International Conference Papers
Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/4
Browse
17 results
Search Results
Item Towards Big Data Analytics over Mobile User Data using Machine Learning(IEEE, 2023-01) Ichou, Sabrina; Hammoudi, Slimane; Cuzzocrea, Alfredo; Meziane, Abdelkrim; Benna, AmelMachine Learning (ML) is a science that forces computers to learn and behave like humans. As these systems interact with data, networks, and people, they automatically become smarter so that they can eventually solve or predict a practical issue in the world for us. The use of ML can be a giant leap for cannot simply be integrated as the top layer. This requires redefining workflow, architecture, data collection and storage, analytics, and other modules. This paper aims to discuss the issue of machine learning technique for analysis data of mobile user. First, we identified the machine learning benefits and drawbacks, challenges, advantages of using Machine Learning. Then, we propose a generic model of analytic mobile user data using ML, the model is centered on the machine learning component, which interacts with two other components, including mobile user data, and system. The interactions go in both directions. For instance, mobile user data serves as inputs to the learning component and the latter generates outputs; system architecture has impact on how learning algorithms should run and how efficient it is to run them, and simultaneously meeting. Mobile user data goes through several stages: prepossessing which includes the steps we need to follow to transform or encode the data so that it can be easily analyzed by the machine. Then, modelling in this step we will be clustering and classification the data obtained. Finally, evaluation, various measures of performance, accuracy, recall, precision, and F-measure were used to analyze the results of the naive Bayes, SVM, and K-nearest neighbor classification algorithms.Item Optimizing Cloud Energy Consumption Using Static Task Scheduling Algorithms: A Comparative Study(IEEE, 2023-12) Khiat, AbdelhamidCloud data centers, comprising a diverse set of heterogeneous resources working collaboratively to achieve high-performance computing, face the challenge of resource dynamism, where performance fluctuates over time. This dynamism poses complexities in task scheduling, warranting further research on the resilience of existing static task scheduling algorithms when deployed in dynamic cloud environments. This study adapts three well-known task scheduling algorithms to the cloud computing context and conducts a comprehensive comparison to assess their resilience to dynamic conditions. The evaluation, employing simulation techniques, analyzes total energy consumption and total response time as key metrics. The results offer detailed insights into the effectiveness of the adapted algorithms, providing valuable guidance for optimizing task scheduling in dynamic cloud data centers.Item Intrusion Detection Systems using Data Mining Techniques: A comparative study(IEEE, 2022-01-20) Haddadi, Mohamed; Khiat, Abdelhamid; Bahnes, NaceraData mining tools are widely used in computer networks. The well-known and mostly used tools to secure computers and network systems are WEKA and TANAGRA. The purpose of this study is to compare these two tools in terms of detection accuracy and computation time. This comparison was conducted using a well-known NSL-KDD dataset. Experiments show that TANAGRA achieves better results than WEKA in detection accuracy. But, TANAGRA is competitive with WEKA in terms of computation time.Item DPFTT: Distributed Particle Filter for Target Tracking in the Internet of Things(IEEE, 2023-11-07) Boulkaboul, Sahar; Djenouri, Djamel; Bagaa, MiloudA novel distributed particle filter algorithm for target tracking is proposed in this paper. It uses new metrics and addresses the measurement uncertainty problem by adapting the particle filter to environmental changes and estimating the kinematic (motion-related) parameters of the target. The aim is to calculate the distance between the Gaussian-distributed probability densities of kinematic data and to generate the optimal distribution that maximizes the precision. The proposed data fusion method can be used in several smart environments and Internet of Things (IoT) applications that call for target tracking, such as smart building applications, security surveillance, smart healthcare, and intelligent transportation, to mention a few. The diverse estimation techniques were compared with the state-of-the-art solutions by measuring the estimation root mean square error in different settings under different conditions, including high-noise environments. The simulation results show that the proposed algorithm is scalable and outperforms the standard particle filter, the improved particle filter based on KLD, and the consensus-based particle filter algorithm.Item On the challenges of mobility prediction in smart cities(Copernicus Publications, 2020) Boukhedouma, H.; Meziane, Abdelkrim; Hammoudi, S.; Benna, AmelThe mass of data generated from people’s mobility in smart cities is constantly increasing, thus making a new business for large companies. These data are often used for mobility prediction in order to improve services or even systems such as the development of location-based services, personalized recommendation systems, and mobile communication systems. In this paper, we identify the mobility prediction issues and challenges serving as guideline for researchers and developers in mobility prediction. To this end, we first identify the key concepts and classifications related to mobility prediction. We then, focus on challenges in mobility prediction from a deep literature study. These classifications and challenges are for serving further understanding, development and enhancement of the mobility prediction vision.Item Leap motion controller for upper limbs physical rehabilitation in post-stroke patients: a usability evaluation(2022-05) Hadjadj, Zineb; Masmoudi, Mostefa; Meziane, Abdelkrim; Zenati, NadiaStroke in Algeria is one of the most important causes of severe physical disability. Since the disease strongly influences the quality of life of patients, optimal solutions for the treatment of post-stroke patients are needed. The use of new technologies in the field of rehabilitation aims to reduce the impact of functional problems. Recent studies have shown that technologies such as virtual reality and video games can provide a way that can motivate and help patients recover their motor skills. In this paper, our objective is to evaluate the usability of the Leap Motion Controller virtual reality system (LMC), which is a sensor that captures the movement of the patient's hands and fingers without the need to place sensors or devices on the body, with serious games specifically designed for upper limbs rehabilitation in post-stroke patients. We measured the usability of the LMC system used with serious games as well as the level of satisfaction among healthy participants and post-stroke patients from Bounaama Djilali Hospital (CHU Douera) in Algeria. The results show favorable data, for the first time, the LMC is a usable tool, measured by the System Usability Scale (SUS). In addition, participants demonstrated good motivation, enjoyment and the majority of them said that they would like to use the proposed system in future treatment. Nevertheless, further studies are needed to confirm these preliminary findings.Item PReDIHERO – Privacy-Preserving Remote Deep Learning Inference based on Homomorphic Encryption and Reversible Obfuscation for Enhanced Client-side Overhead in Pervasive Health Monitoring(IEEE, 2021) Boulemtafes, Amine; Derhab, Abdelouahid; Ait Ali Braham, Nassim; Challal, YacineHomomorphic Encryption is one of the most promising techniques to deal with privacy concerns, which is raised by remote deep learning paradigm, and maintain high classification accuracy. However, homomorphic encryption-based solutions are characterized by high overhead in terms of both computation and communication, which limits their adoption in pervasive health monitoring applications with constrained client-side devices. In this paper, we propose PReDIHERO, an improved privacy-preserving solution for remote deep learning inferences based on homomorphic encryption. The proposed solution applies a reversible obfuscation technique that successfully protects sensitive information, and enhances the client-side overhead compared to the conventional homomorphic encryption approach. The solution tackles three main heavyweight client-side tasks, namely, encryption and transmission of private data, refreshing encrypted data, and outsourcing computation of activation functions. The efficiency of the client-side is evaluated on a healthcare dataset and compared to a conventional homomorphic encryption approach. The evaluation results show that PReDIHERO requires increasingly less time and storage in comparison to conventional solutions when inferences are requested. At two hundreds inferences, the improvement ratio could reach more than 30 times in terms of computation overhead, and more than 8 times in terms of communication overhead. The same behavior is observed in sequential data and batch inferences, as we record an improvement ratio of more than 100 times in terms of computation overhead, and more than 20 times in terms of communication overhead.Item Investigating Security and Privacy Concerns in Deep-Learning-based Pervasive Health Monitoring Architectures(IEEE, 2023-11) Boulemtafes, Amine; Amira, Abdelouahab; Derki, Mohamed Saddek; Hadjar, SamirPervasive Health Monitoring (PHM) uses sensors and wearable devices and data analytics for real-time health monitoring. It enables early detection and personalized care interventions. This technology has the potential to revolutionize healthcare by improving proactive and preventive care.Besides, Deep learning (DL) based PHM is even more promising as it improves the discovery of complex patterns and correlations. This leads to precise health monitoring and personalized care, enhances diagnostics, and ultimately improves patient outcomes in the field of healthcare.However, privacy and security considerations must be addressed for successful implementation. This paper investigates the security and privacy concerns in Pervasive Health Monitoring architectures. It discusses through an illustrative DL-based PHM architecture the potential threats and attacks during the inference and training phases, and identifies key security and privacy issues. It also gives insights on countermeasures and technological solutions that can address security and privacy concerns in PHM architectures.Item BSIF Features Learning using TXQEDA Tensor Subspace for kinship verification(Echahid Cheikh Larbi Tebessi university, 2023-06) Aliradi, Rachid; Ouamane , AbdealmalikFacial kinship verification is a hard research domain in vision that has very interesting regard in the latest decennial. Various applications were really realized in social media, biometrics, and development in studies of demographic. But the result accuracies obtained that is so weak to predict kinship relationships by facial appearance. To take up this challenge and tackle this problem. We use a new approach called Color BSIF learning an approach that has appeared as an encouraging solution. The aim is to solve problem KV by using the color BSIF learning features with the TXQEDA method for dimensionality reduction and data classification in order to train the model, Let's test the kinship facial verification application namely the Cornell Kinface database. This framework ameliorates the time cost and efficiency. The experimental results obtained surpass other states of the art methodsItem HMC-COVID-19: Hidden Markov Chains Model for COVID-19 Diagnosis(IEEE, 2023) Goumiri, Soumia; Benboudjema, DalilaMarkov chains are probabilistic models that are useful in different image processing tasks. This paper presents an approach based on Hidden Markov Chain (HMCs) to diagnose COVID-19, that we named HMC-COVID-19. To assess the performance of the proposed solution, we use a public dataset of chest X-RAY images. Our solution has been evaluated using the accuracy of prediction. The preliminary results are promising and can be further enhanced.