Search results for: Belkaid Khmissi
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6

Search results for: Belkaid Khmissi

6 Study of Mechanical Behavior of Unidirectional Composite Laminates According

Authors: Deliou Adel, Saadalah Younes, Belkaid Khmissi, Dehbi Meriem

Abstract:

Composite materials, in the most common sense of the term, are a set of synthetic materials designed and used mainly for structural applications; the mechanical function is dominant. The mechanical behaviors of the composite, as well as the degradation mechanisms leading to its rupture, depend on the nature of the constituents and on the architecture of the fiber preform. The profile is required because it guides the engineer in designing structures with precise properties in relation to the needs. This work is about studying the mechanical behavior of unidirectional composite laminates according to different failure criteria. Varying strength parameter values make it possible to compare the ultimate mechanical characteristics obtained by the criteria of Tsai-Hill, Fisher and maximum stress. The laminate is subjected to uniaxial tensile membrane forces. Estimates of their ultimate strengths and the plotting of the failure envelope constitute the principal axis of this study. Using the theory of maximum stress, we can determine the various modes of damage of the composite. The different components of the deformation are presented for different orientations of fibers.

Keywords: unidirectional kevlar/epoxy composite, failure criterion, membrane stress, deformations, failure envelope

Procedia PDF Downloads 41
5 Secure Transfer of Medical Images Using Hybrid Encryption

Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 405
4 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 512
3 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 351
2 Physicochemical and Optical Characterization of Rutile TiO2 Thin Films Grown by APCVD Technique

Authors: Dalila Hocine, Mohammed Said Belkaid, Abderahmane Moussi

Abstract:

In this study, pure rutile TiO2 thin films were directly synthesized on silicon substrates by Atmospheric Pressure Chemical Vapor Deposition technique (APCVD) using TiCl4 as precursor. We studied the physicochemical properties and the optical properties of the produced coatings by means of standard characterization techniques of Fourier Transform Infrared Spectroscopy (FTIR) combined with UV-Vis Reflectance Spectrophotometry. The absorption peaks at 423 cm-1 and 610 cm-1 were observed for the rutile TiO2 thin films, by FTIR measurements. The absorption peak at 739 cm-1 due to the vibration of the Ti-O bonds, was also detected. UV-Vis Reflectance Spectrophotometry is employed for measuring the optical band gap from the measurements of the TiO2 films reflectance. The optical band gap was then extracted from the reflectance data for the TiO2 sample. It was estimated to be 3.05 eV which agrees with the band gap of commercial rutile TiO2 sample.

Keywords: titanium dioxide, physicochemical properties, APCVD, FTIR, band gap

Procedia PDF Downloads 365
1 Quantified Metabolomics for the Determination of Phenotypes and Biomarkers across Species in Health and Disease

Authors: Miroslava Cuperlovic-Culf, Lipu Wang, Ketty Boyle, Nadine Makley, Ian Burton, Anissa Belkaid, Mohamed Touaibia, Marc E. Surrette

Abstract:

Metabolic changes are one of the major factors in the development of a variety of diseases in various species. Metabolism of agricultural plants is altered the following infection with pathogens sometimes contributing to resistance. At the same time, pathogens use metabolites for infection and progression. In humans, metabolism is a hallmark of cancer development for example. Quantified metabolomics data combined with other omics or clinical data and analyzed using various unsupervised and supervised methods can lead to better diagnosis and prognosis. It can also provide information about resistance as well as contribute knowledge of compounds significant for disease progression or prevention. In this work, different methods for metabolomics quantification and analysis from Nuclear Magnetic Resonance (NMR) measurements that are used for investigation of disease development in wheat and human cells will be presented. One-dimensional 1H NMR spectra are used extensively for metabolic profiling due to their high reliability, wide range of applicability, speed, trivial sample preparation and low cost. This presentation will describe a new method for metabolite quantification from NMR data that combines alignment of spectra of standards to sample spectra followed by multivariate linear regression optimization of spectra of assigned metabolites to samples’ spectra. Several different alignment methods were tested and multivariate linear regression result has been compared with other quantification methods. Quantified metabolomics data can be analyzed in the variety of ways and we will present different clustering methods used for phenotype determination, network analysis providing knowledge about the relationships between metabolites through metabolic network as well as biomarker selection providing novel markers. These analysis methods have been utilized for the investigation of fusarium head blight resistance in wheat cultivars as well as analysis of the effect of estrogen receptor and carbonic anhydrase activation and inhibition on breast cancer cell metabolism. Metabolic changes in spikelet’s of wheat cultivars FL62R1, Stettler, MuchMore and Sumai3 following fusarium graminearum infection were explored. Extensive 1D 1H and 2D NMR measurements provided information for detailed metabolite assignment and quantification leading to possible metabolic markers discriminating resistance level in wheat subtypes. Quantification data is compared to results obtained using other published methods. Fusarium infection induced metabolic changes in different wheat varieties are discussed in the context of metabolic network and resistance. Quantitative metabolomics has been used for the investigation of the effect of targeted enzyme inhibition in cancer. In this work, the effect of 17 β -estradiol and ferulic acid on metabolism of ER+ breast cancer cells has been compared to their effect on ER- control cells. The effect of the inhibitors of carbonic anhydrase on the observed metabolic changes resulting from ER activation has also been determined. Metabolic profiles were studied using 1D and 2D metabolomic NMR experiments, combined with the identification and quantification of metabolites, and the annotation of the results is provided in the context of biochemical pathways.

Keywords: metabolic biomarkers, metabolic network, metabolomics, multivariate linear regression, NMR quantification, quantified metabolomics, spectral alignment

Procedia PDF Downloads 315