<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="https://dspace.univ-ouargla.dz/jspui/handle/123456789/243" />
  <subtitle />
  <id>https://dspace.univ-ouargla.dz/jspui/handle/123456789/243</id>
  <updated>2026-04-15T21:32:25Z</updated>
  <dc:date>2026-04-15T21:32:25Z</dc:date>
  <entry>
    <title>ANOMALY DETECTION IN FLOW BASED IoT NETWORK TRAFIC USING CNN,SMOTE AND PCA</title>
    <link rel="alternate" href="https://dspace.univ-ouargla.dz/jspui/handle/123456789/40295" />
    <author>
      <name>Khaldi, Belal</name>
    </author>
    <author>
      <name>Zouaghi, Mohamed Mehdi</name>
    </author>
    <author>
      <name>Benecheikh, Adnane Abdelmoumine</name>
    </author>
    <id>https://dspace.univ-ouargla.dz/jspui/handle/123456789/40295</id>
    <updated>2026-02-09T10:07:25Z</updated>
    <published>2025-01-01T00:00:00Z</published>
    <summary type="text">Titre: ANOMALY DETECTION IN FLOW BASED IoT NETWORK TRAFIC USING CNN,SMOTE AND PCA
Auteur(s): Khaldi, Belal; Zouaghi, Mohamed Mehdi; Benecheikh, Adnane Abdelmoumine
Résumé: This research presents an optimized deep learning approach for network flow anomaly&#xD;
detection, combining data preprocessing, feature classification, and neural networks to improve&#xD;
detection accuracy. The methodology employs systematic data cleaning (handling missing&#xD;
values, normalization) and feature selection before applying machine learning classifiers&#xD;
(Random Forest/SVM) for preliminary anomaly identification. These processed features are then&#xD;
fed into deep learning models (CNN/LSTM) to capture complex temporal patterns in flow data.&#xD;
Experiments conducted on network traffic datasets demonstrate that this hybrid approach&#xD;
achieves superior performance compared to conventional methods, with quantitative&#xD;
improvements in both accuracy (99%) and F1-score (99,5%). The study specifically examines&#xD;
how different preprocessing techniques affect model performance and compares various&#xD;
classification-DL architecture combinations. Results indicate that proper data normalization and&#xD;
feature engineering significantly enhances the deep learning model's anomaly detection&#xD;
capability.&#xD;
This work contributes practical insights for implementing machine learning pipelines in&#xD;
network security systems, showing that a carefully designed preprocessing and classification&#xD;
stage can substantially improve deep learning outcomes. The findings are particularly relevant&#xD;
for developing more reliable intrusion detection systems capable of identifying both known&#xD;
attack patterns and novel anomalies.
Description: Network Administration &amp; Security</summary>
    <dc:date>2025-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Développement d’une Approche Prédictive pour la Gestion d’une banque de Sang</title>
    <link rel="alternate" href="https://dspace.univ-ouargla.dz/jspui/handle/123456789/40293" />
    <author>
      <name>Benkherourou, Chafika</name>
    </author>
    <author>
      <name>Tidjani, Fatma Zahra</name>
    </author>
    <id>https://dspace.univ-ouargla.dz/jspui/handle/123456789/40293</id>
    <updated>2026-02-09T10:00:44Z</updated>
    <published>2025-01-01T00:00:00Z</published>
    <summary type="text">Titre: Développement d’une Approche Prédictive pour la Gestion d’une banque de Sang
Auteur(s): Benkherourou, Chafika; Tidjani, Fatma Zahra
Résumé: régression poly-&#xD;
nomiale
Description: Informatique fondamentale</summary>
    <dc:date>2025-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Federated Learning-based Anomaly Detection for IoT Security Attacks</title>
    <link rel="alternate" href="https://dspace.univ-ouargla.dz/jspui/handle/123456789/40292" />
    <author>
      <name>BENBEZIANE, Mohammed</name>
    </author>
    <author>
      <name>Temmar, Brahim</name>
    </author>
    <author>
      <name>Bouchenafa, Abdeldjalil</name>
    </author>
    <id>https://dspace.univ-ouargla.dz/jspui/handle/123456789/40292</id>
    <updated>2026-02-09T09:54:03Z</updated>
    <published>2025-01-01T00:00:00Z</published>
    <summary type="text">Titre: Federated Learning-based Anomaly Detection for IoT Security Attacks
Auteur(s): BENBEZIANE, Mohammed; Temmar, Brahim; Bouchenafa, Abdeldjalil
Résumé: The rapid advancement of network technologies has heightened the risk of device and&#xD;
data breaches, particularly during data sharing and storage processes. To mitigate these&#xD;
threats, Machine Learning (ML) and Deep Learning (DL)-based Intrusion Detection Sys-&#xD;
tems (IDS) have shown great potential.&#xD;
However, traditional training approaches that require centralized data aggregation often&#xD;
pose significant privacy and confidentiality concerns. Federated Learning (FL) addresses&#xD;
this issue by enabling local model training on edge devices, eliminating the need to share&#xD;
raw data, and instead securely aggregating model updates in a decentralized fashion. In&#xD;
this study, we introduce a unified IDS leveraging a hybrid CNN-LSTM model within an&#xD;
FL framework, using the realistic TON-IoT dataset to reflect actual IoT environments.&#xD;
Experimental results demonstrate the effectiveness of the proposed model, achieving a&#xD;
classification accuracy of 90.84% for multiclass detection and 92.02% for binary classifica-&#xD;
tion in a centralized setting, while maintaining competitive performance in the federated&#xD;
environment with 87.6% accuracy for multiclass and 88.5% for binary classification. These&#xD;
findings highlight the potential of combining CNN and LSTM architectures within an FL&#xD;
setup to build intelligent, privacy-preserving, and secure IDS solutions for IoT ecosystems.
Description: Network Administration and Security</summary>
    <dc:date>2025-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Optimizing the Multidimensional Knapsack Problem Using Guided Genetic Algorithm and an AI-augmented Binary Water Optimization Algorithm</title>
    <link rel="alternate" href="https://dspace.univ-ouargla.dz/jspui/handle/123456789/40290" />
    <author>
      <name>KHELIFA, MERIEM</name>
    </author>
    <author>
      <name>Slimani, Nadjat</name>
    </author>
    <author>
      <name>Salhi, Oumaima</name>
    </author>
    <id>https://dspace.univ-ouargla.dz/jspui/handle/123456789/40290</id>
    <updated>2026-02-09T09:44:03Z</updated>
    <published>2025-01-01T00:00:00Z</published>
    <summary type="text">Titre: Optimizing the Multidimensional Knapsack Problem Using Guided Genetic Algorithm and an AI-augmented Binary Water Optimization Algorithm
Auteur(s): KHELIFA, MERIEM; Slimani, Nadjat; Salhi, Oumaima
Résumé: This thesis optimizes the Multidimensional Knapsack Problem (MKP), one of the most&#xD;
prominent and challenging combinatorial optimization problems since it is intricate and&#xD;
contains multiple constraints. MKP is present in real-world issues such as resource&#xD;
allocation, task scheduling, and investment. The overall aim of this study is to evaluate the&#xD;
performance of two metaheuristics for MKP problem solving: the Guided Genetic&#xD;
Algorithm (GGA) and binary Water Optimization Algorithm (WOA).&#xD;
For enhancing the performance of WOA, we used a hybrid approach based on artificial&#xD;
intelligence techniques. A dynamic parameter prediction such as the number of flipped bits&#xD;
and the evaporation retention ratio is performed based on a Multi-Layer Perceptron (MLP)&#xD;
neural network. Graph Neural Networks (GNNs) are also adopted in order to utilize the&#xD;
structural relationships among items. In addition, reinforcement learning techniques are&#xD;
employed for enhancing the exploration and exploitation phases during the searching&#xD;
procedure.&#xD;
Experimental results indicate that the improved version of WOA (BWOA), augmented by&#xD;
AI techniques, can produce high-quality solutions in shorter convergence time compared to&#xD;
other traditional algorithms. This confirms the effectiveness of the proposed method in&#xD;
solving complex constrained optimization problems like MKP.
Description: Industrial Computing</summary>
    <dc:date>2025-01-01T00:00:00Z</dc:date>
  </entry>
</feed>

