Books by Heiballa Abdellahi
The internet has been a platform for individuals, groups of people and companies to interact with... more The internet has been a platform for individuals, groups of people and companies to interact with one another through the social media. The social media has truly aided interaction and even other business services through social networks, forums, blogs, etc.
Forums are now been used as tools/platforms to create discussions, connect to people (mostly of similar interests) and as sources of relevant information with applications like Facebook, LinkedIn and MySpace dominating the social media landscape.
The aim of this work is to design and implement a full scale social networking website like Facebook
or Twitter, including features such as news feeds, profiles, friend system, chat system, trending posts and more.
Using proficiently PHP, Bootstrap toolkit and MySQL databases to registering it’s own domain name and putting it online.
Finally Powering it with Artificial Intelligence to analyze posts at scale, understand what’s being said in them, then extracting insights based on that information.
The application test results are presented at the end of this project.
This project consists of the design of an integrated smart parking management system for easier a... more This project consists of the design of an integrated smart parking management system for easier and quicker parking of vehicles, and as a consequence: a better saving of resources such asfuel, time and space. The project is creating a mobile app to first inform drivers of the status of particular parkinglot and show them the nearest way to it.Anotherfunctionality is to give users the capability to book idle parking slots on the road to the parking. The state of a parking is detected in real-time using a machine learning model from frames captured by a limited resources camera and then sent to a real-time database which can be consulted and used to reserve idle parking slots. The main goal of this project is the detection of car parking occupancy in real-time using a Convolutional Neural Network (CNN) classifier. The models has been trained on the CNRPark+EXT dataset, a dataset that takes in consideration light condition changes, presence of shadows and partial occlusions. The evaluation of the models we created showed a very effective performance in multiple conditions.
Key words: IoT, Smart Parking, Deep Learning, Machine Learning
The norm in the world of mobile network development
and research is that each ten years a new gen... more The norm in the world of mobile network development
and research is that each ten years a new generation of
mobile connectivity services is deployed to the end users,
allowing them to enjoy every possible type of applications
ranging from social medias to News. Now in 2020 a 5th generation is about to be launched, this generation is promising
us with the ability to create smart cities, thing that is made
possible by enhanced mobile broadband services (eMBB)
and massive machine type communication (mMTCs), real
time management systems will also profit from ultra-reliable
low latency communications (URRLC).
This is a summary of the seminary given by Dr. MohamedSlim Alouini of KAUST university the Friday 18th October at
the national school of computer science (ENSIAS) where he
has given a talk about the 6th generation of mobile networks
under the title of “Smart Villages: When Affordability Meets
Connectivity”. The main point of the talk was the physical
and material challenges of deploying a pro-efficient and
affordable network that enable us to create not only smart
cities but also smart villages and why not a smart living.
Vehicles are currently being developed and sold with
increasing levels of connectivity and automa... more Vehicles are currently being developed and sold with
increasing levels of connectivity and automation. As with
all networked computing devices, increased connectivity
often results in a heightened risk of a cyber security attack.
Furthermore, increased automation exacerbates any risk by
increasing the opportunities for the adversary to implement
a successful attack. This topic was discussed in the seminary
given by Pr. JALEL BEN-OTHMAN from Paris13 Univer-
sity at Friday the fist November 2019 at the national school
of computer science (ENSIAS) where he talked about the
threats and solutions for connected vehicles in cyberspace.
The main point of the talk was the cyber threats facing con-
nected Vehicles and the future challenges where he start by
Detailing the distributed approach and localization approach
in telecom networks introducing the concept of connected
car a car that is equipped with Internet access, and usually
also with a wireless local area network. This allows it to
share internet access, and hence data, with other devices
both inside and outside the vehicle From what leads to the
Problematic of software vulnerabilities becoming accessible
to malicious hackers using cellular networks, Wi-Fi, and
hardline connections to exploit them with the inability to
disclose the source of the attack that can effect any not
secure car system that can lead to issues not only to the
driver but to others connected to him.
2. Emerging
Cyber Security Europe provides a platform for worldleading security service and solution provider... more Cyber Security Europe provides a platform for worldleading security service and solution providers to highlight
and showcase their thoughts, ideas and solutions to managing security issues along with the opportunity to network,
promote and connect with those that make decisions related
to security in EuropeCyber-attacks know no borders, but our
response capacity differs very much from one country to the
other, creating loopholes where vulnerabilities attract even
more the attacks. The EU needs more robust and effective
structures to ensure strong cyber resilience and respond to
cyber-attacks. We do not want to be the weakest links in this
global threat To equip Europe with the right tools to deal
with an ever-changing cyber threat, in 2017 the European
Commission and the High Representative proposed a wideranging set of measures to build strong cybersecurity in
the EU. These efforts are now being complemented by a
proposal helping the EU to pool resources and expertise in
research and innovation, and to become a leader in the next
generation of cybersecurity and digital technologies.
A Tracking Technique for Energy Harvesting: Fuelling Adoption in smart management platform for low power IoT Embedded systems, 2019
This paper presents some of the problematics of using energy harvesting in iot as a process of ca... more This paper presents some of the problematics of using energy harvesting in iot as a process of capturing energy from one or more renewable energy sources and converting them into usable electrical energy and how this concept can improve iot devices[3], we discuss some of these problematics such as having a two-dimensional maximum efficiency tracking technique for switched-capacitor based energy harvesting circuits in IoT applications also a smart management platform for low power IoT systems will certainly make a difference, and the one we're going to present which is some of the challenges of providing software primitives for transient computing to facilitate hardware-independent implementation using standard OS APIs, we will also present the integration of a state-of art transient approach, Hibernus into mbed OS.
Papers by Heiballa Abdellahi
The summary of the talk given by
Abdelfettah SGHIOUAR on Kubernetes Engine
Design and implement IP networks, 2019
This document is the core of my work regarding our network project.
The essential objective of th... more This document is the core of my work regarding our network project.
The essential objective of this document is to design and implement IP network of a company.
During my work, the first mission was to realize comparative analysis to look for the most suitable type of cable to construct an adequate network for the whole company building. Then, i realize also a comparative study to choose the right switch and router to set up the LAN architecture building located in Casablanca, then the WAN architecture that is located between Casablanca and Rabat, and Finally I reinforced my architecture using multiple security protocols, all this work is represented with PACKET TRACER software.
Keywords: cabling, LAN, WAN, security, PACKET TRACER…
Uploads
Books by Heiballa Abdellahi
Forums are now been used as tools/platforms to create discussions, connect to people (mostly of similar interests) and as sources of relevant information with applications like Facebook, LinkedIn and MySpace dominating the social media landscape.
The aim of this work is to design and implement a full scale social networking website like Facebook
or Twitter, including features such as news feeds, profiles, friend system, chat system, trending posts and more.
Using proficiently PHP, Bootstrap toolkit and MySQL databases to registering it’s own domain name and putting it online.
Finally Powering it with Artificial Intelligence to analyze posts at scale, understand what’s being said in them, then extracting insights based on that information.
The application test results are presented at the end of this project.
Key words: IoT, Smart Parking, Deep Learning, Machine Learning
and research is that each ten years a new generation of
mobile connectivity services is deployed to the end users,
allowing them to enjoy every possible type of applications
ranging from social medias to News. Now in 2020 a 5th generation is about to be launched, this generation is promising
us with the ability to create smart cities, thing that is made
possible by enhanced mobile broadband services (eMBB)
and massive machine type communication (mMTCs), real
time management systems will also profit from ultra-reliable
low latency communications (URRLC).
This is a summary of the seminary given by Dr. MohamedSlim Alouini of KAUST university the Friday 18th October at
the national school of computer science (ENSIAS) where he
has given a talk about the 6th generation of mobile networks
under the title of “Smart Villages: When Affordability Meets
Connectivity”. The main point of the talk was the physical
and material challenges of deploying a pro-efficient and
affordable network that enable us to create not only smart
cities but also smart villages and why not a smart living.
increasing levels of connectivity and automation. As with
all networked computing devices, increased connectivity
often results in a heightened risk of a cyber security attack.
Furthermore, increased automation exacerbates any risk by
increasing the opportunities for the adversary to implement
a successful attack. This topic was discussed in the seminary
given by Pr. JALEL BEN-OTHMAN from Paris13 Univer-
sity at Friday the fist November 2019 at the national school
of computer science (ENSIAS) where he talked about the
threats and solutions for connected vehicles in cyberspace.
The main point of the talk was the cyber threats facing con-
nected Vehicles and the future challenges where he start by
Detailing the distributed approach and localization approach
in telecom networks introducing the concept of connected
car a car that is equipped with Internet access, and usually
also with a wireless local area network. This allows it to
share internet access, and hence data, with other devices
both inside and outside the vehicle From what leads to the
Problematic of software vulnerabilities becoming accessible
to malicious hackers using cellular networks, Wi-Fi, and
hardline connections to exploit them with the inability to
disclose the source of the attack that can effect any not
secure car system that can lead to issues not only to the
driver but to others connected to him.
2. Emerging
and showcase their thoughts, ideas and solutions to managing security issues along with the opportunity to network,
promote and connect with those that make decisions related
to security in EuropeCyber-attacks know no borders, but our
response capacity differs very much from one country to the
other, creating loopholes where vulnerabilities attract even
more the attacks. The EU needs more robust and effective
structures to ensure strong cyber resilience and respond to
cyber-attacks. We do not want to be the weakest links in this
global threat To equip Europe with the right tools to deal
with an ever-changing cyber threat, in 2017 the European
Commission and the High Representative proposed a wideranging set of measures to build strong cybersecurity in
the EU. These efforts are now being complemented by a
proposal helping the EU to pool resources and expertise in
research and innovation, and to become a leader in the next
generation of cybersecurity and digital technologies.
Papers by Heiballa Abdellahi
The essential objective of this document is to design and implement IP network of a company.
During my work, the first mission was to realize comparative analysis to look for the most suitable type of cable to construct an adequate network for the whole company building. Then, i realize also a comparative study to choose the right switch and router to set up the LAN architecture building located in Casablanca, then the WAN architecture that is located between Casablanca and Rabat, and Finally I reinforced my architecture using multiple security protocols, all this work is represented with PACKET TRACER software.
Keywords: cabling, LAN, WAN, security, PACKET TRACER…
Forums are now been used as tools/platforms to create discussions, connect to people (mostly of similar interests) and as sources of relevant information with applications like Facebook, LinkedIn and MySpace dominating the social media landscape.
The aim of this work is to design and implement a full scale social networking website like Facebook
or Twitter, including features such as news feeds, profiles, friend system, chat system, trending posts and more.
Using proficiently PHP, Bootstrap toolkit and MySQL databases to registering it’s own domain name and putting it online.
Finally Powering it with Artificial Intelligence to analyze posts at scale, understand what’s being said in them, then extracting insights based on that information.
The application test results are presented at the end of this project.
Key words: IoT, Smart Parking, Deep Learning, Machine Learning
and research is that each ten years a new generation of
mobile connectivity services is deployed to the end users,
allowing them to enjoy every possible type of applications
ranging from social medias to News. Now in 2020 a 5th generation is about to be launched, this generation is promising
us with the ability to create smart cities, thing that is made
possible by enhanced mobile broadband services (eMBB)
and massive machine type communication (mMTCs), real
time management systems will also profit from ultra-reliable
low latency communications (URRLC).
This is a summary of the seminary given by Dr. MohamedSlim Alouini of KAUST university the Friday 18th October at
the national school of computer science (ENSIAS) where he
has given a talk about the 6th generation of mobile networks
under the title of “Smart Villages: When Affordability Meets
Connectivity”. The main point of the talk was the physical
and material challenges of deploying a pro-efficient and
affordable network that enable us to create not only smart
cities but also smart villages and why not a smart living.
increasing levels of connectivity and automation. As with
all networked computing devices, increased connectivity
often results in a heightened risk of a cyber security attack.
Furthermore, increased automation exacerbates any risk by
increasing the opportunities for the adversary to implement
a successful attack. This topic was discussed in the seminary
given by Pr. JALEL BEN-OTHMAN from Paris13 Univer-
sity at Friday the fist November 2019 at the national school
of computer science (ENSIAS) where he talked about the
threats and solutions for connected vehicles in cyberspace.
The main point of the talk was the cyber threats facing con-
nected Vehicles and the future challenges where he start by
Detailing the distributed approach and localization approach
in telecom networks introducing the concept of connected
car a car that is equipped with Internet access, and usually
also with a wireless local area network. This allows it to
share internet access, and hence data, with other devices
both inside and outside the vehicle From what leads to the
Problematic of software vulnerabilities becoming accessible
to malicious hackers using cellular networks, Wi-Fi, and
hardline connections to exploit them with the inability to
disclose the source of the attack that can effect any not
secure car system that can lead to issues not only to the
driver but to others connected to him.
2. Emerging
and showcase their thoughts, ideas and solutions to managing security issues along with the opportunity to network,
promote and connect with those that make decisions related
to security in EuropeCyber-attacks know no borders, but our
response capacity differs very much from one country to the
other, creating loopholes where vulnerabilities attract even
more the attacks. The EU needs more robust and effective
structures to ensure strong cyber resilience and respond to
cyber-attacks. We do not want to be the weakest links in this
global threat To equip Europe with the right tools to deal
with an ever-changing cyber threat, in 2017 the European
Commission and the High Representative proposed a wideranging set of measures to build strong cybersecurity in
the EU. These efforts are now being complemented by a
proposal helping the EU to pool resources and expertise in
research and innovation, and to become a leader in the next
generation of cybersecurity and digital technologies.
The essential objective of this document is to design and implement IP network of a company.
During my work, the first mission was to realize comparative analysis to look for the most suitable type of cable to construct an adequate network for the whole company building. Then, i realize also a comparative study to choose the right switch and router to set up the LAN architecture building located in Casablanca, then the WAN architecture that is located between Casablanca and Rabat, and Finally I reinforced my architecture using multiple security protocols, all this work is represented with PACKET TRACER software.
Keywords: cabling, LAN, WAN, security, PACKET TRACER…