Publications

2018
Ali ATHAMENA, Redha MENANIM, Halima B, Z G, S T, K K. Barrages et Envirennement, une relation développé, Cas du Barrage de Beni-Haroun, Mila, Est Algerie. 2018.
Belferdi W, Behloul A, Noui L. A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimensional Systems and Signal ProcessingMultidimensional Systems and Signal Processing. 2018;30 :1093–1112.Abstract
The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
Belferdi W, Behloul A, Noui L. A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimensional Systems and Signal ProcessingMultidimensional Systems and Signal Processing. 2018;30 :1093–1112.Abstract
The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
Belferdi W, Behloul A, Noui L. A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimensional Systems and Signal ProcessingMultidimensional Systems and Signal Processing. 2018;30 :1093–1112.Abstract
The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
MCHEBILA. Bayesian Networks for Frequency Analysis in Dependability. J Fail. Anal. and PrevenJ Fail. Anal. and Preven. 2018;2018 :538–544.Abstract
The high suppleness of Bayesian networks has led to their wide application in a variety of dependability modeling and analysis problems. The main objective of this paper is to extend the use of such powerful tool to estimate the occurrence frequency of failures and consequences in a straightforward way. Such extension is based on the employment of a transformation operator to substitute the original terms with matrices that hold the full dependability description of the corresponding element. Two simple case studies in reliability and safety contexts are treated using the suggested method whose results are validated through their comparison to the corresponding results of other classical dependability techniques.
Medjghou A, Ghanai M, Chafaa K. BBO optimization of an EKF for interval type-2 fuzzy sliding mode control. International Journal of Computational Intelligence SystemsInternational Journal of Computational Intelligence Systems. 2018;11 :770–789.Abstract
In this study, an optimized extended Kalman filter (EKF), and an interval type-2 fuzzy sliding mode control (IT2FSMC) in presence of uncertainties and disturbances are presented for robotic manipulators. The main contribution is the proposal of a novel application of Biogeography-Based Optimization (BBO) to optimize the EKF in order to achieve high performance estimation of states. The parameters to be optimized are the covariance matrices Q and R, which play an important role in the performances of EKF. The interval type-2 fuzzy logic system is used to avoid chattering phenomenon in the sliding mode control (SMC). Lyapunov theorem is used to prove the stability of control system. The suggested control approach is demonstrated using a computer simulation of two-link manipulator. Finally, simulations results show the robustness and effectiveness of the proposed scheme, and exhibit a more superior performance than its conventional counterpart.
Medjghou A, Ghanai M, Chafaa K. BBO optimization of an EKF for interval type-2 fuzzy sliding mode control. International Journal of Computational Intelligence SystemsInternational Journal of Computational Intelligence Systems. 2018;11 :770–789.Abstract
In this study, an optimized extended Kalman filter (EKF), and an interval type-2 fuzzy sliding mode control (IT2FSMC) in presence of uncertainties and disturbances are presented for robotic manipulators. The main contribution is the proposal of a novel application of Biogeography-Based Optimization (BBO) to optimize the EKF in order to achieve high performance estimation of states. The parameters to be optimized are the covariance matrices Q and R, which play an important role in the performances of EKF. The interval type-2 fuzzy logic system is used to avoid chattering phenomenon in the sliding mode control (SMC). Lyapunov theorem is used to prove the stability of control system. The suggested control approach is demonstrated using a computer simulation of two-link manipulator. Finally, simulations results show the robustness and effectiveness of the proposed scheme, and exhibit a more superior performance than its conventional counterpart.
Medjghou A, Ghanai M, Chafaa K. BBO optimization of an EKF for interval type-2 fuzzy sliding mode control. International Journal of Computational Intelligence SystemsInternational Journal of Computational Intelligence Systems. 2018;11 :770–789.Abstract
In this study, an optimized extended Kalman filter (EKF), and an interval type-2 fuzzy sliding mode control (IT2FSMC) in presence of uncertainties and disturbances are presented for robotic manipulators. The main contribution is the proposal of a novel application of Biogeography-Based Optimization (BBO) to optimize the EKF in order to achieve high performance estimation of states. The parameters to be optimized are the covariance matrices Q and R, which play an important role in the performances of EKF. The interval type-2 fuzzy logic system is used to avoid chattering phenomenon in the sliding mode control (SMC). Lyapunov theorem is used to prove the stability of control system. The suggested control approach is demonstrated using a computer simulation of two-link manipulator. Finally, simulations results show the robustness and effectiveness of the proposed scheme, and exhibit a more superior performance than its conventional counterpart.
Karech T, Benseghir A, Bouzid T. The Behavior of Dam Foundation Reinforced by Stone Columns: Case Study of Kissir Dam-Jijel. International Journal of Civil and Environmental EngineeringInternational Journal of Civil and Environmental Engineering. 2018;11 :1187-1191.
Karech T, Benseghir A, Bouzid T. The Behavior of Dam Foundation Reinforced by Stone Columns: Case Study of Kissir Dam-Jijel. International Journal of Civil and Environmental EngineeringInternational Journal of Civil and Environmental Engineering. 2018;11 :1187-1191.
Karech T, Benseghir A, Bouzid T. The Behavior of Dam Foundation Reinforced by Stone Columns: Case Study of Kissir Dam-Jijel. International Journal of Civil and Environmental EngineeringInternational Journal of Civil and Environmental Engineering. 2018;11 :1187-1191.
Mechouma R, Mebarki H, Azoui B. Behavior of nine levels NPC three-phase inverter topology interfacing photovoltaic system to the medium electric grid under variable irradiance. Springer-Verlag GmbH Germany, part of Springer Nature 2018, Electrical EngineeringSpringer-Verlag GmbH Germany, part of Springer Nature 2018, Electrical Engineering. 2018.
Mechouma R, Mebarki H, Azoui B. Behavior of nine levels NPC three-phase inverter topology interfacing photovoltaic system to the medium electric grid under variable irradiance. Springer-Verlag GmbH Germany, part of Springer Nature 2018, Electrical EngineeringSpringer-Verlag GmbH Germany, part of Springer Nature 2018, Electrical Engineering. 2018.
Mechouma R, Mebarki H, Azoui B. Behavior of nine levels NPC three-phase inverter topology interfacing photovoltaic system to the medium electric grid under variable irradiance. Springer-Verlag GmbH Germany, part of Springer Nature 2018, Electrical EngineeringSpringer-Verlag GmbH Germany, part of Springer Nature 2018, Electrical Engineering. 2018.
Khedidja A, Boudoukha A, Djenba S. Bibliographic information. 2018.
Khedidja A, Boudoukha A, Djenba S. Bibliographic information. 2018.
Khedidja A, Boudoukha A, Djenba S. Bibliographic information. 2018.
Zerari N, Abdelhamid S, Bouzgou H, Raymond C. Bi-directional recurrent end-to-end neural network classifier for spoken Arab digit recognition. 2018 2nd International Conference on Natural Language and Speech Processing (ICNLSP). 2018 :1-6.
Naima Z, Abdelhamid S, Bouzgou H, Raymond C. Bi-directional Recurrent End-to-End Neural Network Classifier for Spoken Arab Digit Recognition. 2nd International Conference on Natural Language and Speech Processing (ICNLSP) [Internet]. 2018. Publisher's VersionAbstract
Automatic Speech Recognition can be considered as a transcription of spoken utterances into text which can be used to monitor/command a specific system. In this paper, we propose a general end-to-end approach to sequence learning that uses Long Short-Term Memory (LSTM) to deal with the non-uniform sequence length of the speech utterances. The neural architecture can recognize the Arabic spoken digit spelling of an isolated Arabic word using a classification methodology, with the aim to enable natural human-machine interaction. The proposed system consists to, first, extract the relevant features from the input speech signal using Mel Frequency Cepstral Coefficients (MFCC) and then these features are processed by a deep neural network able to deal with the non uniformity of the sequences length. A recurrent LSTM or GRU architecture is used to encode sequences of MFCC features as a fixed size vector that will feed a multilayer perceptron network to perform the classification. The whole neural network classifier is trained in an end-to-end manner. The proposed system outperforms by a large gap the previous published results on the same database.
Zerari N, Abdelhamid S, Bouzgou H, Raymond C. Bi-directional recurrent end-to-end neural network classifier for spoken Arab digit recognition. 2018 2nd International Conference on Natural Language and Speech Processing (ICNLSP). 2018 :1-6.

Pages