• Usages des outils web 2.0 à travers les sites web des bibliothèques du réseau universitaire algérien 

    Loukem, Mohamed El Hadi
    In : Mémoires de PGS, (Centre de Recherche sur l'Information Scientifique et Technique - CERIST, 2014-02-20)
    Le monde de l’information et de l’accès à la connaissance connaît depuis quelques années un contexte de transformations intenses. La dématérialisation de l’information et le développement de l’accès à distance via internet participent à rendre les bibliothèques de moins en moins visibles. D’autant plus que la facilité ...
  • Usages du web social via les sites web des bibliothèques algériennes : cas du réseau universitaire 

    Loukem, Mohamed El Hadi; Aliouali, Nadia
    In : (Centre de recherche sur l'information scientifique et technique - CERIST, 2016-05-20)
    L’émergence du web 2.0, dit web social apparaît comme un nouveau bouleversement majeur. Symbolisé par quelques applications phares, comme Youtube, Wikipedia, mySpace ou encore les blogs, le web 2.0 regroupe en réalité un ensemble de pratiques considérées comme nouvelles. Toutes sont basées sur le retour de l’usager au ...
  • User interfaces for ubiquitous computing 

    Chekaoui, Faïza
    In : Rapports de recherche internes, (CERIST, Alger, 2013)
    The user interface is the component which acts on-behalf the system; it should then benefits from great design attention. In this paper I introduce the principle classes of ubiquitous user interfaces, with an emphasis on input devices. In the second section, I present a number of current research challenges followed by ...
  • User Profile Extraction Based on Social Tagging Case Study: Handicrafts women in emerging countries 

    Kichou, Saida; Meziane, Abdelkrim
    In : Rapports de recherche internes, (CERIST, Alger, 2015-07)
    Social tagging systems are based on assigning keywords freely by users, which promotes resources sharing and organization and improves information retrieval. The tags allocation by users is illustrated particularly in sites sharing photos or videos (Flickr, YouTube). As navigations and clicks, tags can be good indicators ...
  • Using Clustering and Modified Classification algorithm without a learning corpus for automatic text summarization 

    Aries, Abdelkrime; Oufaida, Houda; Nouali, Omar
    In : The 20th international conference on document recognation and retrieval DRR, (San Fransisco California USA, 2013-02-05)
    In this paper we describe a modified classification method destined for extractive summarization purpose. The classification in this method doesn’t need a learning corpus; it uses the input text to do that. First, we cluster the document sentences to exploit the diversity of topics, then we use a learning algorithm (here ...
  • Using MDA approach to enhance Web services description with social information 

    Benna, Amel; Ahmed-Nacer, Mohamed
    In : Rapports de recherche internes, (CERIST, Alger, 2013-05)
    Recent research on Web services has demonstrated the need of including the social dimension into different stages of the Web service lifecycle. Also researchers have found that social relationships between Web services can be identified using social network concepts. However, much of these works are focused on how to ...
  • Using semantic Web to reduce the colt-sart 

    Nouali, Omar; Belloui, Amokrane
    In : Rapports de recherche internes, (CERIST, Alger, 2009-06)
    Collaborative filtering systems suffer from the cold-start problems (evaluation matrix, new user/new resource problem...). In this paper, we show that using semantic information describing users and resources can reduce the problems and lead to a better precision, coverage and quality for the recommendation engine. ...
  • Using tags Associated to Resources to Build Ontologies 

    Keddari, Djalila; Mellah, Hakima; Benna, Amel
    In : Rapports de recherche internes, (CERIST, Alger, 2014-06-18)
    Social tagging has recently emerged in the collaborative web as a support shared resources organization allowing users to categorize these resources, that can be web pages, video, or images, by associating them with keywords, called tags. However, the use of uncontrolled tags poses several problems, namely ambiguity, ...
  • Using tags Associated to Resources to Build Ontologies 

    Keddari, Djalila; Mellah, Hakima; Benna, Amel
    In : Workshop on 7th Natural Language Processing and Ontology Engineering (NLPOE 2014), (Pologne, 2014-08-11)
    Social tagging has recently emerged in collaborative web (Web 2.0) as a support shared resources organization allowing users to categorize these resources (web pages, video, images) by associating them with keywords, called tags. However, the use of uncontrolled tags poses several problems, namely ambiguity, writing ...
  • Utilisation des cartes auto-organisatrices de Kohonen dans la recherche documentaire 

    Bessai, Fatma-Zohra; Guergab, Mohamed; Krelifaoui, Mohamed
    In : Revue d'Information Scientifique et Technique (RIST), (CERIST, Alger, 2003)
    La quantité toujours croissante de données textuelles nécessite un effort constant pour la mise au point de méthode de stockage et de consultation afin que la totalité des informations conservées reste accessible de manière satisfaisante. Dans ce travail nous nous intéressons à la conception et la réalisation d’un système ...
  • VANET's Mobility Models and Overtaking: An Overview 

    Djenouri, Djamel; Nekka, Elmalik; Soualhi, Wassim
    In : 3rd International Conference on Information and Communication Technologies: From Theory to Applications, (IEEE, Damascus, Syria, 2008-04)
    The most important feature of vehicular ad hoc networks (VANETs) is the high mobility of nodes, which makes the mobility model one of the most important parameters that should be carefully selected when evaluating any protocol. To correctly and faithfully evaluate protocols in a simulation study, the model should be as ...
  • Vectorial Information Structuring for Documents Filtering and Diffusion 

    Nouali, Omar; Krinah, Abdelghani
    In : The International Arab Journal of Information Technology (IAJIT), (Zarqa Private University, 2008)
    Information retrieval tries to identify relevant documents for an information need. The problems that an IR system should deal with include document indexing (which tries to extract important content from a document), user needs analysis (similar to document indexing but applied to a query), and their internal representation ...
  • Verbose Query Reduction by Learning to Rank for Social Book Search Track 

    Chaa, Messaoud; Nouali, Omar; Bellot, Patrice
    In : Rapports de recherche internes, (CERIST, Alger, 2016-07)
    In this paper, we describe our participation in the INEX 2016 Social Book Search Suggestion Track (SBS). We have exploited machine learning techniques to rank query terms and assign an appropriate weight to each one before applying a probabilistic information retrieval model (BM15). Thereafter, only the top-k terms are ...
  • Vers un langage de haut niveau pour la recherche d’information multimédia 

    Amrane, Abdesalam
    In : Mémoires de Magister, (Université Abderrahmane Mira, Bejaia, 2013)
    L‘indexation multimédia vise à mieux représenter l‘information présente dans le multimédia, en d‘autre terme c‘est extraire la sémantique d‘un contenu multimédia. La sémantique peut être extraite soit à partir du texte environnant ou à partir du contenu visuel. L‘indexation par le texte souffre du problème d‘ambiguïté ...
  • Vérification formelle des propriétés de sécurité des logiciels 

    Mohand Oussaïd, Linda
    In : Mémoires de Magister, (Institut National de Formation en Informatique (INI), Oued Smar, El Harrach - Alger, 2006)
    Cette thèse présente une démarche de vérification formelle des propriétés de sécurité des logiciels. En effet, après étude des approches possibles : preuve formelle et model checking, nous avons identifié le model checking comme étant l'approche la plus adéquate pour notre problématique. Ainsi, la démarche proposée est ...
  • Visual Data Mining by Virtual Reality for Protein-Protein Interaction Networks 

    Aouaa Noureddine;; Gherbi Rachid; Meziane Abdelkrim; Hayat Hadjar; Insaf Setitra
    In : Rapports de recherche internes, (CERIST, Alger, 2018-03-28)
    Currently, visualization techniques in the genetic field require a very important modeling phase in terms of resources. Traditional modeling techniques (in two dimensions) are rarely adapted to manage and process this mass of information. To overcome this kind of problem, we propose to use a new graph modeling technique ...
  • Watermarking of Compressed Video based on DCT Coefficients and Watermark Preprocessing 

    Bouchama, Samira; Hamami, Latifa; Aliane, Hassina
    In : International Conference on Imaging Theory and Applications, (Algarve-Portugal, 2011-03-05)
    Considering the importance of watermarking of compressed video, several watermarking methods have been proposed for authentication, copyrights protection or simply for a secure data carrying through the Internet. Applied to the H.264/AVC video standard, in most of cases, these methods are based on the use of the ...
  • Watermarking of compressed video based on DCT coefficients and watermark preprocessing 

    Bouchama, Samira; Hamami, Latifa; Aliane, Hassina
    In : Rapports de recherche internes, (CERIST, Alger, 2010-12)
    Considering the importance of watermarking of compressed video, several watermarking methods have been proposed for authentication, copyrights protection or simply for a secure data carrying through the Internet. Applied to the H.264/AVC video standard, in most of cases, these methods are based on the use of the quantized ...
  • Watermarking of H.264 Coded Video Based on the Shifted-Histogram Technique 

    Bouchama, Samira; Hamami, Latifa; Qadri, Muhammad Tahir; Ghanbari, Mohammed
    In : International Journal of Latest Trends in Computing (IJLTC), (2010-12)
    Reversible video watermarking through shifted histogram of the quantized coefficients of the H.264/AVC coded video is introduced. In CIF sequences, the embedded data of a capacity of more than 2500 bits in I frame is possible and can exceed 7000 bits if we also exploit about 10 P frames in the GOP for the embedding. While ...
  • Watermarking techniques applied to H264/AVC video standard 

    Bouchama, Samira; Hamami, Latifa; Aliane, Hassina
    In : International Conference on Information Science and Applications, (Seoul-Korea, 2010-04-21)
    Video watermarking describes the process of embedding information in video to satisfy applications such as the protection of intellectual property and the control of video authentication. In this field, researchers orient their investigations towards the new video standard H264/AVC which is increasingly used because ...