|
WCCCS'11
June 16-17, 2011
ENSIAS-Rabat
Morocco |
|
Advanced Program
Sessions
|
Topics
|
S-I
(Amphi I)
|
§
Error Correcting
Codes: Design and Decoding Algorithms
§
Cryptography,
Watermarking and Cryptanalysis
§
Information and
Communication Theories
§
Turbo-codes,
Iterative Processing
§
Channel
Characterization and Modeling
§
Network Coding
§
Genetic Algorithms &
Neural Networks for Communication System
§
Optimization of Communication Systems |
S-II
(Amphi II)
|
§
Wireless
Communication
§
MIMO Systems
§
Wireless Sensor
Network
§
Broadband
Communication Systems
§
Communication and
System Security
§
Cognitive Radio
Networks
§
Signal, Image and
Video Processing
|
Presentation
guidelines:
§
All presentations should be in English or French.
§
The time provided for oral presentations is 20 min (15 min for the
presentation and 5 min for the discussion).
§
The speakers should give their slides to the session chair before the
beginning of each session.
§
For poster presentations, the posters should be displayed one hour
before the beginning of the poster session and any explanation required should
be provided to session chairs and visitors.
§
The program is divided into two parallel oral sessions (S-I: Codes,
Cryptography & Applications, S-II Advanced Communication Systems) and two
poster sessions.
Keynotes
Keynote 1
|
Futur de la cryptographie
Dr. Abderrahmane Nitaj, Caen University , France
|
June 16, 2011
10h:30-11h:30
|
Keynote 2 |
Sécurité de la cryptographie fondée sur la
théorie des codes
Dr. Ayoub Otmani,
Caen
University
,
France
|
June 17, 2011
09h:00-10h:00
|

ORAL SESSIONS
Session
I : Codes, Cryptography & Applications
Thursday
June 16, 2011
|
Keynote
1
|
Chair : Dr. M. BELKASMI,
ENSIAS
,
MOROCCO
|
June 16, 2011
10h:30-11h:30
|
Futur de la cryptographie
Dr.
Abderrahmane Nitaj, Caen University, France
|
S-I(1) |
Chair : Dr. A. OTMANI,
Caen University
,
France
|
June 16, 2011
11h:30-12h:45
|
ZUC algorithm study
Operation and Analytical Evaluation
G. ORHANOU, S. EL HAJJI, Y. BENTALEB
Covering Radius of Linear Error-Block
Codes
R. DARITI, E. SOUIDI
Hash Functions Based on Coding
Theory
M. MEZIANI, Sidi M. EL YOUSFI
ALAOUI, P. L. CAYREL
Time Dependent Dynamic DES
K M HARIHARASUDHAN,
K. A VINODH
|
S-I(2) |
Chair : Dr. H. BENAZZA, ENSAM ,
Meknes
,
MOROCCO
|
June 16, 2011 14h:30-16h:00
|
Quantum steganography via Greenberger-Horne-Zeilinger GHZ4 state"
A. EL ALLATI,M.B. OULD MEDENI ,Y. HASSOUNI
Steganography and Matrix-Product Codes
M. B. Ould MEDENI, El M.SOUIDI
Echange de clef basé sur un corps
biquadratique imaginaire
M. TALBI, A. AZIZI, M. CISMAILI
Modèle
de Markov Caché d’Ordre 2 Post-Analyse Morpho-Syntaxique et
Mesure de Présence floue en Text
Mining
Arabe
I.
EL HASSANI, A.
KRIOUILE, Y. BENGHABRIT
|
S-I(3)
|
Chair : Dr. El. IBN EL HAJ,
INPT
,
MOROCCO
|
June
16, 2011 16h:30-18h:30
|
Optimisation
de l’Ordonnancement en Couches des Codes LDPC Non-Binaires
S. EL HASSANI, F. GUILLOUD, R. PYNDIAH,
M. H. HAMON, P. PÉNARD
On the Decoding of Linear Block Codes Using Genetic Algorithms
A.
AZOUAOUI, M. ASKALI, M. BELKASMI
On the determination of the weights enumerator of the extended
quadratic residue code of length 200
S. NOUH,
M. BELKASMI, M. ASKALI
Performances des codes en bloc
concaténés en série généralisés
A. FARCHANE, M. BELKASMI
A Novel Traceable E-Cash System
M. HEDABOU
Sur le groupe des unités de corps de nombres
de degré 3 et 6
M. ZIANE
|
ORAL SESSIONS
Session
I : Codes and Cryptography & Applications
Friday
June 17, 2011
|
Keynote
2
|
Chair : Dr. J. ELABBADI,
EMI
,
MOROCCO
|
June 17, 2011
9h:00-10h:00
|
Sécurité de la
cryptographie fondée sur la théorie des codes
Dr. Ayoub Otmani, Université de Caen, France
|
S-I(4) |
Chair : Dr. A. NITAJ,
Caen University
,
FRANCE
|
June 17, 2011 10h:30-12h:45
|
A History of Arabic Cryptography in
Seville
(1010-1085)
A. AZIZI, M. AZIZI
Codes
over SPI-Rings
M. E. CHARKANI, M. SABIRI
Identification Methods Over
A.
CHILLALI
Distribution sécurisé de la
clé de chiffrement dans les WLANs via
la QKD
R.
DJELLAB, M. BENMOHAMED
Sécurité info-juridique contre
la cybercriminalité
M. BENABDELLAH ,H. EL HADEF
Performance
analysis of VSAT network using MC-CDMA scheme and convolutional code
M. EL JOURMI, H. EL GHAZI, A.
BENNIS, H. OUAHMANE
Steganography
and Boolean functions
H.JOUHARI, El M. SOUIDI
|
S-I(5) |
Chairs :
Dr. Z. GUENNOUN, EMI, MOROCCO ; Dr F.ELBOUANANI,ENSIAS, MOROCCO |
June 17, 2011 15h:15-16h:30
|
Merging gradual neural networks
and Genetic algorithm for Dynamic Channel Assignment Problem
J. ELHACHMI,
Z. GUENOUN
Une Nouvelle Technique pour la
détection du Tatouage Audio
N. EL HAMDOUNI, A. ADIB
Performance
Evaluation of Bandpass Modulations in Digital Audio Watermarking
M. KHALIL, A. ADIB
Tentative
d’extension du protocole de cryptographie quantique BB84
E. CHANIGUI, A. AZIZI, M. AZIZI
|
S-I(6) |
Chairs :
Dr. A. AZIZI, FS-Oujda, MOROCCO ; Dr M.BENCHRIFA FS-Rabat, MOROCCO |
June
17, 2011 17h:00-18h:30
|
Pontrjagin
Duality and Codes over Finite Commutative Rings
K.
ABDELMOUMEN, M. NAJMEDDINE , H. BEN-AZZA
Implantation FPGA d'un Turbo Décodeur
Construit à partir des codes à logique majoritaire Pour des
applications Haut débit
M. EL HAROUSSI, M. BELKASMI
Sphere
Decoding Algorithm Applied to STBC with channel coding
H . KOUDOUGNON, R. SAADANE,
M. BELKASMI
Détection
de Frontières Thématiques de Texte à base d’Ontologie
du Domaine
R. BOUDOUMA, R. TOUAHNI, R.
MESSOUSSI
|
ORAL SESSIONS
Session
II : Advanced Communication Systems
Thursday
June 16, 2011
|
|
Keynote
1
|
Chair : Dr. M. BELKASMI, ENSIAS, MOROCCO
|
|
June 16, 2011
10h:30 -11h:30
|
Futur de la cryptographie
Dr.
Abderrahmane Nitaj, Université de Caen, France
|
|
S-II(1) |
Chair : Dr. A.KOBBANE,
ENSIAS
,
MOROCCO
|
|
June 16, 2011
11h:30-12h:45
|
Performance comparison in OFDM signals between PTS and ACE based on
Particle Swarm Optimization
A. OUQOUR, K. EL MOUHIB, Y. JABRANE , B.AIT ES SAID, Y. JABRANE, A.AIT
OUAHMAN
Correctness Strategies for Updating Firewall
Policies
A.KARTIT, A.RADI, M. EL
MARRAKI
Segmentation Method for 3D T1-Weighted Brain MR Images
B.
CHERRADI, O. BOUATTANE, M. YOUSSFI , A. RAIHANI, M. TARBOUCHI
Wideband PIFA antenna with
meandered shorting plate for GSM application
S.
IBNYAICH, M.M.HASSANI , R.J. ELBAKOUCHI, A. GHAMMAZ
|
|
S-II(2) |
Chair :
Dr. A. TAMTAOUI, INPT, MOROCCO |
|
June 16, 2011 14h:30 -16h:00
|
Application du Radar
GPR dans l’étude du site
archéologique Romain dans la région d’Almeria
Turaniana (Espagne)
A. FAIZE, C. M. J. V. COEVORDEN, C. C.
SANCHEZ, A. R. BRETONES, R. GOMEZ MARTIN
Etude comparative des
détecteurs des points d’intérêt
N.ELAKKAD, A. BAATAOUI, A. EL
ABDERRAHMANI, A. SAAIDI, K. SATORI
A
new Mumford-Shah Segmentation Algorithm
M. EL AALLAOUI, A. GOURCH
L'interfonctionnement des réseaux WiMAX et UMTS
basé sur IMS
H. ALLOUCH, M. BELKASMI, R. SAADANE
|
|
S-II(3) |
Chairs : Dr. B REGRAGUI, ENSIAS, MOROCCO;A.AROUD
FS-EL JADIDA, MOROCCO
|
|
June 16, 2011 16h:30-18h:30
|
Routing Performance in DTN Optimized Prophet
M. BOUDGUIG, A. ABDALI
Improving routing in
Delay Tolerant Networks (DTN) with MaxProp and the model of “transfer by
delegation” (custody transfer)
El M. SAMMOU
Approche
Multi-représentation pour un Rendu Réaliste et Efficace des
Forêts
F.
ABBAS, M. CHAUKI BABAHENINI
Vers un Framework Adaptatif Orienté
QoS pour les Réseaux de Capteurs Sans Fil dans les Situations d’Urgences
R. HAJI, S. AOUAD, A. MAACH
Correction de l’implémentation
UM-OLSR du protocole OLSR dans NS-2
A.
BOUSHABA, A. BEN ABBOU, R. BENABBOU, A. ZAHI, M. OUMSIS
Enhancing the ZRP Routing
Protocol and Comparing its Performance to AODV/OLSR
A. LOUTFI, M. ELKOUTBI
|
|
|
|
|
|
|