Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fatiha Elouaai is active.

Publication


Featured researches published by Fatiha Elouaai.


ieee international colloquium on information science and technology | 2014

The Internet of Things for healthcare monitoring: Security review and proposed solution

Anass Rghioui; Aziza L'aarje; Fatiha Elouaai; Mohammed Bouhorma

The development of the Internet of Things will greatly facilitate the process of patients diagnosis and monitoring, with small IP-based wireless sensors implemented on the patients body, his physiological parameters, such as blood pressure and heart rate, can be monitored remotely and continuously. This scenario must absolutely respect the confidentiality and privacy of patients medical information, only caregivers and authorized persons should possess the right to access these information. The security must be ensured throughout the healthcare application scenario. This paper presents a study of the potential security problems in this application, and proposes a security model as a solution. Our model is based on symmetric cryptography with a proposed key management system and network nodes authentication mechanism.


Next Generation Networks and Services (NGNS), 2014 Fifth International Conference on | 2014

MANET security: An intrusion detection system based on the combination of Negative Selection and danger theory concepts

Anass Khannous; Anass Rghioui; Fatiha Elouaai; Mohammed Bouhorma

Too many researches have been done using artificial immune systems AIS to solve intrusion detection problems due to several reasons. The self and non-self model based on the Negative Selection Algorithm NSA is the dominant model since it is adopted by the vast majority of these researches. However, this model has some problems especially in terms of scalability and coverage. This paper tries to exploit some interesting concepts proposed by the new danger theory to overcome the problems associated with the self and non-self model. That by improving NSA in order to achieve better detection rates by integrating the basic danger concepts. In this approach, the intrusion detection is related to the damage that can occur in the system and that can be caused by both external elements such as internal elements. The proposed algorithm integrates and combines the basic concepts of intrusion detection systems IDS based on the role of T cells described by the negative selection algorithm, with those inspired by the role of dendritic cells to process the alarm signals and to judge thereafter whether there is presence of a dangerous element or not.


new technologies, mobility and security | 2008

Computation of SAR for Two Antennas Used in Mobile Communication Systems: Monopole and Patch

Mohammed Bouhorma; Fatiha Elouaai; A. Mamouni

This paper is a comparative study of several antennas commonly used in cellular telephones. These include a monopole and a patch antenna. Each one of these structures is modeled and numerically tested using HFSS code. The testing procedure involves antenna simulation in the proximity of the human head. The behaviour of each antenna is evaluated for variable distances from the head geometry. Continuous waveform, representative of the sources used in mobile telephones, (250 mW) is used as the form of the antenna excitation. The SAR levels for the head tissues are calculated for and with accordance to the two currently accepted standards: Federal Communications Commission (FCC) and International Commission on Non-Ionizing Radiation Protection (ICNIRP). The computed SAR levels within each of the considered tissues vary for the two antennas under investigation.


International Journal of Computer Applications | 2014

A New Approach to Artificial Immune System for Intrusion Detection of the Mobile Ad Hoc Networks

Anass Khannous; Anass Rghioui; Fatiha Elouaai; Mohammed Bouhorma

The use of artificial immune systems (AIS) in intrusion detection is an attractive concept for several reasons. Then it is judicious to expect that approaches of biological inspirations in this area, and specifically the abstraction of immune defense mechanism with its high detection capabilities and its strong defense against intrusion, will probably be able to meet this challenge. Researchers have implemented different immune models to design intrusion detection systems (IDS) in order to secure Mobile Ad Hoc Networks (MANET), but the most popular one is the self and non-self model. This model was used in the vast majority of biological inspiration in the field of MANET security. It has demonstrated attractive success, as well as it showed some weakness especially in terms of scalability and coverage. This paper try to incorporate some additional concepts proposed by the new danger theory in order to overcome some of the problems related to the adoption of the self and non-selfmodel. The proposed algorithm integrates and combines the basic concepts of intrusion detection system based on the role of T cells described by the negative selection algorithm, with those inspired by the role of dendritic cells to process the alarm signals and to judge thereafter whether there is presence of a dangerous element or not.


international conference on games and virtual worlds for serious applications | 2016

Evaluation-Driven Design for Serious Games, the Multilayer Methodology and Collaborative Framework

Abdelali Slimani; Lotfi Elaachak; Fatiha Elouaai; Mohammed Bouhorma

Serious games are an enjoyable and memorable learning process, they can increase participant interest to make choices and solve problems in order to achieve the learning goals. The multi-layer methodology focuses on design evaluation and collaboration between the expert, designer, and player. This new approach provides an effective assistance and visibility during the achievement of serious games and improves the combination of learning and entertainment fields, although it requires an implementation on a design process to allow the flexible interaction between methodology layers and design phases. In this paper, we define the multilayer methodology and how can actors collaborate to provide an effective design. Finally, we propose the integration of methodology as evaluation stage on the rapid prototyping process.


conference of the industrial electronics society | 2006

Computation of SAR Distributions in a Head Due to a Radiating Dipole Antenna Representing A Hand-Held Mobile Phone

Mohammed Bouhorma; Fatiha Elouaai; Ahmed Mamouni

In this paper, we describe a study of the electromagnetic absorption in the human body for some antennas used for mobile telephones and communication antennas using the finite-difference time-domain (FDTD) electromagnetic simulation approach. We have also have a finite-element (FE) based commercial electromagnetic solver (HFSS) was used for the most part of the study. Various antennas used for cellular phones such as the monopole and dipole antennas have been considered in the investigation. We have also studied the effect of using the widely disparate tissue properties reported in the literature and of using homogeneous and heterogeneous models on the specific absorption rate (SAR) distributions for 1 W of power radiated


Archive | 2009

Design of New Multi Standard Patch Antenna GSM/PCS/UMTS/HIPERLAN for Mobile Cellular Phones

Mohamed Ben Ahmed; Mohammed Bouhorma; Fatiha Elouaai; A. Mamouni


International Journal of Emerging Technologies in Learning (ijet) | 2018

Learning Analytics Through Serious Games: Data Mining Algorithms for Performance Measurement and Improvement Purposes

Abdelali Slimani; Fatiha Elouaai; Lotfi Elaachak; Othman Bakkali Yedri; Mohammed Bouhorma; Mateu Sbert


Archive | 2016

Improving Serious Game Design Through a Descriptive Classification : a Comparation of Methodologies

Abdelali Slimani; Mateu Sbert; Imma Boada; Fatiha Elouaai; Mohammed Bouhorma


International journal of security and its applications | 2016

MANET: Securing AODV Based on a Combined Immune Theories Algorithm (CITA)

Anass Khannous; Fatiha Elouaai; Anass Rghioui; Mohammed Bouhorma

Collaboration


Dive into the Fatiha Elouaai's collaboration.

Top Co-Authors

Avatar

Mohammed Bouhorma

Abdelmalek Essaâdi University

View shared research outputs
Top Co-Authors

Avatar

Anass Rghioui

Abdelmalek Essaâdi University

View shared research outputs
Top Co-Authors

Avatar

Anass Khannous

Abdelmalek Essaâdi University

View shared research outputs
Top Co-Authors

Avatar

A. Mamouni

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lotfi Elaachak

Abdelmalek Essaâdi University

View shared research outputs
Top Co-Authors

Avatar

Mohamed Ben Ahmed

Abdelmalek Essaâdi University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge