Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Mhammed Chraibi"'
Publikováno v:
World Electric Vehicle Journal, Vol 15, Iss 1, p 1 (2023)
This research delves into the intricate landscape of energy scheduling and optimization within microgrid and residential contexts, addressing pivotal aspects such as real-time scheduling systems, challenges in dynamic pricing, and an array of optimiz
Externí odkaz:
https://doaj.org/article/b889965bcbe34e91ba8cbce31503b7d3
Publikováno v:
2021 12th International Renewable Engineering Conference (IREC).
This paper aims for reducing the energy demand in Morocco by means of developing the management system state-of-the-art. Three different scenarios are investigated, where dynamic pricing is applied along with effective appliance load scheduling to mi
Autor:
Mhammed Chraibi, Abdelilah Maach, Mohammed Boulmalf, Mehdia Ajana El Khaddar, Hamid Harroud, Mohammed Elkoutbi
Publikováno v:
International Journal of Pervasive Computing and Communications. 11:43-68
Purpose – This paper aims to demonstrate that a policy-based middleware solution which facilitates the development of context-aware applications and the integration of the heterogeneous devices should be provided for ubiquitous computing environmen
Publikováno v:
FiCloud
Cloud computing is amongst the major topics researched in Computer Science. Cloud computing security is at the heart of the topic. The reason behind this is that, as a technology, cloud computing is a great alternative that allows companies to outsou
Autor:
Mhammed Chraibi, Hamid Harroud, Mohammed Boulmalf, Mehdia Ajana El Khaddar, Abdelilah Maach, Mohammed Elkoutbi
Publikováno v:
2014 Science and Information Conference.
Autor:
Mhammed Chraibi, Hamid Harroud, Mehdia Ajana El Khaddar, Mohammed Elkoutbi, Abdelilah Maach, Mohammed Boulmalf
Publikováno v:
International Journal of Advanced Research in Artificial Intelligence. 3
Ubiquitous computing targets the provision of seamless services and applications by providing an environment that involves a variety of devices having different capabilities. The design of applications in these environments needs to consider the hete
Publikováno v:
MoMM
Security is becoming one of the major issues that mobile users face. With their powerful devices, they are willing to take advantage of the wide range of services provided in mobile environments. Therefore, in this paper, we propose a solution to pro