Soumissions récentes

  • Intégration de l’utilisateur dans un modèle de recherche sociale 

    Bessai Mechmache, Fatma Zohra; Hammouche, Karima; Alimazighi, Zaia
    In : (Al Hoceima, Maroc, 2017-05)
    Dans cet article nous proposons un nouveau modèle de recherche d’information sociale basé sur un ordonnancement conjoint des documents, des auteurs et des utilisateurs d’un réseau bibliographique dans un réseau hétérogène. Ce modèle enrichit la structure du réseau en introduisant l’utilisateur comme une entité du réseau ...
  • Les Manuscrits Arabes Anciens En Ligne : Pratiques et Recommandations 

    Habbak, Noureddine; Meziane, Abdelkrim
    In : Rapports de recherche internes, (CERIST, Alger, 2017-04-10)
    Les technologies de l’information ont révolutionné la bibliothèque classique. Aujourd’hui, de nombreuses bibliothèques passent au monde numérique. L’accès aux documents qui ont tendance à se détériorer rapidement et qui sont très demandés tels que les manuscrits arabes anciens, devient de plus en plus simple, ce qui ...
  • Les Manuscrits Arabes Anciens En Ligne : Pratiques et Recommandations 

    Habbak, Noureddine; Meziane, Abdelkrim
    In : (Al-Hoceima (Maroc), 2017-05-11)
    Les technologies de l’information ont révolutionné la bibliothèque classique. Aujourd’hui, de nombreuses bibliothèques passent au monde numérique. L’accès aux documents qui ont tendance à se détériorer rapidement et qui sont très demandés tels que les manuscrits arabes anciens devient de plus en plus simple, ce qui assure ...
  • Fast and smart object proposals for object detection 

    Amrane, Abdesalam; Meziane, Abdelkrim; Boulekrinat, Houda; Atik, Ali
    In : Rapports de recherche internes, (CERIST, Alger, 2017-05-11)
    Object localization plays an important role in object detection and classification. In the last years, several methods have shifted from sliding windows techniques to object proposals techniques. The latter produces a small set of windows submitted to an object classifier to reduce the computational time. In this paper, ...
  • REFIACC: Reliable, efficient, fair and interference-aware congestion control protocol for wireless sensor networks 

    Kafi, Mohamed Amine; Ben-Othman, Jalel; Ouadjaout, Abdelraouf; Bagaa, Miloud
    In : (Elsevier, 2017)
    The recent wireless sensor network applications are resource greedy in terms of throughput and net- work reliability. However, the wireless shared medium leads to links interferences in addition to wireless losses due to the harsh environment. The effect of these two points translates on differences in links bandwidth ...
  • Accelerated Search over Encrypted Cloud Data 

    Boucenna, Fateh; Nouali, Omar; Dabah, Adel; Kechid, Samir
    In : (IEEE, Jeju, Corée du sud, 2017-02-13)
    Companies and other organizations such as hospitals seek more and more to enjoy the benefits of cloud computingin terms of storage space and computing power. However, outsourced data must be encrypted in order to be protected againstpossible attacks. Therefore, traditional information retrieval systems (IRS) are no longer ...
  • Efficient On-Demand Multi-Node Charging Techniques for Wireless Sensor Networks 

    Khelladi, Lyes; Djenouri, Djamel; Rossi, Michele; Badache, Nadjib
    In : (Elsevier, 2016-10-01)
    This paper deals with wireless charging in sensor networks and explores efficient policies to perform simultaneous multi-node power transfer through a mobile charger (MC).The proposed solution, called On-demand Multi-node Charging (OMC), features an original threshold-based tour launching (TTL) strategy, using request ...
  • Binarization of Document Images with Various Object Sizes 

    Hadjadj, Zineb; Meziane, Abdelkrim
    In : Rapports de recherche internes, (CERIST, Alger, 2017-02-01)
    There are a lot of document image binarization techniques that try to differentiate between foreground and background but many of them fail to correctly detect all the text pixels because of degradations. In this paper, a new binarization method for document images is presented. The proposed method is based on the most ...
  • Ontological Interaction Modeling and Semantic Rule-Based Reasoning for User Interface Adaptation 

    Lebib, Fatma-Zohra; Mellah, Hakima; Mohand Oussaid, Linda
    In : Rapports de recherche internes, (CERIST, Alger, 2016)
    Disabled users conducting their interactive tasks on their devices address challenges such as user interface adaptation. The paper provides a valuable knowledge for supporting adaptive user interfaces. In this work an interactive application development, in handicrafts’ domain is considered, with the aim to build ontology ...
  • Selection of Information Sources using a Genetic Algorithm 

    Lebib, Fatma Zohra; Drias, Habiba; Mellah, Hakima
    In : Rapports de recherche internes, (CERIST, Alger, 2017-01-02)
    We address the problem of information sources selection in a context of a large number of distributed sources. We formulate the sources selection problem as a combinatorial optimization problem in order to yield the best set of relevant information sources for a given query. We define a solution as a combination of ...
  • Toward an Approach to Improve Business Process Models Reuse Based on Linkedin Social Network 

    Khider, Hadjer; Benna, Amel; Meziane, Abdelkrim; Hammoudi, Slimane
    In : Rapports de recherche internes, (CERIST, Alger, 2017-01-10)
    Business process (BP) modeling is an important stage in BPM lifecycle. However, modeling BP from scratch is fallible task, complex, time-consuming and error prone task. One of the promising solutions to these issues is the reuse of BP models. BP reusability during the BP modeling stage can be very useful since it reduces ...
  • A tracking approach for text line segmentation in handwritten documents 

    Setitra, Insaf; Hadjadj, Zineb; Meziane, Abdelkrim
    In : Rapports de recherche internes, (CERIST, Alger, 2017-02-24)
    Tracking of objects in videos consists of giving a label to the same object moving in different frames. This labeling is performed by predicting position of the object given its set of features observed in previous frames. In this work, we apply the same rationale by considering each connected component in the manuscript ...
  • Survey and comparative study of Business process models repositories 

    Khider, Hadjer; Benna, Amel
    In : Rapports de recherche internes, (CERIST, Alger, 2016-12-21)
    A Business Process (BP) modeling is a complicated task, time-consuming, and error prone task. One of the promising solutions to overcome these challenges is by the reuse of BP models, consequently, it is important to provide a BP models repository to store thousands of BP models for business actors (e.g. analysts, modelers, ...
  • A tracking approach for text line segmentation in handwritten documents 

    Setitra, Insaf; Hadjadj, Zineb; Meziane, Abdelkrim
    In : (Springer, Porto, Portugal, 2017-02-24)
    Tracking of objects in videos consists of giving a label to the same object moving in different frames. This labeling is performed by predicting position of the object given its set of features observed in previous frames. In this work, we apply the same rationale by considering each connected component in the manuscript ...
  • Edit Distance: Sketching, Streaming, and Document Exchange 

    Belazzougui, Djamal; Zhang, Qin
    In : (IEEE, New Brunswick, New Jersey, 2016-12-19)
    We show that in the document exchange problem, where Alice holds x ∈ {0, 1}^n and Bob holds y ∈ {0, 1}^n , Alice can send Bob a message of size O(K(log^2 K + log n)) bits such that Bob can recover x using the message and his input y if the edit distance between x and y is no more than K, and output “error” otherwise. ...
  • Fully Dynamic de Bruijn Graphs 

    Belazzougui, Djamal; Gagie, Travis; Mäkinen, Veli; Previtali, Marco
    In : (Springer International Publishing, Beppu, Japan, 2016-09-21)
    We present a space- and time-efficient fully dynamic implementation of de Bruijn graphs, which can also support fixed-length jumbled pattern matching.
  • Bidirectional Variable-Order de Bruijn Graphs 

    Belazzougui, Djamal; Gagie, Travis; Mäkinen, Veli; Previtali, Marco; Puglisi, Simon J.
    In : (Springer International Publishing, Ensenada, Mexico, 2016-03-22)
    Implementing de Bruijn graphs compactly is an important problem because of their role in genome assembly. There are currently two main approaches, one using Bloom filters and the other using a kind of Burrows-Wheeler Transform on the edge labels of the graph. The second representation is more elegant and can even handle ...
  • Lempel-Ziv Decoding in External Memory 

    Belazzougui, Djamal; Kärkkäinen, Juha; Kempa, Dominik; Puglisi, Simon J.
    In : (Springer International Publishing, St. Petersburg, Russia, 2016-06-01)
    Simple and fast decoding is one of the main advantages of LZ77-type text encoding used in many popular file compressors such as gzip and 7zip. With the recent introduction of external memory algorithms for Lempel–Ziv factorization there is a need for external memory LZ77 decoding but the standard algorithm makes random ...
  • Performance analysis and evaluation of REFIACC using queuing networks 

    Kafi, Mohamed Amine; Ben Othman, Jalel; Mokdad, Lynda; Badache, Nadjib
    In : (Elsevier, 2017-02)
    Wireless Sensor Networks (WSN) utilisation is characterised by its dense deployment in order to fulfil the monitoring tasks. This density of communication leads to interference and congestion. In a previous work, a schedule scheme dubbed REFIACC (Reliable, Efficient, Fair and Interference Aware Congestion Control), that ...
  • Installation et configuration d’une solution de détection d’intrusions sans fil (Kismet) 

    Lounis, Karim; Babakhouya, Abdelaziz; Nouali-Taboudjemat, Nadia
    In : Rapports de recherche internes, (CERIST, Alger, 2011-06)
    Les réseaux sans fil (Wi-Fi, norme 802.11) offrent plusieurs avantages ; notamment en terme de mobilité, coût, débit et facilité de déploiement. Cependant, ils sont par nature plus sensibles aux problèmes de sécurité. Les mécanismes de sécurité (WEP, WPA, WPA2) ne permettent pas de se prévenir contre tous les problèmes ...

View more