Abdelmajid Badri

Abdelmajid Badri
  • Prof. HDR (France -1996): Doctorat d'Etat +PhD Doctorat d'Université (1992- France), Qualif.CNU(61°: Génie Informaique, Automatique et Traitement du Signal
  • Managing Director at University of Hassan II Casablanca

Directeur de l'ENSAM Casablanca Université Hassan II Casablanca

About

330
Publications
144,186
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,313
Citations
Introduction
Abdelmajid Badri currently works at the Electrical Engineering Department, University of Hassan II of Casablanca. Abdelmajid does research in Electronic Engineering, Computer Engineering and Communication Engineering. Their current project is 'connected objects big data'.
Current institution
University of Hassan II Casablanca
Current position
  • Managing Director

Publications

Publications (330)
Preprint
Full-text available
Sign language is a vital communication tool for individuals with hearing impairments and those who do not speak the language of the host country. Despite its importance, sign language is not widely known and lacks universal patterns, with each country having its own unique set of signs influenced by local customs and traditions. This complexity pre...
Article
Full-text available
The Internet of Things (IoT) promises a hyperconnected world, integrating billions of devices across various domains, including smart healthcare systems. Central to this connectivity are low-energy communication protocols, essential for prolonging the battery life of resource-constrained IoT devices and ensuring efficient data exchange. This paper...
Article
Full-text available
Time Slotted Channel Hopping (TSCH) protocol, as specified in the IEEE 802.15.4 standard, is engineered to fulfill the demanding communication needs of industrial IoT networks. TSCH leverages a blend of multi-channel access techniques to effectively manage resources and orchestrate communication among devices within an IoT network. Various TSCH sch...
Article
Full-text available
Deep neural networks are currently employed to detect weapons, and although these techniques provide a high level of accuracy, it still suffers from large weight parameters and a slow inference speed. When it comes to real-world applications, such as weapon detection, these methods are often not suitable for deployment on embedded devices. Because...
Article
Full-text available
The Time Slotted Channel Hopping (TSCH) protocol, defined in the IEEE 802.15.4 standard, is tailored to meet the stringent communication requirements of industrial applications. TSCH combines Time Division Multiple Access (TDMA) and Frequency Division Multiple Access (FDMA) to efficiently allocate resources and schedule communications in IoT networ...
Conference Paper
Full-text available
Hand gesture recognition has emerged as a pivotal research domain, particularly within human-computer interaction and assistive technology. This paper presents a comprehensive overview of our study, focusing on the role of YOLO (You Only Look Once) in revolutionizing real-time hand gesture recognition. We delve into the significance of data preproc...
Chapter
Full-text available
Sign language is a means of communication between individuals, whether they are hard of hearing or other people who do not speak the language of the host country. While it is a means of communication, few people know it and it has no universal patterns. For example, there is a set of signs unique to each country, resulting from the customs and trad...
Article
Full-text available
span>The recent prominence of using infrared technology for human detection has garnered attention, particularly for applications in intelligent video surveillance and self-driving systems. This technology offers advantages in adverse weather conditions and night vision. However, within deep learning, the challenge of variable illumination during h...
Article
Full-text available
span>Phototransistors are attractive devices for applications in optical fiber telecommunication systems. They are used for the detection of optical signals and the amplification of these signals. This paper presents an investigation of how the technological parameters of indium phosphide (InP)/indium gallium arsenide (InGaAs) heterojunction bipola...
Chapter
Full-text available
Human detection plays an important role in surveillance by ensuring security and maintaining public order. It is still considered a complex task in the deep learning field due to the highly varying illumination conditions under which humans should be detected. This paper proposes a new approach based on the enhanced YOLOv5 to detect humans in therm...
Article
Full-text available
Nowadays, many pedestrians are injured or killed in traffic accidents. As a result, several artificial vision solutions based on pedestrian detection have been developed to assist drivers and reduce the number of accidents. Most pedestrian detection techniques work well on sunny days and provide accurate traffic data. However, detection decreases d...
Article
Full-text available
Pedestrian tracking and detection have become critical aspects of advanced driver assistance systems (ADASs), due to their academic and commercial potential. Their objective is to locate various pedestrians in videos and assign them unique identities. The data association task is problematic, particularly when dealing with inter-pedestrian occlusio...
Article
Full-text available
Wireless sensor networks (WSN) are made up of an important number of sensors, called nodes, distributed in random way in a concerned monitoring area. All sensor nodes in the network are mounted with limited energy sources, which makes energy harvesting on top of the list of issues in WSN. A poor communication architecture can result in excessive co...
Article
Full-text available
p>Pedestrian detection is a rapidly growing field of computer vision with applications in smart cars, surveillance, automotive safety, and advanced robotics. Most of the success of the last few years has been driven by the rapid growth of deep learning, more efficient tools capable of learning semantic, high-level, deeper features of images are pro...
Article
Gesture recognition is an open phenomenon in computer vision, and one ofthe topics of current interest. Gesture recognition has many applications inthe interpretation of sign language, one is in human–computer interaction,and the other is in immersive game technology. For this reason, we have developed a model of image processing recog-nition of ge...
Article
Full-text available
span lang="EN-US">Pedestrian detection has so far achieved great success in normal illumination, while pedestrians captured in extreme weather are often ignored. This paper investigates the importance of studying the effects of weather conditions on the recognition task, such as blurring and low contrast. Many image restoration techniques have rece...
Poster
Full-text available
ICACIn 2022 is a forum for the presentation of technological advances and research results in the fields of ICT. The conference is jointly organized by Faculty of Sciences Ain Chock Casablanca, Hassan II University and the Yemeni Scientists Research Group (YSRG) in collaboration with Data Analytics and Artificial Intelligence Research Group (DAAI)...
Article
This paper presents the Adaptive Generalized Predictive Control (AGPC) of the heat conduction in a given aluminum rod modeled using fractional calculus. The oustaloup approximation is used to perform the integer model of the temperature of the rod, then a balanced truncation (BT) model order reduction technique is used to obtain a low integer order...
Article
Full-text available
This paper presents a stable reduced order approximation method of fractional-order systems based on the grey wolf optimizer hybridized with cuckoo search algorithm (GWO-CS). The proposed method is applied to factional order transfer functions (FOTF) in order to obtain a low-order model exhibiting good fits to the Bode’s ideal transfer function (TF...
Conference Paper
Full-text available
Deep learning algorithms have recently gained traction in smart cities and societies, such as in healthcare, surveillance, and in a variety of artificial intelligence-based real- life applications. Person detection is a big challenging task in modern computer vision applications. Thus, human appearances can be difficult to judge, as there are major...
Article
Full-text available
This paper addresses the issue of image and video face retrieval. The aim of this work is to be able to retrieve images and/or videos of specific person from a dataset of images and videos if we have a query image of that person. The methods proposed so far either focus on images or videos and use hand crafted features. In this work we built an end...
Chapter
With the development of telecommunication, the transfer of medical data has become very easy which poses many problems in terms of confidentiality and security.The digital watermarking is a recent solution which has the aim to protect and to increase the security of medical images transferred in hospital networks.In this paper, we present a compari...
Article
Student profiling is one of the great accomplishments in the field of educational data mining (EDM). Student profile can mainly offer the most exact description of students in order to be able to offer students the most appropriate personalisation and recommendation. In this paper, we use a demarche for discovering group Massive Open Online Course...
Poster
Full-text available
This work presents a gesture recognition system aimed at translating Moroccan Sign Language into text or speech. Using image processing and Artificial Neural Networks (ANN), the system captures, tracks, and classifies hand gestures. The approach supports real-time recognition and is currently being tested with real data, with plans for further soft...
Article
Full-text available
This paper deals with the multi-objective optimization dispatch (MOOD) problem in a DC microgrid. The aim is to formulate the MOOD to simultaneously minimize the operating cost, pollutant emission level of (NOx, SO2 and CO2) and the power loss of conversion devices. Taking into account the equality and inequality constraints of the system. Two appr...
Article
Full-text available
This paper proposes a novel daily energy management system for optimization dispatch and operation control of a typical microgrid power system. The multi-objective optimization dispatch problem is formulated to simultaneously minimize the operating cost, pollutant emission level as well as the power loss of conversion devices. While satisfying the...
Chapter
Full-text available
RPL is designed as a routing protocol dedicated to Internet of Things. RPL is based on an objective function to build a Destination Oriented Directed Acyclic Graph that connects the leaf nodes in the wireless sensor network to the central node which collects all the informations. In its path selection, RPL does not offer the best network quality of...
Article
Full-text available
Faced to challenges of low power and lossy networks (LLN’s) as well as the nature of these networks without infrastructure, it remains the subject of several researches to deal with routing constraints and thus propose adapted routing protocols according to different applications. In this context, a protocol based on Ipv6 RPL has been standardized...
Chapter
Full-text available
Recent monitoring applications are based on Low power and Lossy Networks (LLN), standardized by Internet Engineering Task Force (IETF). These kinds of networks require a trustworthy routing protocol for node aggregation and good QoS achievement. RPL gains popularity compared to other routing protocols for its flexibility via its objective function....
Chapter
This paper presents a novel daily energy management system for coordinated control and optimization dispatch of a grid connected hybrid microgrid (HMG). The main objective is to minimize both operating cost and emissions level, taking into account ensuring continued power balance, maximize the generation of renewable energy sources, optimal chargin...
Article
Full-text available
This paper presents a novel optimization approach for a day-ahead power management and control of a DC microgrid (MG). The multi-objective optimization dispatch (MOOD) problem involves minimizing the overall operating cost, pollutant emission levels of (NOx, SO2 and CO2) and the power loss cost of the conversion devices. The weighted sum method is...
Article
Full-text available
The diverse applications of the internet of things (IoT) require adaptable routing protocol able to cope with several constraints. Thus, RPL protocol was designed to meet the needs for IoT networks categorized as low power and lossy networks (LLN). RPLuses an objective function based on specific metrics for preferred parents selection through these...
Article
Full-text available
The internet of things technology is classified as a Low power and lossy network. These kinds of networks require a trustworthy routing protocol considered as the backbone for management and high quality of service achievements. IPv6 routing protocol for Low power and lossy network (RPL) was able to gain popularity compared to other routing protoco...
Article
Full-text available
An optimal backstepping controller is developed for doubly fed induction generator based wind turbine (DFIG). The objective is the control of active and reactive power exchanged between the generator and electrical grid in presence of uncertainty and reduce transient loads. The backstepping controller is coupled with an artificial bee colony aerotu...
Article
Full-text available
The diversity of Internet of Things applications require a flexible routing protocol to cope with several constraints. In this context, the RPL protocol was designed to meet the needs of IoT. RPL relies on an objective function based on specific metrics to fulfill its routing strategy. The single routing metric problem leads generally to nonoptimiz...
Conference Paper
Recent monitoring applications are based on Low power and Lossy Networks (LLN), standardized by Internet Engineering Task Force (IETF). These kinds of networks require a trustworthy routing protocol for nodes aggregation and good QoS achievement. RPL gains popularity compared to other routing protocols for its flexibility via its objective function...
Conference Paper
This paper presents a novel daily energy management system for coordinated control and optimization dispatch of a grid connected hybrid microgrid (HMG). The main objective is to minimize both operating cost and emissions level, taking into account ensuring continued power balance, maximize the generation of renewable energy sources, optimal chargin...
Article
Full-text available
Wireless sensor networks consist of a large number of nodes deployed randomly in an area of interest. Theses nodes have sensing, computation, and wireless communications capabilities. In another hand nodes have energy constraints since they are equipped by non-rechargeable batteries. To handle this issue, routing protocols consist of designing the...
Chapter
Wireless sensor networks consist of a large number of nodes deployed randomly in an area of interest. Theses nodes have sensing, computation, and wireless communications capabilities. In another hand nodes have energy constraints since they are equipped by non-rechargeable batteries. To handle this issue, routing protocols consist of designing the...
Conference Paper
This paper presents a novel control approach for a day-ahead optimal power management and control of a hybrid microgrid (HMG), considering the total operating cost and pollutant emission levels of (SO2, NOx, and CO2) as objective functions for the dynamic economic dispatch (DED). The performance of the proposed energy management system is evaluated...
Conference Paper
RPL is designed as a routing protocol dedicated to Internet of Things. RPL is based on an objective function to build a Destination Oriented Directed Acyclic Graph that connects the leaf nodes in the wireless sensor network to the central node which collects all the informations. In its path selection, RPL does not offer the best network quality of...
Conference Paper
Full-text available
Wireless sensor networks is a promising technology that consist of a large number of nodes deployed in an area of interest. Theses nodes have computation, sensing and wireless communications capabilities. In another hand nodes have energy constraints since they are equipped by non-rechargeable batteries. To handle this issue, routing protocols cons...
Article
Full-text available
The Virtual Private Network (VPN) service offered by the Multi-Protocol Label Switching Protocol (MPLS) is more and more solicited by clients thanks to its various advantages that it can offer especially concerning the security, the quality of service, and the flexibility. MPLS VPN relies on multiple protocols to function correctly and can be repre...
Article
In this manuscript, an 8 × 1 rectangular ‘U’ slotted patch antenna array designed for future 5G communications is presented. The proposed antenna is designed using the 3D EM CSTv18 microwave Studio based on the finite difference time domain (FDTD) method, and compared using HFSSv19 EM (high frequency structure simulator) based on the finite element...
Chapter
We address the problem of image-to-video face retrieval. Given a query image of a person, the aim is to retrieve videos of that same person. The methods proposed so far are based on hand-crafted features. In this work we investigate the use of an off-the-shelf object detection network as a feature extractor by building an image-to-video face retrie...
Article
Full-text available
Computer vision algorithms, especially real-time tasks, require intensive computation and reduced time. That’s why many algorithms are developed for interest point detection and description. For instance, SURF (Speeded Up Robust Feature) is extensively adopted in tracking or detecting forms and objects. SURF algorithm remains complex and massive in...
Article
Full-text available
In order to contribute to the security of sharing and transferring medical images, we had presented a multiple watermarking technique for multiple protections; it was based on the combination of three transformations: the discrete wavelet transform (DWT), the fast Walsh-Hadamard transform (FWHT) and, the singular value decomposition (SVD). In this...
Article
Full-text available
The complexity of network technologies and the variety of their equipment and settings make them difficult to evaluate, to simulate, and to deploy. IPv4 to IPv6 transition mechanisms are one of the modern issues recently exposed with the emergence of technologies such as Internet of Things, which have practically consumed the existing IPv4 address...
Article
Full-text available
Since its development by IETF, the IPv6 routing protocol for low power and lossy networks (RPL) remains the subject of several researches. RPL is based on objective function as a mechanism selection of paths in the network. However, the default objective functions standardized selects the routes according to a single routing metric that leads to an...
Article
Full-text available
Convolutional neural network features are becoming the norm in instance retrieval. This work investigates the relevance of using an of the shelf object detection network, like Faster R-CNN, as a feature extractor for an image-to-video face retrieval pipeline instead of using hand-crafted features. We use the objects proposals learned by a Region Pr...
Article
Full-text available
MPLS VPN is growing in front of the other network layer tunneling technologies of the OSI model. The trend related to this technology is justified mainly by the security, the quality of service that it can offer, and especially the routing speed. The main limitation of MPLS VPN is in the deployment complexity; this technology relies on several prot...
Article
Full-text available
The paper demonstrates the feasibility of an optimal backstepping controller for doubly fed induction generator based wind turbine (DFIG). The main purpose is the extract of maximum energy and the control of active and reactive power exchanged between the generator and electrical grid in presence of uncertainty. The maximum energy is obtained by ap...
Book
Full-text available
Proceedings of 5th International Conference on Green Computing and Engineering Technologies At Hotel Diwan, 31 Boulevard Hassan Seghir Editors:Jason Levy, Abdelmajid Badri, Bishwajeet Pandey Editor Tel: +39-34 95 60 3771 Editor Email: jlevy@hawaii.edu For E-Book Access: http://icgcet.org/ICGCET_2019.pdf
Article
In this manuscript, an 8 × 1 rectangular 'U' slotted patch antenna array designed for future 5G communications is presented. The proposed antenna is designed using the 3D EM CSTv18 microwave studio based on the finite difference time domain (FDTD) method, and compared using HFSSv19 EM (high frequency structure simulator) based on the finite element...
Article
Full-text available
p>This paper presents the performance analysis of the direction of arrival estimation algorithms such as Estimation of Signal Parameters via Rotational Invariance Technique (ESPRIT), Multiple Signal Classification (MUSIC), Weighted Subspace Fitting (WSF), The Minimum Variance Distortionless Response (MVDR or capon) and beamspace. These algorithms a...
Article
Full-text available
Microgrid concept has been widely used for grid connected distributed energy resources. That can operate either connected or disconnected from the main grid during grid failures. Such integration presents new challenges to microgird operations. Therefore, an energy management system is an essential factor for optimal energy scheduling of these dist...
Conference Paper
Wireless sensor networks consist of a large number of nodes deployed randomly in an area of interest. Theses nodes have sensing, computation, and wireless communications capabilities. In another hand nodes have energy constraints since they are equipped by non-rechargeable batteries. To handle this issue, routing protocols consist of designing the...
Conference Paper
Full-text available
6LowPAN is an implementation of wireless sensor networks that using IPv6 to address sensors in the network. It's classified as a new technology that still in development. Therefore, IETF has proposed an IPv6 based routing protocol with low cost and power constraints. This routing protocol for Low power and lossy networks (RPL) selects the ideal rou...
Article
Full-text available
In telecommunication systems, Heterojunction Bipolar Transistors (HBTs) are used extensively due to their good electrical characteristics. The work presented in this paper aims to enhance the electrical performance of the InP / InGaAs Single Heterojunction Bipolar Transistor (SHBT) in terms of the static current gain β. Silvaco’s TCAD tools were us...
Article
Full-text available
Due to their self-organizing, rapid deployment and low-cost features, mobile ad hoc network (MANET) are proving to be a promising architecture for communicating between wireless links between mobile nodes. Despite the many advantages of wireless sensor networks in many areas, they have many problems such as managing the power consumption of mobile...
Conference Paper
Full-text available
We address the problem of image-to-video face retrieval. Given a query image of a person, the aim is to retrieve videos of that same person. The methods proposed so far are based on hand-crafted features. In this work we in- vestigate the use of an off-the-shelf object detection network as a feature extrac- tor by building an image-to-video face re...
Article
Full-text available
The evolution of computer technologies has led to the growth of digital images, which has made the search for similar images in this volume of data a very important research component. Since several works have proposed image search systems entitled CBIR (Content-Based Image Retrieval). This paper presents a new and powerful method for creating CBIR...
Conference Paper
Full-text available
With the arrival of the internet of things concept, a new vision of wireless sensor networks has been adopted allowing them to be addressed with ipv6 addresses, thus forming 6LowPAN networks. It is categorized as a new technology being developed and improved. This causes issues about the networks performance to create the com-munication path and co...
Poster
Convolutional neural network features are becoming the norm in instance retrieval. This work investigate the relevance of using an of the shelf object detection network like Faster R-CNN as a feature extractor. We build an Image-to-video face retrieval pipeline composed of filtering and re-ranking that uses the objects proposals learned by a Region...
Conference Paper
Full-text available
Street crossing pedestrian detection system A comparative study of descriptor and classification methods. Colloque sur les Objets et systèmes Abstract-in recent years, the number of people killed on roads has increased enormously, several pedestrian detection techniques in monocular images have been proposed to address this problem. We present our...
Conference Paper
Full-text available
Videoconferencing is increasingly required by a variety of clients and organizations. This technology saves travel time and increases the number of participants with negligible costs. However, the quality of service (QoS) of this technology depends primarily on the network to which participants are connected. Dynamic Multipoint Virtual Private Netw...
Conference Paper
This paper presents an efficient method for the implementation of an image search system invariant to rotation. This method consists of applying circular masks of different size on the image, and extracting the color descriptor from the visible region on the mask, and then combining a texture descriptor for more precision. In our work, we have used...
Conference Paper
Wireless sensor networks have become increasingly popular thanks to the great advances in the field of telecommunications. Indeed, the sensor nodes that constitute these networks have shown their effectiveness in monitoring and remote control of the physical environment with better accuracy. However, the implementation of such a system poses many p...
Conference Paper
Image features acquired from pre-entrained convolutional neural networks (CNN) are becoming the norm in instance retrieval. This work investigates the relevance of using an object detection CNN like Faster R-CNN as a feature extractor. We built a face retrieval pipeline composed of filtering and reranking that uses the the objects proposals learned...
Poster
Full-text available
La détection des piétons est un problème clé de la vision par ordinateur, avec plusieurs applications susceptibles d'avoir un impact positif sur la qualité de vie. Ces dernières années, le nombre d'approches pour détecter les piétons sur des images monoculaires a augmenté régulièrement. Nous présentons notre système de protection des piétons au bor...
Conference Paper
This paper contains a Co-Planar waveguide (CPW) fed wideband to dual band frequency reconfigurable patch antenna for 5G applications. The frequency reconfigurability is achieved using two variable resistors, which vary the voltage level and hence disturb the current charge distribution. Antenna is designed on ROGERS RO3003 substrate using High Freq...
Conference Paper
Full-text available
This paper deals with the optimization problem in a microgrid, and proposes more reasonable strategy for optimal energy management. The system is designed in a multi-layer structure combining a fuzzy logic system as the main controller with a conventional algorithm. The performance and effectiveness of the developed strategy are evaluated in two ca...
Chapter
The security of medical images becomes increasingly important for many reasons such as confidentiality, authentication, and integrity. In this context, the digital watermarking has appeared as a solution to protect the medical data diffused in hospital networks. In this article, we present a robust technique of medical image watermarking of various...
Article
Full-text available
Heterojunction Bipolar Transistors are being used increasingly in communication systems due to their electrical performances. They are considered as excellent electronic devices. This paper presents an investigation of the static current gain Β based on two technological parameters related to the device geometry for InP/InGaAs Single Heterojunction...
Chapter
Communication and Information technologies have known a great evolution thanks to the use of Bipolar Heterojunction Transistors (HBTs). These electronic devices have excellent electrical characteristics.
Chapter
Image features acquired from pre-entrained convolutional neural networks (CNN) are becoming the norm in instance retrieval. This work investigates the relevance of using an object detection CNN like Faster R-CNN as a feature extractor. We built a face retrieval pipeline composed of filtering and re-ranking that uses the objects proposals learned by...
Conference Paper
Image features acquired from pre-entrained convolutional neural networks (CNN) are the norm in computer vision tasks such as instance retrieval. This work investi- gates the relevance of retrieving image and region representations from an object detection CNN such as Faster R-CNN. We exploit the objects proposals learned by a Region Proposal Networ...
Article
This paper presents an enhanced Quadri-band microstrip patch antenna, using defective slots in the ground plane, designed to operate in the millimeter wave band, formulated using cavity model and simulated by an EM-simulator, based on finite element method: HFSSv15 (High Frequency Structure Simulator). The proposed antenna incorporates two symmetri...
Article
Full-text available
p>This paper presents an enhanced Quadri-band microstrip patch antenna, using defective slots in the ground plane, designed to operate in the millimeter wave band, formulated using cavity model and simulated by an EM-simulator, based on finite element method: HFSSv15 (High Frequency Structure Simulator). The proposed antenna incorporates two symmet...
Conference Paper
Full-text available
The digital environment is one of the major factors contributing to the technical and industrial revolution we are witnessing today. Indeed, this environment is no longer used only for the exchange of textual data, but also transactional and multimedia such as gaming, video on demand, and IPTV. Therefore, in parallel with the diversity of flow, the...
Article
Full-text available
In the last decade, the telecommunications industry has evolved. Traditional networks cannot meet customers' incessant demand for new multimedia and interactive services. Next-generation networks (NGN) have been proposed to improve the quality of service (QoS) of the transported traffic as well as to make the network evolving, thus supporting futur...
Article
Full-text available
The digital environment is one of the major factors contributing to the technical and industrial revolution we are witnessing today. Indeed, this environment is no longer used only for the exchange of textual data, but also transactional and multimedia such as gaming, video on demand, and IPTV. Therefore, in parallel with the diversity of flow, the...
Article
Full-text available
Les caractéristiques d'images dérivées des réseauxneuronaux convolutifs (CNN) pré-entrénés sont devenues la norme dans les tâches de vision par ordinateur telle que la récupération d'instances. Ce travail explore la pertinence de la récupération de caractéristiques d'images et de régions à partir d'un CNN de détection d'objets tel que Faster R-CNN....

Network

Cited By