Manel Abdellatif

  • Citations Per Year
Learn More
Malware detection on mobile phones involves analysing and matching large amount of data streams against a set of known malware signatures. Unfortunately, as the number of threats grows continuously, the number of malware signatures grows proportionally. This is time consuming and leads to expensive computation costs, especially for mobile devices where(More)
This work presents the design of the hardware architecture of an optimized and reusable vector PI (VPI) regulator, which is implemented on a field programmable gate array (FPGA) target. It is especially dedicated for FPGA-based vector controls of AC drives, where two or more PI current regulators are required at the same time. So, using only one optimized(More)
Program dependency artifacts such as call graphs help support a number of software engineering tasks such as software mining, program understanding, debugging, feature location, software maintenance and evolution. Java Enterprise Edition (JEE) applications represent a significant part of the recent legacy applications, and we are interested in modernizing(More)
In this paper, a Doubly Fed Induction Machine (DFIM) operating in motor mode and supplied by two Voltage Source Inverters (VSI), in stator and rotor sides, is presented. The aim is to analyze the position sensor fault effects on a Direct Torque Control (DTC) of the DFIM. This justifies the necessity of a reconfiguration control when a position sensor fault(More)
  • 1