Publications

2018
Boudra S, Yahiaoui I, Behloul A. Bark identification using improved statistical radial binary patterns. 2018 International conference on content-based multimedia indexing (CBMI). 2018 :1-6.
Boudra S, Yahiaoui I, Behloul A. Bark identification using improved statistical radial binary patterns. 2018 International conference on content-based multimedia indexing (CBMI). 2018 :1-6.
Boudra S, Yahiaoui I, Behloul A. Bark identification using improved statistical radial binary patterns. 2018 International conference on content-based multimedia indexing (CBMI). 2018 :1-6.
Ali ATHAMENA, Redha MENANIM, Halima B, Z G, S T, K K. Barrages et Envirennement, une relation développé, Cas du Barrage de Beni-Haroun, Mila, Est Algerie. 2018.
Ali ATHAMENA, Redha MENANIM, Halima B, Z G, S T, K K. Barrages et Envirennement, une relation développé, Cas du Barrage de Beni-Haroun, Mila, Est Algerie. 2018.
Ali ATHAMENA, Redha MENANIM, Halima B, Z G, S T, K K. Barrages et Envirennement, une relation développé, Cas du Barrage de Beni-Haroun, Mila, Est Algerie. 2018.
Ali ATHAMENA, Redha MENANIM, Halima B, Z G, S T, K K. Barrages et Envirennement, une relation développé, Cas du Barrage de Beni-Haroun, Mila, Est Algerie. 2018.
Ali ATHAMENA, Redha MENANIM, Halima B, Z G, S T, K K. Barrages et Envirennement, une relation développé, Cas du Barrage de Beni-Haroun, Mila, Est Algerie. 2018.
Ali ATHAMENA, Redha MENANIM, Halima B, Z G, S T, K K. Barrages et Envirennement, une relation développé, Cas du Barrage de Beni-Haroun, Mila, Est Algerie. 2018.
Belferdi W, Behloul A, Noui L. A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimensional Systems and Signal ProcessingMultidimensional Systems and Signal Processing. 2018;30 :1093–1112.Abstract
The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
Belferdi W, Behloul A, Noui L. A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimensional Systems and Signal ProcessingMultidimensional Systems and Signal Processing. 2018;30 :1093–1112.Abstract
The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
Belferdi W, Behloul A, Noui L. A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimensional Systems and Signal ProcessingMultidimensional Systems and Signal Processing. 2018;30 :1093–1112.Abstract
The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
MCHEBILA. Bayesian Networks for Frequency Analysis in Dependability. J Fail. Anal. and PrevenJ Fail. Anal. and Preven. 2018;2018 :538–544.Abstract
The high suppleness of Bayesian networks has led to their wide application in a variety of dependability modeling and analysis problems. The main objective of this paper is to extend the use of such powerful tool to estimate the occurrence frequency of failures and consequences in a straightforward way. Such extension is based on the employment of a transformation operator to substitute the original terms with matrices that hold the full dependability description of the corresponding element. Two simple case studies in reliability and safety contexts are treated using the suggested method whose results are validated through their comparison to the corresponding results of other classical dependability techniques.
Medjghou A, Ghanai M, Chafaa K. BBO optimization of an EKF for interval type-2 fuzzy sliding mode control. International Journal of Computational Intelligence SystemsInternational Journal of Computational Intelligence Systems. 2018;11 :770–789.Abstract
In this study, an optimized extended Kalman filter (EKF), and an interval type-2 fuzzy sliding mode control (IT2FSMC) in presence of uncertainties and disturbances are presented for robotic manipulators. The main contribution is the proposal of a novel application of Biogeography-Based Optimization (BBO) to optimize the EKF in order to achieve high performance estimation of states. The parameters to be optimized are the covariance matrices Q and R, which play an important role in the performances of EKF. The interval type-2 fuzzy logic system is used to avoid chattering phenomenon in the sliding mode control (SMC). Lyapunov theorem is used to prove the stability of control system. The suggested control approach is demonstrated using a computer simulation of two-link manipulator. Finally, simulations results show the robustness and effectiveness of the proposed scheme, and exhibit a more superior performance than its conventional counterpart.
Medjghou A, Ghanai M, Chafaa K. BBO optimization of an EKF for interval type-2 fuzzy sliding mode control. International Journal of Computational Intelligence SystemsInternational Journal of Computational Intelligence Systems. 2018;11 :770–789.Abstract
In this study, an optimized extended Kalman filter (EKF), and an interval type-2 fuzzy sliding mode control (IT2FSMC) in presence of uncertainties and disturbances are presented for robotic manipulators. The main contribution is the proposal of a novel application of Biogeography-Based Optimization (BBO) to optimize the EKF in order to achieve high performance estimation of states. The parameters to be optimized are the covariance matrices Q and R, which play an important role in the performances of EKF. The interval type-2 fuzzy logic system is used to avoid chattering phenomenon in the sliding mode control (SMC). Lyapunov theorem is used to prove the stability of control system. The suggested control approach is demonstrated using a computer simulation of two-link manipulator. Finally, simulations results show the robustness and effectiveness of the proposed scheme, and exhibit a more superior performance than its conventional counterpart.
Medjghou A, Ghanai M, Chafaa K. BBO optimization of an EKF for interval type-2 fuzzy sliding mode control. International Journal of Computational Intelligence SystemsInternational Journal of Computational Intelligence Systems. 2018;11 :770–789.Abstract
In this study, an optimized extended Kalman filter (EKF), and an interval type-2 fuzzy sliding mode control (IT2FSMC) in presence of uncertainties and disturbances are presented for robotic manipulators. The main contribution is the proposal of a novel application of Biogeography-Based Optimization (BBO) to optimize the EKF in order to achieve high performance estimation of states. The parameters to be optimized are the covariance matrices Q and R, which play an important role in the performances of EKF. The interval type-2 fuzzy logic system is used to avoid chattering phenomenon in the sliding mode control (SMC). Lyapunov theorem is used to prove the stability of control system. The suggested control approach is demonstrated using a computer simulation of two-link manipulator. Finally, simulations results show the robustness and effectiveness of the proposed scheme, and exhibit a more superior performance than its conventional counterpart.
Karech T, Benseghir A, Bouzid T. The Behavior of Dam Foundation Reinforced by Stone Columns: Case Study of Kissir Dam-Jijel. International Journal of Civil and Environmental EngineeringInternational Journal of Civil and Environmental Engineering. 2018;11 :1187-1191.
Karech T, Benseghir A, Bouzid T. The Behavior of Dam Foundation Reinforced by Stone Columns: Case Study of Kissir Dam-Jijel. International Journal of Civil and Environmental EngineeringInternational Journal of Civil and Environmental Engineering. 2018;11 :1187-1191.
Karech T, Benseghir A, Bouzid T. The Behavior of Dam Foundation Reinforced by Stone Columns: Case Study of Kissir Dam-Jijel. International Journal of Civil and Environmental EngineeringInternational Journal of Civil and Environmental Engineering. 2018;11 :1187-1191.
Mechouma R, Mebarki H, Azoui B. Behavior of nine levels NPC three-phase inverter topology interfacing photovoltaic system to the medium electric grid under variable irradiance. Springer-Verlag GmbH Germany, part of Springer Nature 2018, Electrical EngineeringSpringer-Verlag GmbH Germany, part of Springer Nature 2018, Electrical Engineering. 2018.

Pages