Faculty Members researchs

You are here


Because of bifercation of states such as Andhra Pradesh and Telangana in India based on linguistic backgrounds of both states, the promotion of products in these two markets was become difficult in the context of personal selling.  Sales force of these two states would confront some problems of language.  A research is needed to identify the barriers of communication between sales force and customers in these two states. 

Embedding Expert System in Embedded system : software and hardware implementation and co-design Faouzi Sadek Maddouri
Approche d’Analyse de Risque SpatialiséePublié le 20 août 2016

Rule based expert systems are more flexible on one hand, on an other hand embedded ststems are offen and usually far from human expert control and operates under a real time constraints. This is an real autonomy need for these systems to be controlled by themself.

A deal within hardware implementation and software implementation need to be considered at this level to get at once flexibility and performance.

A Spatial Risk Analysis approach : an hybrid methodoly Faouzi Sadek Maddouri

Ce papier décrit le concept d’utilisation des operateurs algébriques et topologiques utilisés dans les systèmes d’analyse spatial des données, l’adaptation d’un modèle mathématique et algébrique dans l’analyse des risques de sécurité dans les réseaux locaux d’entreprises. Il évoque entre autres et discute les règles de calcul sou jacentes, les limites éventuelles et perspectives de telle approche. Les indicateurs synthétiques d’une analyse de risque classique, traditionnellement, jugent du niveau de risque, mais ne le situe pas sur le  terrain. D’où le besoin de localiser les zones à risque, et créer une carte géographique ou un plan de représentation spatiale du risque selon ces indicateurs.

En résultat, on devra s’attendre à une analyse de risque statistique, analytique et métrique classique, mais aussi et en plus, des indicateurs spatiaux des risques, une cartographie physique des zones de risque (Fig.4) et un tableau de bord de suivie et de simulation de situation. Cette approche est développée et investie dans un contexte d’être utilisé comme base de sécurité de l’informatique embarquée, mobile et invasive/ubiquitaire.

Contribution of embedded system and invasive computing in security policy Faouzi Sadek Maddouri

Jusqu'à une époque récente, les systèmes embarqués étaient réservés aux utilisations professionnelles à usage limité. De nos jours ces derniers envahissent tous les milieux : de l’espace de la vie quotidienne (maisons, villes, véhicules, moyens de transports, etc.) aux réseaux informatiques professionnels, on parle alors couramment de systèmes ubiquitaires et d’objets environnants intelligents. Leur présence est devenue un fait omniprésent. Malgré leurs limitations en ressources, les systèmes ubiquitaires sont en train de s’améliorer et acquirent de nouvelles capacités de calcul et de stockage de plus en plus impressionnantes. Ils peuvent contenir dans les cinq prochaines années des centaines ou même des milliers de processeurs. On parle ainsi de systèmes ubiquitaires embarqués multiprocesseurs massivement parallèles.

Ainsi, les systèmes ubiquitaires peuvent avoir comme rôle de participer activement aux contrôles d’accès selon des directives émanant d’une politique de sécurité. Nous nous intéressons à ce point en étudiant deux points principaux :

La participation d’un composant embarqué à la mise en place d’une politique de sécurité.

La reconfiguration d’un composant ubiquitaire embarqué mobile pour respecter de nouvelles règles de sécurité en passant d’une zone A à une zone B disposants de deux politiques de sécurité différentes.

Open Distance Learning Through IRS (Information Retrieval System). ATEEQ AHMED ABDUL KHADER


In this Paper we are putting focus on, How IRS (Information Retrieval system) can be used in Open Distance Learning Education field (in both linguistic and non linguistic universities).

     Using the best IRS - search engine such as Google, you-tube, Bing etc.., as a medium of instruction for Learning.

                 As a force contributing to social and economic development, open and distance learning is fast becoming an accepted and indispensable part of the mainstream of educational systems in both developed and developing countries, with particular emphasis for the latter.

              The development of computers and the internet have made distance learning distribution easier and faster and have given rise to the 'virtual university’, the entire educational offerings of which are conducted online.

Unsteady Flow of a Visco-Elastic Fluid in a Porous Channel using Finite Element Technique ATEEQ AHMED ABDUL KHADER

Abstract – In this paper a mathematical model is proposed for unsteady flow of a visco-elastic fluid in a porous channel using finite element technique. The flow of a visco-elastic fluid under unsteady pressure gradient in a region, bounded by two parallel porous plates is studied. The effect of visco-elastic parameter on velocity shear stress, amplitude and phase angle is discussed through tables and graph. It is assumed that at one plate fluid is injected with a certain constant velocity and that at other it is sucked off with the same velocity for a fixed injection Reynolds’s number, the effect of visco-elastic parameter (K) on velocity field and shear stress is discussed. It is observed that for the same value of (k) the amplitude of shear stress at injection wall is less than that at suction wall while the phase lag shows the complex character.


Abstract – This problem is to investigate the effect of magnetic parameter and the aspect ratio on the flow velocity when an electrically conducting fluid flows in a porous rectangular duct in the presence of an imposed traverse magnetic field, using finite element technique. The velocity distributions are shown through graph. It is observed that the maximum velocity which occurs in the middle of the channel decreases with increasing in magnetic parameter ‘M’ and also, it is seen that the maximum velocity in the duct increases with decreasing‘d’ this may be due to the increase in the height of the channel.

Can there be “research in mathematical education”? ATEEQ AHMED ABDUL KHADER

       We examine a number of papers and a book, all of which have been cited, by people who are knowledgeable in the field, as being good examples of “research in mathematics education.” We find specific serious flaws, indeed fatal flaws, in all of them, so that no conclusions of any interest follow as a result of any of the “research” that is reported in these works. We have found no evidence that the research paradigm, involving test and control groups, randomized trials, etc., which is invaluable in the life sciences, is of any use whatever in studying mathematics education and we urge that it be abandoned, in favor of human-to-human discourse about how we can improve curricula and teaching.

The Effects of an Innovative Approach to Mathematics on Academically Low Achieving Students in Mainstreamed Settings ATEEQ AHMED ABDUL KHADER

       This article presents results from a year-long study of an innovative approach to mathematics and its impact on students with learning disabilities as well as those at-risk for special education. There is a considerable interest in the field regarding current mathematics reform, particularly as it reflects the simultaneous and conflicting movements toward national standards and inclusion. Results suggest that innovative methods in mathematics are viable for students with average and above average academic abilities and that students with learning disabilities or those at-risk for special education need much greater assistance if they are to be included in general education classrooms. The success of the majority of students in this study raises questions about commonly advocated methods in special education.

Determining The Black-box Component’s Failure Ibrahim Hisham Hilal

Many papers propose different approaches to evaluate the reliability of black-box components based on component’s success., This paper determines or evaluates component’s reliability based on its failure. Since even reliable components might fail, we argue that component’s acquirer should evaluate the component’s reliability based on its failure and not on its success. In this paper we propose a new approach towards determining the component’s failure. Both the operational profile and the appropriate test cases are needed to support our approach.  

QR Code for https://cbah.psau.edu.sa/en/sources/research