Computer Science and Its Applications Abdelmalek Amine, Ladjel Bellatreche, Zakaria Elberrichi, Erich J. Neuhold, Robert Wrembel |
Front Matter |
Computational Intelligence–Meta-Heuristics
|
Binary Bat Algorithm: On The Efficiency of Mapping Functions When Handling Binary Problems Using Continuous-variable-based Metaheuristics Zakaria Dahi, Chaker Mezioud, Amer Draa |
3-14 |
Relative Timed Model for Coordinated Multi Agent Systems Said Layadi, Jean-Michel Ilie, Ilham Kitouni, Djamel-Eddine Saidouni |
15-27 |
Computational Intelligence: Object Recognition and Authentification
|
A Novel Technique For Human Face Recognition Using Fractal Code and Bi-dimensional Subspace Benouis Mohamed, Benkkadour Kamel, Tlmesani Redwan, Senouci Mohamed |
31-42 |
Computational Intelligence: Image Processing
|
A New Rotation-Invariant Approach for Texture Analysis Izem Hamouchene, Saliha Aouat |
45-53 |
Multi-CPU/Multi-GPU Based Framework for Multimedia Processing Sidi Mahmoudi, Pierre Manneback |
54-65 |
Full-Reference Image Quality Assessment Measure Based on Color Distortion Zianou Seghir, Fella Hachouf |
66-77 |
Computational Intelligence: Machine Learning
|
Biomarker Discovery Based on Large-Scale Feature Selection and MapReduce Ahlam Kourid, Mohamed Batouche |
81-92 |
Social Validation of Solutions in the Context of Online Communities Lydia Driff, Lamia Berkani, Ahmed Guessoum, Abdellah Bendjahel |
93-104 |
Remotely Sensed Data Clustering Using K-Harmonic Means Algorithm and Cluster Validity Index Habib Mahi, Nezha Farhi, Kaouter Labed |
105-116 |
Computational Intelligence: BioInformatics
|
Comparison of Automatic Seed Generation Methods for Breast Tumor Detection Using Region Growing Technique Ahlem Melouah |
119-128 |
IHBA: An Improved Homogeneity-Based Algorithm for Data Classification Fatima Bekaddour, Chikh Amine |
129-140 |
Multiple Guide Trees in a Tabu Search Algorithm for the Multiple Sequence Alignment Problem Tahar Mehenni |
141-152 |
Information Technology: Text and Speech Processing
|
Noise Robust Features Based on MVA Post-processing Mohamed Korba, Djemil Messadeg, Houcine Bourouba, Rafik Djemili |
155-166 |
Arabic Texts Categorization: Features Selection Based on the Extraction of Words’ Roots Said Gadri, Abdelouahab Moussaoui |
167-180 |
Restoration of Arabic Diacritics Using a Multilevel Statistical Model Mohamed Hadj Ameur, Youcef Moulahoum, Ahmed Guessoum |
181-192 |
A New Multi-layered Approach for Automatic Text Summaries Mono-Document Based on Social Spiders Mohamed Boudia, Reda Hamou, Abdelmalek Amine, Mohamed Rahmani, Amine Rahmani |
193-204 |
Building Domain Specific Sentiment Lexicons Combining Information from Many Sentiment Lexicons and a Domain Specific Corpus Hugo Hammer, Anis Yazidi, Aleksander Bai, Paal Engelstad |
205-216 |
Improved Cuckoo Search Algorithm for Document Clustering Saida Boushaki, Nadjet Kamel, Omar Bendjeghaba |
217-228 |
Information Technology: Requirement Engineering
|
Supporting Legal Requirements in the Design of Public Processes Amina Cherouana, Latifa Mahdaoui |
231-242 |
Requirement Analysis in Data Warehouses to Support External Information Mohamed Chouder, Rachid Chalal, Waffa Setra |
243-253 |
Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches Waffa Setra, Rachid Chalal, Mohamed Chouder |
254-265 |
Information Technology: OLAP and Web Services
|
Research and Analysis of the Stream Materialized Aggregate List Marcin Gorawski, Krzysztof Pasterak |
269-278 |
SOLAP On-the-Fly Generalization Approach Based on Spatial Hierarchical Structures Tahar Ziouel, Khalissa Amieur-Derbal, Kamel Boukhalfa |
279-290 |
QoS-Aware Web Services Selection Based on Fuzzy Dominance Amal Halfaoui, Fethallah Hadjila, Fedoua Didi |
291-300 |
Information Technology: Recommender Systems and Web Services
|
A Hybrid Model to Improve Filtering Systems Kharroubi Sahraoui, Dahmani Youcef, Nouali Omar |
303-314 |
Towards a Recommendation System for the Learner from a Semantic Model of Knowledge in a Collaborative Environment Chahrazed Mediani, Marie-Hélène Abel, Mahieddine Djoudi |
315-327 |
Toward a New Recommender System Based on Multi-criteria Hybrid Information Filtering Hanane Zitouni, Omar Nouali, Souham Meshoul |
328-339 |
Information Technology: Ontologies
|
A New Approach for Combining the Similarity Values in Ontology Alignment Moussa Benaissa, Abderrahmane Khiat |
343-354 |
Exact Reasoning over Imprecise Ontologies Mustapha Bourahla |
355-366 |
Defining Semantic Relationships to Capitalize Content of Multimedia Resources Mohamed Kharrat, Anis Jedidi, Faiez Gargouri |
367-378 |
Security and Network Technologies: Security
|
A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques Imen Brahmi, Hanen Brahmi, Sadok Yahia |
381-393 |
On Copulas-Based Classification Method for Intrusion Detection Abdelkader Khobzaoui, Mhamed Mesfioui, Abderrahmane Yousfate, Boucif Amar Bensaber |
394-405 |
On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks Nabila Labraoui, Mourad Gueroui, Larbi Sekhri |
406-415 |
A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features Mohamed Belaoued, Smaine Mazouzi |
416-425 |
Security and Network Technologies: Wireless Sensor Networks
|
Balanced and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks Amine Dahane, Nasr-Eddine Berrached, Abdelhamid Loukil |
429-441 |
Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks Abdelkader Khelil, Rachid Beghdad |
442-453 |
Optimizing Deployment Cost in Camera-Based Wireless Sensor Networks Mehdi Rouan Serik, Mejdi Kaddour |
454-464 |
A version of LEACH Adapted to the Lognormal Shadowing Model Chifaa Tabet Hellel, Mohamed Lehsaini, Hervé Guyennet |
465-475 |
Security and Network Technologies: Energy and Synchronisation
|
High Velocity Aware Clocks Synchronization Approach in Vehicular Ad Hoc Networks Khedidja Medani, Makhlouf Aliouat, Zibouda Aliouat |
479-490 |
An Energy-Efficient Fault-Tolerant Scheduling Algorithm Based on Variable Data Fragmentation Chafik Arar, Mohamed Khireddine, Abdelouahab Belazoui, Randa Megulati |
491-502 |
Genetic Centralized Dynamic Clustering in Wireless Sensor Networks Mekkaoui Kheireddine, Rahmoun Abdellatif, Gianluigi Ferrari |
503-511 |
Security and Network Technologies: Potpourri
|
Region-Edge Cooperation for Image Segmentation Using Game Theory Omar Boudraa, Karima Benatchba |
515-526 |
Improved Parameters Updating Algorithm for the Detection of Moving Objects Brahim Farou, Hamid Seridi, Herman Akdag |
527-537 |
Towards Real-Time Co-authoring of Linked-Data on the Web Moulay Mechaoui, Nadir Guetmi, Abdessamad Imine |
538-548 |
Software Engineering: Modeling and Meta Modeling
|
A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems Ahmed Kheldoun, Kamel Barkaoui, Jiafeng Zhang, Malika Ioualalen |
551-562 |
Hybrid Approach for Metamodel and Model Co-evolution Fouzia Anguel, Abdelkrim Amirat, Nora Bounour |
563-573 |
Extracting and Modeling Design Defects Using Gradual Rules and UML Profile Mohamed Maddeh, Sarra Ayouni |
574-583 |
An Approach to Integrating Aspects in Agile Development Tadjer Houda, Meslati Djamel |
584-595 |
Software Engineering: Checking and Verification
|
On the Optimum Checkpointing Interval Selection for Variable Size Checkpoint Dumps Samy Sadi, Belabbas Yagoubi |
599-610 |
Monitoring Checklist for Ceph Object Storage Infrastructure Pragya Jain, Anita Goel, S. Gupta |
611-623 |
Towards a Formalization of Real-Time Patterns-Based Designs Kamel Boukhelfa, Faiza Belala |
624-635 |