillatory behavior of solutions to a class half-linear third-order dynamic equations with deviating arguments α2(η)ϕδ2α1ηϕδ1uΔ(η)ΔΔ+p(η)ϕδu(g(η))=0, on an arbitrary unbounded-above time scale T, where η∈[η0,∞)T:=[η0,∞)∩T, η0≥0, η0∈T and ϕζ(w):=wζsgnw, ζ>0. Using integral mean approach known Riccati transform methodology, several improved Hille-type Ohriska-type oscillation criteria have been derived that do not require some restrictive assumptions in...
In this work, we propose three electric equivalent models to evaluate crosstalk between three-conductor transmission lines. We used conductors with circular cylindrical and rectangular cross-section immersed in homogenous medium. First, present proposed for Secondly, develop rigorous equations calculate the per-unit length inductive capacitive parameters. These allow us conductors. Finally, validate presented models, compare theoretical results simulation data. Obtained show that can be...
Electromagnetic coupling to cables has been a major source of electromagnetic compatibility and interference problems. In this paper, we propose simple easy technique reduce crosstalk between three-conductor transmission lines. We used ribbon cable with circular cylindrical section immersed in homogeneous medium. First, present two electric equivalent models for These allow us calculate conductors. Secondly, validate the presented models, compare theoretical results simulation data. Finally,...
The HealthCare (HC) industry has to maintain a large sum of critical medical data. For securing the storage those data, BlockChain (BC) is used; however, authorized user cannot easily access original and it also encompasses capacity issue. Although external DataBase (DB) in BC technology considered by current research methodologies, unsecure. To tackle issues, this paper secured diagnosed Parkinson's Disease (PD) data utilizing 2E2C algorithm. This work takes store detect status patients....
In this paper, three electric equivalent models to evaluate crosstalk between three-conductor transmission lines are proposed. First, for presented. Secondly, rigorous equations calculate the per-unit length inductive and capacitive parameters developed. These allow us conductors. Finally, validate presented models, we compare theoretical results with simulation data. Obtained show that proposed can be used predict performance.
In this paper, a crosstalk reduction technique is proposed which utilizes nonuniform transmission lines. We investigate the effect of line on by simulation. also present comparison between coupled lines with uniform and structures. Results show that using guard reduces more than 10db.
In this study, we extended and improved the oscillation criteria previously established for second-order differential equations to even-order equations. Some examples are given demonstrate significance of results accomplished.
In this paper Theoretical approach to study crosstalk between three conductor transmission lines is developed. Methods for prediction of microstrip are reviewed. Equations derived which can be solved obtain formulas the near-end and far-end nonuniform lines.
In this paper the crosstalk between nonuniform transmission lines is examined. Firstly, methods for prediction of microstrip are reviewed. Classical coupled line theory used uniform and cannot be lines. Secondly, equations derived which can solved to obtain formulas near-end far-end Finally, an example worked illustrates three conductor Obtained theoretical results were compared with simulations data. Comparison shown that simulation approximately same.
The possibility of teleporting a single-qubit system in an atomic that interacts with deformed cavity mode is being discussed. average fidelity used to investigate the quality teleported information either ideal or cavity. quantum Fisher as estimator for weight and phase angle parameters initial input state. study shows maximizing/minimizing estimation degree depends on state settings system, dipole–dipole coupling, estimated parameters. To maximize presence cavity, one has set large values...
Abnormal or excessive excess of intraperitoneal fat at different anatomical sites (heart, kidneys, liver, etc.) alters the metabolic profile by generating diseases causing cardiovascular complications. These include hepatic steatosis, which requires being increased surveillance before its severe progression to cirrhosis and Our objective in this study (in-vivo) was propose a new approach characterize quanti-fy fat. Then, differentiated patients with dis-eases, obesity, Type 2 diabetes (T2D),...