OALib Journal期刊

ISSN: 2333-9721



匹配条件: “ Hanane Hammaoui” ,找到相关结果约75条。
Desmoid Tumor of the Pelvis in Children: One Case Report  [PDF]
Hana El Mansouri, Amal Zourair, Hanane Hammaoui, Salma Amouzoune, Ibtissam Zouita, Dounia Basraoui, Hanane Rais, Hicham Jalal
Open Access Library Journal (OALib Journal) , 2019, DOI: 10.4236/oalib.1105122
Desmoid tumors are invasive and aggressive deep fibromatosis rare in children. They occur in muscles, their sheaths and fasciae. Medical imaging (CT and MRI) can suggest the diagnosis, guide the therapeutic management and the follow-up. We report a pediatric case of desmoid tumor of the pelvis through which we describe the clinical and radiological appearance of these tumors in children.
Historical View of Maghnia Speech Community  [PDF]
Hanane Rabahi
Open Journal of Modern Linguistics (OJML) , 2016, DOI: 10.4236/ojml.2016.62011
Abstract: This article is to shed some light on the socio-cultural and linguistic profiles of Maghnia speech community and that this homogeneous society has a shared linguistic system and norms, although the use of language differs depending on certain social parameters including gender, age and the educational background. In other terms, Maghnia speakers share the same religious principles, language and history. Maghnia speech community in particular has been influenced by many social and political factors throughout its history. The main factor which makes this society different is its geographical location and contact with Morocco.
Higher Coxeter graphs associated to affine su(3) modular invariants
D. Hammaoui,G. Schieber,E. H. Tahri
Mathematics , 2004, DOI: 10.1088/0305-4470/38/38/007
Abstract: The affine $su(3)$ modular invariant partition functions in 2d RCFT are associated with a set of generalized Coxeter graphs. These partition functions fall into two classes, the block-diagonal (Type I) and the non block-diagonal (Type II) cases, associated, from spectral properties, to the subsets of subgroup and module graphs respectively. We introduce a modular operator $\hat{T}$ taking values on the set of vertices of the subgroup graphs. It allows us to obtain easily the associated Type I partition functions. We also show that all Type II partition functions are obtained by the action of suitable twists $\vartheta$ on the set of vertices of the subgroup graphs. These twists have to preserve the values of the modular operator $\hat{T}$.
Elaboration and Characterization of AuCl Semiconductor Nanocrystals Embedded in KCL Single Crystals  [PDF]
Fouzia Zehani, Miloud Sebais, Hanane Zaioune
Journal of Modern Physics (JMP) , 2012, DOI: 10.4236/jmp.2012.37073
Abstract: In this work, we investigated the structural and the optical properties of AuCl semiconductor nanocrystals embedded in KCl single crystals. The AuCl nanocrystals were obtained by doping the KCl crystalline matrix with gold using the Czochralski method. The X-ray diffraction showed the formation of the AuCl nanocrystals in KCl with a tetragonal structure. The average radius of the AuCl nanocrystals is estimated using the Scherrer formula. The photoluminescence spectra presented a band emission situated at 580 nm leading to the formation of the AuCl nanocrystals within KCl.
Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method
Hanane Houmani,Mohamed Mejri
Journal of Computer Networks and Communications , 2012, DOI: 10.1155/2012/254942
Abstract: Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy) property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis. 1. Motivations and Background Intuitively, cryptographic protocols are communication protocols that involve cryptography to reach some specific security goals (authentication, secrecy, etc.). Today, these protocols are playing a key role in our daily life. Among others, they protect our banking transactions (e-commerce protocol), our access to private wired and wireless network, and our access to a variety of indispensable services (web, FTP, e-mail, etc.). Obviously, any flaws in such protocols can have heavy negative consequences on individuals and organizations. It is also a well-known fact that attacks exploiting cryptographic protocols flaws are generally very difficult to detect: tools such as intrusion detections and firewalls are helpless against them since it is difficult (even impossible some-times) to distinguish between legitimate and illegitimate users when the cryptographic protocol is flawed. Like any sensitive system, cryptographic protocols need to be seriously studied and their correctness should be rigorously analyzed and ideally proved. For that reason, formal specification and verification of security protocols have received much attention in recent years. Some of these works including comparative studies could be found in [1–10]. Today and after more of thirty years of hard work, international community has a better understanding of cryptographic protocols and better
Risk Management for ISO 27005 Decision support
International Journal of Innovative Research in Science, Engineering and Technology , 2013,
Abstract: The security of information systems focuses on raising the level of business security while aligning with its strategy and objectives. The family of ISO 2700x, whose theme is: Information technology - Security techniques, allows taking into account all of these security problems, by offering a pack of uniform and standards that respect the continuous improvement cycle PDCA. Being closely linked to the security of information systems, the risk management consists of assessing the uncertainty of the future to make the best decision possible today. Risk management and all decision processes fall within this problematic. The decision making on the Information security risk management requires taking into account an increasing amount of data of different types and qualities. As a result, risk managers increasingly use computers to provide powerful tools for decision support. The aim of this article is to make an overview of the ISO 2700x, focusing more particularly on the content of the ISO 27005 standard, dedicated to information security risk management. In this context, a UML modeling of the processes of ISO 27005 is presented as an improvement of this modeling by criteria and indicators that support the quality of decision making in various decision points. This is the vision of increasing the efficiency and effectiveness of decision making process.
Non-Functional Properties in Service Oriented Architecture – A Consumer's Perspective
Hanane Becha,Daniel Amyot
Journal of Software , 2012, DOI: 10.4304/jsw.7.3.575-587
Abstract: Information about non-functional properties (NFPs) is rarely explicitly described in Service Oriented Architecture (SOA) services. In particular, there is still no standardized solution addressing what service providers should expose or advertise as NFPs in service descriptions to empower service consumers to decide whether a given service suits best their needs or not. Our goal is to define a catalogue of generic (i.e., domain independent) non-functional properties to be considered when service descriptions are developed. This catalogue should be used to better characterize services and enable consumers to perform advanced applications such as NFP-aware service selection. We have identified an initial catalogue of SOA-related NFPs that are relevant from the perspective of consumers (as opposed to providers). Then, we have designed an online survey and invited international SOA experts in many application areas to criticize the relevance and definitions of the proposed NFPs and to enhance this catalogue. After analyzing the survey results to synthesize an improved catalogue, we have validated the new definitions a second time with a subset of the initial participants. We obtained a validated list of 17 NFP definitions for atomic SOA service descriptions relevant from a service consumer's perspective.
An Authentication Code against Pollution Attacks in Network Coding
Frederique Oggier,Hanane Fathi
Mathematics , 2009,
Abstract: Systems exploiting network coding to increase their throughput suffer greatly from pollution attacks which consist of injecting malicious packets in the network. The pollution attacks are amplified by the network coding process, resulting in a greater damage than under traditional routing. In this paper, we address this issue by designing an unconditionally secure authentication code suitable for multicast network coding. The proposed scheme is robust against pollution attacks from outsiders, as well as coalitions of malicious insiders. Intermediate nodes can verify the integrity and origin of the packets received without having to decode, and thus detect and discard the malicious messages in-transit that fail the verification. This way, the pollution is canceled out before reaching the destinations. We analyze the performance of the scheme in terms of both multicast throughput and goodput, and show the goodput gains. We also discuss applications to file distribution.
An Expert System for Automatic Reading of A Text Written in Standard Arabic
Tebbi Hanane,Azzoune Hamid
Computer Science , 2014, DOI: 10.5121/ijnlc.2014.3201
Abstract: In this work we present our expert system of Automatic reading or speech synthesis based on a text written in Standard Arabic, our work is carried out in two great stages: the creation of the sound data base, and the transformation of the written text into speech (Text To Speech TTS). This transformation is done firstly by a Phonetic Orthographical Transcription (POT) of any written Standard Arabic text with the aim of transforming it into his corresponding phonetics sequence, and secondly by the generation of the voice signal which corresponds to the chain transcribed. We spread out the different of conception of the system, as well as the results obtained compared to others works studied to realize TTS based on Standard Arabic.
Comments about quantum symmetries of SU(3) graphs
R. Coquereaux,D. Hammaoui,G. Schieber,E. H. Tahri
Mathematics , 2005, DOI: 10.1016/j.geomphys.2006.03.002
Abstract: For the SU(3) system of graphs generalizing the ADE Dynkin digrams in the classification of modular invariant partition functions in CFT, we present a general collection of algebraic objects and relations that describe fusion properties and quantum symmetries associated with the corresponding Ocneanu quantum groupo\"{i}ds. We also summarize the properties of the individual members of this system.

Copyright © 2008-2017 Open Access Library. All rights reserved.