2019
Soundes B, Larbi GUEZOULI, Samir Z.
Pseudo Zernike moments-based approach for text detection and localisation from lecture videos. International Journal of Computational Science and EngineeringInternational Journal of Computational Science and Engineering. 2019;19 :274-283.
AbstractScene text presents challenging characteristics mainly related to acquisition circumstances and environmental changes resulting in low quality videos. In this paper, we present a scene text detection algorithm based on pseudo Zernike moments (PZMs) and stroke features from low resolution lecture videos. Algorithm mainly consists of three steps: slide detection, text detection and segmentation and non-text filtering. In lecture videos, slide region is a key object carrying almost all important information; hence slide region has to be extracted and segmented from other scene objects considered as background for later processing. Slide region detection and segmentation is done by applying pseudo Zernike moment’s based on RGB frames. Text detection and extraction is performed using PZMs segmentation over V channel of HSV colour space, and then stroke feature is used to filter out non-text region and to remove false positives. The algorithm is robust to illumination, low resolution and uneven luminance from compressed videos. Effectiveness of PZM description leads to very few false positives comparing to other approached. Moreover resulting images can be used directly by OCR engines and no more processing is needed.
Khedidja A, Abderrahmane B.
Quality assessment of shallow groundwater for irrigation purposes in Tadjenanet – Chelghoum Laid area (Eastern Algeria) ISSN / e-ISSN 1571-5124 / 1814-2060. International Journal of River Basin ManagementInternational Journal of River Basin Management. 2019.
AbstractThe groundwater quality of Tadjenanet- Chelghoum Laid Semi-arid region was assessed for irrigation suitability; where the intensity of salinization process depends on soil characteristics, water quality, irrigation practices and in particular the inefficiency of the drainage system. The drought of the last decade has created an agricultural deficit due to high evapotranspiration, influencing the water salinity. To achieve this assessment, thirty groundwater samples were collected at identical locations from deeper wells. The physicochemical parameters such as, pH, electrical conductivity (EC), total hardness (TH), Ca²+$, Mg²+$, Na+$, K+$, HCO3-$, SO4²-$, Cl-$ and NO3-$ have been studied. Obtained results were measured and interpreted with different irrigation indexes like EC, sodium percentage (SP), sodium adsorption ratio (SAR), residual sodium carbonate (RSC), permeability index (PI) and Kelly’s ratio (KR). These parameters combined allowed to conclude that the quality of groundwater was roughly suitable for irrigation.
Houria B, Farès B.
The quality of service in urban public transport in Algeria. International Journal of Quality and Service SciencesInternational Journal of Quality and Service Sciences. 2019.
Tigane S, KAHLOUL L, BENHARZALLAH S, Baarir S, BOUREKKACHE S.
Reconfigurable GSPNs: a modeling formalism of evolvable discrete-event systems. Science of Computer ProgrammingScience of Computer Programming. 2019;183 :102302.
Benbouza N, Benfarhi L, Azoui B.
Reduction of the Low Voltage Substation Constraints by Inserting Photovoltaic Systems in Underserved Areas. Recent Advances in Electrical & Electronic Engineering, DOI : 10.2174/2352096511666180523095219Recent Advances in Electrical & Electronic Engineering, DOI : 10.2174/2352096511666180523095219. 2019;12 :102-107.
Naima B, Louiza B, Boubekeur A.
Reduction of the Low Voltage Substation Constraints by Inserting Photovoltaic Systems in Underserved Areas. Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering). 2019;12 :105-112.
Hichem H, Djamel B.
Regrouping of acoustics microwaves in piezoelectric material (ZnO) by SVM classifier, ISSN / e-ISSN 2398-0311 / 2398-032X. International Journal of Digital Signals and Smart SystemsInternational Journal of Digital Signals and Smart Systems. 2019;Volume 3 :pp 110 - 120.
AbstractIn this paper, we propose a new numerical method for acoustics microwaves detection of an acoustics microwaves signal during the propagation of acoustics microwaves in a piezoelectric substrate zinc oxide (ZnO). We have used support vector machines (SVMs), the originality of this method is the accurate values that provides this technique help to identify undetectable waves that we can not identify with the classical methods. We classify all the values of the real part and the imaginary part of the coefficient attenuation with the acoustic velocity in order to build a model from which we note the types of microwaves acoustics (bulk waves or surface waves or leaky waves). We obtain accurate values for each of the coefficient attenuation and acoustic velocity. This study will be very interesting in modelling and realisation of acoustics microwaves devices (ultrasound, radiating structures, filter SAW…) based on the propagation of acoustics microwaves.
Hafdaoui H, Benatia D.
Regrouping of acoustics microwaves in piezoelectric material (ZnO) by SVM classifier. International Journal of Digital Signals and Smart SystemsInternational Journal of Digital Signals and Smart Systems. 2019;3 :110-120.
Hamza Z, Hacene S.
Reliability and safety analysis using fault tree and Bayesian networks. International Journal of Computer Aided Engineering and TechnologyInternational Journal of Computer Aided Engineering and Technology. 2019;11 :73-86.
Ari AAA, Gueroui A, Titouna C, Thiare O, Aliouat Z.
Resource allocation scheme for 5G C-RAN: A Swarm Intelligence based approach. Computer NetworksComputer Networks. 2019;165 :106957.
Bakhti I, Chaouch S, Makouf A, Douadi T.
Robust integral backstepping control with extended Kalman filter of permanent magnet synchronous motor. International Journal of Industrial and Systems EngineeringInternational Journal of Industrial and Systems Engineering. 2019;31 :1-14.
Goléa NE-H, Melkemi KE.
ROI-based fragile watermarking for medical image tamper detection. International Journal of High Performance Computing and NetworkingInternational Journal of High Performance Computing and Networking. 2019;13 :199-210.
Meddour A, Yahia M, Hambaba L.
Safety evaluation and analgesic studies of defatted methanol extract of Capparis spinosa L.(Capparidaceae) fruits and roots bark in albino wistar rats. Journal of Biological Research-Bollettino della Società Italiana di Biologia SperimentaleJournal of Biological Research-Bollettino della Società Italiana di Biologia Sperimentale. 2019;92.
BOUCETTA ALDJIA, Melkemi KE.
Score Level Fusion of Palmprint, Face and Iris Using Adaptive PSO. International Journal of Applied Metaheuristic Computing (IJAMC)International Journal of Applied Metaheuristic Computing (IJAMC). 2019;10 :175-194.
Hamouid K, Adi K.
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority. Peer-to-Peer Networking and ApplicationsPeer-to-Peer Networking and Applications. 2019;12 :1137–1155.
AbstractThis paper proposes a compromise-tolerant (t,n)-threshold certification management scheme for MANETs. Our solution allows to mitigate the impact of compromised nodes that participate in the certification service. In our design, certification management is achieved anonymously by an Anonymous Certification Authority (ACA). The latter is fully distributed into multiple disjointed coalitions of nodes whose structure is made hidden. This prevents an adversary from taking the control of the ACA by arbitrarily compromising t or more nodes. In other words, our proposal enhances the compromise-tolerance to more than the threshold number t of nodes without breaking down the whole certification system. As a result, our scheme requires a very smaller threshold than traditional schemes, which improves considerably the service availability. The experimental study shows a clear advantage over traditional threshold-based certification schemes by ensuring a significant positive compromise between security and availability of certification service.
Ameur S.
SELFADJOINT OPERATORS, NORMAL OPERATORS, AND CHARACTERIZATIONS. Operators and MatricesOperators and Matrices. 2019;13 :835–842.
AbstractLet B(H) be the C* -algebra of all bounded linear operators acting on a complex separable Hilbert space H . We shall show that: 1. The class of all selfadjoint operators in B(H) multiplied by scalars is characterized by ∀X ∈ B(H), S2X +XS2 =>2||SXS||, (S ∈ B(H)). 2. The class of all normal operators in B(H) is characterized by each of the three following properties (where DS = S*S-SS* , for S ∈ B(H)), (i) ∀X ∈ B(H), S2X + XS2 =>2||SXS||,(S ∈ B(H)), (ii) S*DSS = 0 = SDSS*,(S ∈ B(H)), (iii) S*DSS=> 0 =>SDSS*,(S ∈ B(H)).
Seddik A.
Selfadjoint operators, normal operators, and characterizations. Operators and MatricesOperators and Matrices. 2019;13 :835-842.
Riad K, Hamza R, Yan H.
Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records. IEEE AccessIEEE Access. 2019;7 :86384 - 86393.
AbstractElectronic health records (EHRs) replaced the old paper-based systems to make patient data more accurate, reliable, and more accessible. Yet, the EHRs system requires high transmission cost, energy, and waste of time for both doctors and patients. Furthermore, EHRs security presents a serious issue threatening the patient’s privacy. Most of the third-party hosting systems have some issues related to the users’ privacy and data security. Hence, it is necessary to restrict the access control policies and develop efficient mechanisms for cloud-based EHRs data. In this paper, a sensitive and energetic access control (SE-AC) mechanism is proposed for managing the cloud-hosted EHRs and providing a fine-grained access control even in critical situations. The proposed mechanism ensures the confidentiality of the patient’s data, where only authorized individuals to have permission to be able to edit or review certain of the patient’s data. Each EHR data is encrypted by the managing authority before submitting to the cloud storage. The requesting user can get dynamically changing permissions based on authentication and context attributes. In addition, seven major aspects have been quantified to assess the operation of any access control that could be deployed in the Internet-of-Thing (IoT). The security analysis indicates that the SE-AC mechanism is secure and will prevent any unauthorized access. The results show exceptional compatibility and performance with different setups and configuration.