Mohammed Boulmalf

Mohammed Boulmalf
Université Internationale de Rabat · Computer Science

PhD from INRS Telecom Montreal Canada

About

124
Publications
81,056
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,375
Citations

Publications

Publications (124)
Article
Full-text available
Radio Frequency Identification (RFID) is a contactless technology that has developed over the 90s and 20th centuries. It employs electromagnetic or electrostatic coupling in the radio frequency part of the electromagnetic spectrum to uniquely identify traceable objects, and is widely used in various sectors (e.g., medical, Supply Chain Management,...
Chapter
Industry 4.0 is the technology trend that goes beyond the widespread of digital transformation in industries. It involves facilitating manufacturing through integrating Industrial Internet of Things (IIoT) to achieve higher manufacturing performance. Indeed, smart factories are equipped with sensors, actuators, and systems connected to Internet so...
Conference Paper
There is a need to improve fall detection systems to better discriminate falls from regular daily activities. Multi-sensor systems were proposed for this purpose. However, using wearable sensors may not be practical for elderly people. The use of surveillance cameras and advanced computer vision algorithms is thus an attractive solution. Indeed, ra...
Article
Full-text available
The Internet of Things (IoT) is a fast-growing paradigm in on-going research fields and industrial domains that includes wireless sensor networks, cloud computing, big data, smart cities, large-scale industrial IoT services, etc. In the Internet of Things architecture, wireless sensor networks can be an important factor in optimizing IoT solutions....
Article
Fall is one of the most critical issues faced by elders in their daily life. The consequences of falls range from fatal injuries, severe injuries to no injuries. Therefore, an effective system for detecting falls and treating post-fall injuries is important. Unlike wearable sensors, camera-based systems seem more comfortable and flexible for daily...
Article
Full-text available
With the advent of cloud manufacturing (CM), alongside the maturity of specific development approaches and systems in the manufacturing industry, has led to the integration of these initiatives into Industry 4.0 to achieve higher performance. In fact, the implementation of Industry 4.0 is a real opportunity for the process industry around the world...
Article
Internet of Things (IoT) has been suffering from increasing security threats since many years which compromise the whole network security. Automating the management of IoT devices helps better in implementing security measures within communication systems. IoT-based-SDN is introduced as a new networking approach that enables IoT to be automatically...
Article
Full-text available
Radio Frequency Identification (RFID) is a technology that not only serves to identify objects but also communicates other information, allowing the real-time monitoring of objects at each step in a mobile object network and the reporting of information on their current status. RFID has become one of the most promising research areas and has attrac...
Article
Full-text available
The Internet of Things (IoT) can be considered one of the most powerful tools for creating, modifying and sharing data. There are now billions of connected objects, and this number is growing more and more. While the proliferation of connected objects could facilitate all aspects of our lives, security concerns are also increasing. It is widely rec...
Article
Today, RFID, "Radio Frequency Identification", is a key technology for tracking assets in real-time. It has become one of the areas for improvement in several applications. An RFID system consists of three parts: RFID Tags, RFID Readers, and RFID Middleware. This study aims to improve the advantages of RFID applications as an applied technology in...
Chapter
Full-text available
Securing Data-sharing mechanism between Software Defined Networks (SDN) nodes represent one of the biggest challenges in SDN context. In fact, attackers may steal or perturb flows in SDN by performing several types of attacks such as address resolution protocol poisoning, main in the middle and rogue nodes attacks. These attacks are very harm full...
Chapter
Multicast communication is an important requirement to support many types of applications, such as, IPTV, videoconferencing, group games. Recently this multicast applications type emerges fast, in one side more application provider proposed many applications, in other side Internet research community has proposed many different multicast routing pr...
Article
Full-text available
Software defined network (SDN) is a promising new network abstraction that aims to improve and facilitate network management. Due to its centralized architecture and the lack of intelligence on the data plane, SDN suffers from many security issues that slows down its deployment. Man in the Middle (MitM) attack is considered as one of the most devas...
Article
Vehicular communications in Vehicular Ad-hoc NETworks (VANETs) play an interesting role in improving traffic flow on the roads. In such wireless networks, the vehicles cooperate with each other or with the roadside infrastructure to disseminate the data. In this paper, we introduce a mechanism based on coalitional game theory to study the cooperati...
Chapter
Internet services provider propose increasingly numerous applications depend on multicast communication patterns, such as database synchronization, newsletter updates, video, and audio group streaming. In spite of, IP multicast is frequently suffered from scaling and instability, which causes internet provider administrators to avoid its utilizatio...
Article
Full-text available
In this work, a new hybrid cuckoo search and genetic algorithm optimization method using a novel adaptive penalty function was proposed to solve the economic dispatch (ED) problem in smart grid. Please check and confirm the edit made in article title. This method was also paralyzed in order to solve the problem within specific time suitable to solv...
Conference Paper
The rapid development of urbanization poses many economic, social and environmental problems. The smart city brings smart solutions that are effective and sustainable in different areas: transportation, environment, energy and government affairs. The Internet of Things (IoT) is the basis of the structure of a smart city to interconnect all devices...
Article
Full-text available
Enhancing vehicle drivers’ safety and decreasing accidents are the current new challenges in traffic safety. Vehicular ad-hoc networks (VANETs) offer improvements addressing these challenges through their frequent topology changes. More specifically, VANETs communicate via vehicle-to-vehicle (V2V) and vehicle-to-roadside networks (V2R) mainly by br...
Conference Paper
Software defined networks (SDNs) represent new centralized network architecture that facilitates the deployment of services, applications and policies from the upper layers, relatively the management and control planes to the lower layers the data plane and the end user layer. SDNs give several advantages in terms of agility and flexibility, especi...
Article
Vehicular Ad hoc Networks (VANETs) can serve to guarantee road safety and comfort for drivers. This is done using broadcasting which is the most used technique to disseminate data. If done blindly, it leads to the famous broadcast storm problem. The broadcast storm problem occurs when a huge amount of messages is sent, which increases resource cons...
Conference Paper
Software defined networks represent a new centralized network abstraction that aims to ease configuration and facilitate applications and services deployment to manage the upper layers. However, SDN faces several challenges that slow down its implementation such as security which represents one of the top concerns of SDN experts. Indeed, SDN inheri...
Chapter
The purpose of this study is to enhance RFID application benefits as a luggage tracking system, first, by defining RFID architecture, components, functioning and middleware roles. Secondly, by discussing the implementation of Role-Based Access Control as a tool regulating access to RFID data, therefore making authentication methods more robust and...
Chapter
This paper discusses a smart medicament transportation application, combining Radio Frequency Identification technology to insure luggage traceability, along with Wireless Sensors Network, which guarantees an optimal transportation/Conditioning environment. It discusses ESN middleware architecture and explains its security and privacy issues, inclu...
Article
The major objectives of this work are: 1) to develop new efficient optimization algorithm to solve NP-hard problems, 2) to show the potential of integrating renewable energy technologies for Laayoune region- Morocco taken as case study. In this work, new parallel hybrid Genetic Algorithm-Particle Swarm Optimization algorithm (P-GA-PSO) is developed...
Chapter
This work presents methodology and results used to estimate both wind and solar energies availability and their cost. The objective is to analyze the potential of these two major sources of alternative energy in Tangier region and to show their ability to replace fossil fuel energy sources especially for remote areas and agriculture applications. T...
Article
Full-text available
Software-defined networking (SDN) refers to a network architecture where the transfer state in the data plane is managed by a remote control plane in a centralized manner. SDN offer many advantage in terms of flexibility and automation to administrator but it suffer from many security issues. In other hand, Random Route Mutation (RRM) and path dive...
Article
Full-text available
Software Define Networking (SDN) is a paradigm that was developed to cope with the inherent limitations cause by the rigidity and lack of customization of the traditional networking architecture. SDN has my applicational advantages in terms of network management and configuration and has led to a shift in the view of networking as a whole. Despite...
Article
Full-text available
In this paper Genetic Algorithm method is used to solve Demand Side Management (DSM) and Dynamic Economic Dispatch (DED) problems. This work considers problem (DSM) and (DED) as two complementary stages in the optimization process. Indeed, in this work, instead of considering the total need of all users, the energy consumption profile for each user...
Conference Paper
Full-text available
1980 marked the start of a boom in radiofrequency identification (RFID) technology, initially associated with a growing need for traceability. In view of the technological progress and lower costs, RFID's area of application became much broader and, today, multiple business sectors take advantage of this technology. However, in order to achieve the...
Conference Paper
Full-text available
Morocco is an important regional ICT player that offers interesting investment opportunities to many national and international companies. It is important for these companies to have a good understanding of network performance and security in Morocco. Unfortunately, however, most prior work on network performance and security is interested in count...
Conference Paper
Vehicular Ad-hoc networks VANETs is a sub-class of Mobile Ad-hoc networks MANETs that has many promising future applications. For example, VANETs can significantly reduce car deaths. In VANETs, nodes mainly communicate by broadcasting messages to each other. Such broadcasting needs to be designed carefully to minimize both congestion and latency. H...
Conference Paper
Electricity demand increases every year and there is a need to improve the existing power grid. Smart Grid concept was developed by Institutes and research agencies to address this need. This new concept can be generally considered as an intelligent power grid system that implements distributed energy. Gathering, coordinating operation and control...
Article
Full-text available
Transportation plays an important role in economic and social development and can be a powerful catalyst for growth and development. However, the rapid growth of cities and increasing population mobility have produced a rapid increase in the number of vehicles on the roads, this involves several problems, particularly in terms of road safety, and w...
Article
E-health technologies can play a major role in improving the lives of patients and especially with chronic diseases, these technologies can provide quality care at a distance without consulting their doctor regularly. These technologies provide many benefits for all stakeholders: patients and health providers to patients, the main advantage of e-he...
Chapter
Full-text available
Sensors integrated into the environment, machinery, and structures, and coupled with the efficient delivery of sensed information could provide tremendous benefits in a wide range of applications such as improved manufacturing productivity, enhanced homeland security, fewer catastrophic failures, and improved emergency response. The design and deve...
Article
1980 marked the start of a boom in radiofrequency identification (RFID) technology, initially associated with a growing need for traceability. In view of the technological progress and lower costs, RFID's area of application became much broader and, today, multiple business sectors take advantage of this technology. But in order to achieve the maxi...
Article
Full-text available
Purpose – This paper aims to demonstrate that a policy-based middleware solution which facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environments. Ubiquitous computing targets the provision of seamless services and applications by providing an e...
Conference Paper
Full-text available
Everyone knows the important role of transport in the economic and social development, at the level global this sector is considered among the principal criteria for country rankings. But control and management of traffic in urban areas remains a major challenge to rise, especially accuses rapid development of the transport sector. On the other han...
Article
This paper addresses the problem of localization in sensor networks where, initially, a certain number of sensors are aware of their positions (either by using GPS or by being hand-placed) and are referred to as anchors. Our goal is to localize all sensors with high accuracy, while using a limited number of anchors. Sensors can be equipped with dif...
Article
Full-text available
Ubiquitous computing targets the provision of seamless services and applications by providing an environment that involves a variety of devices having different capabilities. The design of applications in these environments needs to consider the heterogeneous devices, applications preferences, and rapidly changing contexts. RFID and WSN technologie...
Conference Paper
RFID and WSN technologies are widely used in today's pervasive computing. In Wireless Sensor Networks, sensor nodes sense the physical environment and send the sensed data to the sink by multi-hops. WSN are used in many applications such as military and environment monitoring. In Radio Frequency Identification, a unique ID is assigned to a RFID tag...
Conference Paper
The Multiple access system deals with a situation where multiple nodes are required to access a commonly shared channel. These multiple accesses can be viewed as uncoordinated nodes which compete for bandwidth. Various random access mechanisms, such as ALOHA protocol and its corresponding variations, have been widely studied as efficient methods to...
Conference Paper
Roads' overload remains a major challenge although they are constantly expanded in order to increase their capacity and improve their efficiency. This tends to cause many problems: environmentally, economically and socially. The advancement of urban traffic management systems, construction and expansion of roads are solutions to address this proble...
Conference Paper
1980 marked the start of a boom in radiofrequency identification (RFID) technology, initially associated with a growing need for traceability. In view of the technological progress and lower costs, RFID's area of application became much broader and, today, multiple business sectors take advantage of this technology. But in order to achieve the maxi...
Patent
Full-text available
SYSTEME D’AUTO-SIGNALISATION ET ALERTE INTELLIGEANTE DE VEHICULE PAR GPS permet au conducteur de connaître par anticipation et en temps réel l'état de la signalisation routière verticale (panneaux) et horizontale (marquages routiers, passages piétons), même si cette signalisation est effacée ou masquée. C’est un système composé de modules hardware...
Conference Paper
Full-text available
Future Smart Grids will consist of distributed Micro-Grids where the Advanced Metering Infrastructure (AMI) forms a central component. This consists basically of meters/sensors that are regularly communicating data towards/from a central Control Plane. Due to the ad-hoc topological nature of the meters/sensors, particularly in residential areas, Wi...
Chapter
Radio Frequency Identification (RFID) has been used since the Second World War to identify “friend or foe” aircrafts. It has become an enabling wireless technology that is widely used in a number of application areas, such as product tracking through manufacturing and assembly, inventory control, and supply chain management (SCM). By 2006, Wal-Mart...
Conference Paper
Full-text available
This paper investigates the effects of power saving strategies on the performance of wireless local area networks (WLANs). More specifically, a power management model is formulated as an integer linear program that the network planner can use in order to achieve power savings while maintaining an acceptable quality of service (QoS), measured by the...
Conference Paper
Full-text available
In healthcare the importance of obtaining the right information, at the right time, irrespective of time and location dependency is very critical. Healthcare personnel need to access real-time medical data such as patient clinical histories, laboratory results, treatments, chronic diseases, medication, and insurance information. Therefore, healthca...
Conference Paper
Vehicular Ad-hoc Networks (VANETs) are distributed, self-organizing communication networks built up by moving vehicles, and are thus characterized by a very high node mobility and limited degrees of freedom in the mobility patterns. Such particular features often make standard networking protocols inefficient or unusable in VANETs. In the past, the...
Conference Paper
With the rapid development of Wireless Sensors Network (WSN) technology, together with its growing market due to the variety of applications in which this technology can be used, sensors are now available at very cheap prices, and relatively high quality. The medical field among other fields is one of the most promising fields in which sensors tech...
Article
Voice over IP (VOIP) is an application of great importance, particularly because of the significant revenue it can generate. In order for the Internet to constitute an attractive alternative to the traditional Public Switched Telephone Network (PSTN), it must provide high quality VOIP services. Given the importance of VOIP today, a new course was i...
Conference Paper
Full-text available
The work presented in this paper describes the evolution impact of mobile devices operating system's features through its increasing use for internet navigation. And thus, the growing risks of getting contaminated by hostile programs, which exploit the vulnerabilities of these systems and spreading to a large scale via services such as Bluetooth an...
Conference Paper
Full-text available
Discovering and accessing services while on the road is an important component in the architecture of future vehicular ad hoc networks, and for a successful deployment of services. Several studies have focused on the design and development of new routing and dissemination techniques that allow vehicles to communicate with each other and with road s...
Article
Full-text available
Radio Frequency Identification RFID has been used since the Second World War to identify "friend or foe" aircrafts. It has become an enabling wireless technology that is widely used in a number of application areas, such as product tracking through manufacturing and assembly, inventory control, and supply chain management SCM. By 2006, Wal-Mart use...
Conference Paper
Radio frequency identification (RFID) technology has emerged to facilitate tracking items and inexpensively automate the processes of supply chain management. The deployment of RFID technology requires the development of a robust middleware which will manage the huge amount of data captured by RFID antennas and sent by RFID readers. The main object...
Conference Paper
User profiling is commonly used to support personalization as well as to enhance usability of software systems by automatically adapting to the needs and preferences of their users. This paper presents an approach to dynamically update mobile users' profiles so that they can be provided with appropriate services while moving from one location to an...