Academic & Scientific Articles
Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/3
Browse
52 results
Search Results
Item Multi-CNN Model for Multi-Classification of Cultural Heritage Monuments(CERIST, 2024-04) Djelliout, Toufik; Aliane, HassinaThe use of convolutional neural networks (CNN) in the preservation of cultural heritage monuments, especially in conflict-affected regions such as Gaza, Ukraine, Iraq and others, represents a significant advancement in heritage conservation efforts. This paper presents an approach that uses a Multi-CNN model to classify images of cultural heritage monuments into various categories, encompassing period, monument type and location. By leveraging the capabilities of CNNs, this model demonstrates a high level of accuracy in categorizing heritage monuments based on multiple attributes. The study highlights the superior performance of the Multi-CNN model compared to other popular models such as DenseNet169, GoogleNet and MnasNet, highlighting its effectiveness in accurately classifying images of cultural heritage monuments in various dimensions. According to the evaluation results, the top-performing multi-CNN model achieves a classification accuracy of 94.52%, outperforming the single CNN models. The DenseNet196 model achieves 93.70% accuracy, the MnasNet model achieves 92.80% accuracy, and the GoogleNet model achieves 88.18% accuracy.Item Applied Gaming-Based Emotion- Driven on Disaster Resilience Training(CERIST, 2024-11) Hadjar, Hayette; Hemmje, Matthias; Hadjadj, Zineb; Meziane, AbdelkrimManaging stress in disaster response environments is a critical challenge that requires effective strategies to enhance the resilience and well-being of emergency responders. This study introduces DisasterPlay, a prototype web-based platform designed for resilience training. The prototype features a comprehensive model design, user interface, and implementation using WebXR, facial emotion monitoring, and contactless vital signs monitoring. This approach not only improves the training experience but also aids decisionmakers in selecting the most suitable candidates for high-stakes tasks, thereby enhancing resource allocation. Accessible via web browsers and utilizing cloud-based data processing, this innovative platform aims to provide a robust solution for advancing disaster response strategies.Item Toward an Approach for Job Recommender System: Leveraging Hybrid Techniques(CERIST, 2024-11) Khider, Hadjer; Meziane, Abdelkrim; Hammoudi, SlimaneThe rapid evolution of the job market, driven by digitalization and changing business environment dynamics, requires the development of sufficient job recommender systems. A significant number of challenges are facing those job seekers on LinkedIn professional social network. These LinkedIn users are seeking job-maker proposals that align with their business needs. Supporting these job seekers is a real challenge. In order to address this deficiency, we propose a methodology for job recommender systems on the professional social network LinkedIn, based on the user profiles on that platform. This paper presents a user-centric design approach and recommendation process for jobs based on the social profile of the LinkedIn users. The proposed approach to job recommendation combines hybrid techniques, integrating collaborative filtering, content-based filtering, context aware recommendation. In this paper, we introduce a user-centric and interactive framework that enables job seekers to interact with our Job Recommender System to provide the most relevant and valuable recommendations. The proposed framework is designed to addressing common challenges in the field; this approach aims to enhance recommendation accuracy and user satisfaction.Item A Rhetorical Relations-Based Framework for Tailored Multimedia Document Summarization(CERIST, 2024-05) Maredj, Azze-eddine; Sadallah, MadjidIn the rapidly evolving landscape of digital content, the task of summarizing multimedia documents, which encompass textual, visual, and auditory elements, presents intricate challenges. These challenges include extracting pertinent information from diverse formats, maintaining the structural integrity and semantic coherence of the original content, and generating concise yet informative summaries. This paper introduces a novel framework for multimedia document summarization that capitalizes on the inherent structure of the document to craft coherent and succinct summaries. Central to this framework is the incorporation of a rhetorical structure for structural analysis, augmented by a graph-based representation to facilitate the extraction of pivotal information. Weighting algorithms are employed to assign significance values to document units, thereby enabling effective ranking and selection of relevant content. Furthermore, the framework is designed to accommodate user preferences and time constraints, ensuring the production of personalized and contextually relevant summaries. The summarization process is elaborately delineated, encompassing document specification, graph construction, unit weighting, and summary extraction, supported by illustrative examples and algorithmic elucidation. This proposed framework represents a significant advancement in automatic summarization, with broad potential applications across multimedia document processing, promising transformative impacts in the field.Item Resource allocation approaches for business processes in the era of digitalization: A Survey(CERIST, 2024-06) Khider, HadjerResource allocation is a critical component of business process management (BPM) that directly impacts the efficiency and effectiveness of organizational operations. It involves the strategic assignment of resources, including personnel, equipment, and materials, to various activities and tasks within a business process. Effective resource allocation is imperative for inhancing productivity, minimizing costs, and ensuring seamless process execution. This paper presents a review of existing research on resource allocation for business processes associated in the context of digitalization, identifying different approaches of resource allocation for business processes in the era of digitalization.Item Towards Big Data Analytics over Mobile User Data using Machine Learning(IEEE, 2023-01) Ichou, Sabrina; Hammoudi, Slimane; Cuzzocrea, Alfredo; Meziane, Abdelkrim; Benna, AmelMachine Learning (ML) is a science that forces computers to learn and behave like humans. As these systems interact with data, networks, and people, they automatically become smarter so that they can eventually solve or predict a practical issue in the world for us. The use of ML can be a giant leap for cannot simply be integrated as the top layer. This requires redefining workflow, architecture, data collection and storage, analytics, and other modules. This paper aims to discuss the issue of machine learning technique for analysis data of mobile user. First, we identified the machine learning benefits and drawbacks, challenges, advantages of using Machine Learning. Then, we propose a generic model of analytic mobile user data using ML, the model is centered on the machine learning component, which interacts with two other components, including mobile user data, and system. The interactions go in both directions. For instance, mobile user data serves as inputs to the learning component and the latter generates outputs; system architecture has impact on how learning algorithms should run and how efficient it is to run them, and simultaneously meeting. Mobile user data goes through several stages: prepossessing which includes the steps we need to follow to transform or encode the data so that it can be easily analyzed by the machine. Then, modelling in this step we will be clustering and classification the data obtained. Finally, evaluation, various measures of performance, accuracy, recall, precision, and F-measure were used to analyze the results of the naive Bayes, SVM, and K-nearest neighbor classification algorithms.Item A cooperative framework for automated segmentation of tumors in brain MRI images(Springer, 2023-03) Hadjadj, ZinebBrain tumor segmentation from 2D Magnetic Resonance Images (MRI) is an important task for several applications in the field of medical analysis. Commonly, this task is performed manually by medical professionals, but it is not always obvious due to similarities between tumors and normal tissue and variations in tumor appearance. Therefore, the automation of medical image segmentation remains a real challenge that has attracted the attention of several researchers in recent years. Instead of choosing between region and contour approaches, in this article, we propose a region-edge cooperative method for brain tumor segmentation from MRI images. The region approach used is support vector machines (SVMs), one of the popular and highly motivated classification methods, the method distinguishes between normal and abnormal pixels based on some features: intensity and texture. To control and guide the segmentation region, we take advantage of the Ron Kimmel geodesic Active Contour Model (ACM) which produces a good delimitation of the boundaries of the object. The two methods have been cooperated sequentially in order to obtain a flexible and effective system for brain tumor segmentation. Experimental studies are performed on synthetic and real 2D MRI images of various modalities from the radiology unit of the university hospital center in Bab El Oued Algeria. The used MRI images represent various tumor shapes, locations, sizes, and intensities. The proposed cooperative framework outperformed SVM-based segmentation and ACM-based segmentation when executed independently.Item Efficient Machine Learning-based Approach for Brain Tumor Detection Using the CAD System(Taylor & Francis, 2023-04) Guerroudji, Mohamed Amine; Hadjadj, Zineb; Lichouri, Mohamed; Amara, Kahina; Zenati, NadiaMedical research has focused on improving diagnosis through medical imaging in recent decades. Computer Assisted Diagnosis (CAD) systems have been developed to help doctors identify suspicious areas of interest, particularly those with cancer-like characteristics. CAD systems employ various algorithms and techniques to extract important numerical measurements from medical images that clinicians can use to evaluate patient conditions. This study proposes a statistical classification-based approach to efficient brain cancer detection. The proposed approach operates in three stages: first, Gradient Vector Flow (GVF) Snake models and mathematical morphology techniques retrieve regions of interest. The second stage characterizes these regions using morphological and textural parameters. Finally, a Bayesian network uses this description as input to identify malignant and benign cancer classes. We also compared the performance of the Bayesian network with other popular classification algorithms, including SVM, MLP, KNN, Random Forest, Decision Tree, XGBoost, LGBM, Gaussian Process, and RBF SVM. The results showed the superiority of the Bayesian network for the task of brain tumor classification. The proposed approach has been experimentally validated, with a sensitivity of 100% and a classification accuracy of over 98% for tumors, demonstrating the high efficiency of cancer cell segmentation.Item Optimizing Cloud Energy Consumption Using Static Task Scheduling Algorithms: A Comparative Study(IEEE, 2023-12) Khiat, AbdelhamidCloud data centers, comprising a diverse set of heterogeneous resources working collaboratively to achieve high-performance computing, face the challenge of resource dynamism, where performance fluctuates over time. This dynamism poses complexities in task scheduling, warranting further research on the resilience of existing static task scheduling algorithms when deployed in dynamic cloud environments. This study adapts three well-known task scheduling algorithms to the cloud computing context and conducts a comprehensive comparison to assess their resilience to dynamic conditions. The evaluation, employing simulation techniques, analyzes total energy consumption and total response time as key metrics. The results offer detailed insights into the effectiveness of the adapted algorithms, providing valuable guidance for optimizing task scheduling in dynamic cloud data centers.Item Intrusion Detection Systems using Data Mining Techniques: A comparative study(IEEE, 2022-01-20) Haddadi, Mohamed; Khiat, Abdelhamid; Bahnes, NaceraData mining tools are widely used in computer networks. The well-known and mostly used tools to secure computers and network systems are WEKA and TANAGRA. The purpose of this study is to compare these two tools in terms of detection accuracy and computation time. This comparison was conducted using a well-known NSL-KDD dataset. Experiments show that TANAGRA achieves better results than WEKA in detection accuracy. But, TANAGRA is competitive with WEKA in terms of computation time.