Hamid Seridi

Hamid Seridi
Université 8 mai 1945 - Guelma · Department of Computer Science

PhD

About

169
Publications
33,823
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
626
Citations
Citations since 2016
75 Research Items
515 Citations
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
Introduction
Currently he is Professor and Director of Laboratory of Science and Information Technologies and Communication “LabSTIC,” http://www.labstic.com/index.php “. He is Editor in chief of International Journal of Informatics and Applied Mathematics « IJIAM » https://dergipark.org.tr/en/pub/ijiam. His research interests include approximate knowledge management, pattern recognition and artificial intelligence, data mining, video mining, machine learning and cryptography.

Publications

Publications (169)
Article
Full-text available
The current abundance of the collected biomedical data provides an important tool for the development of medical data classification systems. However, processing big data requires powerful algorithms. In this perspective, we propose a hybrid classifier that combines radial basis function (RBF) and extreme learning machine (ELM) neural networks. Thi...
Article
Full-text available
In recent years, the large amount of heterogeneous data generated by the Internet of Things (IoT) sensors and devices made recording and research tasks much more difficult, and most of the state-of-the-art methods have failed to deal with the new IoT requirements. This article proposes a new efficient method that simplifies data indexing and enhanc...
Article
The continuous production of heterogeneous IoT data created a new challenge, which is their storage and retrieve efficiently. In this work, a new method of indexing, called Threshold Distance (TD), is proposed in the fog‐cloud architecture. In this method, the fog layer is divided into two levels: a clustering level and an indexing level. In the cl...
Article
Unmanned Aerial Vehicles (UAVs) have been progressively used in environmental monitoring and disaster sensing. The drones fly over a set of waypoints in the area to achieve their surveillance task. Despite their potential advantages, UAVs have several drawbacks, including a limited energy supply and a short operational duration which make all attem...
Chapter
Reproducing images arise in many applications such as image compression, Image optimization, graphic art, and medical image processing. For medical images, image quality is crucial for proper diagnosis from an imaging study. The challenges in medical image processing occur due to poor image contrast and artifacts that outcome from missing organ bou...
Preprint
Full-text available
This paper addresses the issue of the real-time tracking quality of moving objects in large-scale video surveillance systems. During the tracking process, the system assigns an identifier or label to each tracked object to distinguish it from other objects. In such a mission, it is essential to keep this identifier for the same objects, whatever th...
Article
Full-text available
In the literature, several exploration algorithms have been proposed so far. Among these, Lévy walk is commonly used since it is proved to be more efficient than the simple random-walk exploration. It is beneficial when targets are sparsely distributed in the search space. However, due to its super-diffusive behavior, some tuning is needed to impro...
Article
Full-text available
This paper introduces a heartbeat classification system that combines three types of neural networks: random neural networks, deep autoencoders and RBF neural networks. The aim is to make use of the advantages of these neural networks in order to introduce a model with simpler architecture than the state-of-the-art deep models. Indeed, the advantag...
Article
Full-text available
The past decade has been characterized by the growing volumes of data due to the widespread use of the Internet of Things (IoT) applications, which introduced many challenges for efficient data storage and management. Thus, the efficient indexing and searching of large data collections is a very topical and urgent issue. Such solutions can provide...
Conference Paper
Real-time object tracking is still a critical challenge in artificial vision research. In such a mission, it is essential to assign a unique identifier or label to each tracked object, regardless of the area, time of appearance, or detector camera, to distinguish it from other objects and to conserve as much information as possible about the tracke...
Conference Paper
IoT technology implies a huge group of connected devices to capture a tremendous quantity of information. Computing and storing this huge amount of data requires scalable and efficient indexing solutions. Among the latest indexing structures in the BCCF-tree metric space, one framework is focused on providing recursive clustering of the space using...
Article
Full-text available
Artificial Immune Recognition System is a widely used bio-inspired algorithm that describes the recognition tasks of antigen by memory cells. Despite the success of the Artificial Immune Recognition System, the basic version has some drawbacks which have a direct impact on system efficiency in terms of the quality of the results, data explosion, an...
Conference Paper
Industrial Internet of Things (IIoT) applies Internet of Things (IoT) technology in industrial systems, to optimize business processes efficiency, service quality, and reliability. However, with a large of isolated IoT networks deployed in various industries, many vulnerabilities have been exposed to security incidents and posed threats to IIoT sec...
Conference Paper
Over the past decades, the volume of Internet of Things (IoT) data has exploded which raise the problem of indexing, storing and retrieving efficiently. Most studies are based on dividing the target dataset into subsets using balls with one or two pivots. However, in the era of big data, where efficient indexing is important, the subspace volumes g...
Article
Full-text available
Canny operator provides simple technique to extract the useful edge information from image. However, it suffers from two problems: a difficulty to choose the thresholds values and the presence of broken edges. This paper proposes to improve Canny detector in two steps: First, adaptive Otsu threshold is used to select appropriate thresholds. Then, a...
Article
This paper proposes an ECG beat classification system based on deep autoencoder as feature extractor and a system of multiple neural networks as classifier. The objectives are as follows: First is simplifying the feature extraction step by applying the deep autoencoder, which permits defining high level features without neither pre-processing stage...
Article
Full-text available
The widespread use of video surveillance and the development of embedded information processing systems raise the issue of affecting the confidentiality and integrity of video data and even the individuals privacy. In order to secure the content of video and protect the public privacy, we propose a new system for detecting and encrypting regions of...
Book
AM conference is the leading forum for research in informatics and applied mathematics. The third edition organized and sponsored by LabSTIC Laboratory held on virtual mode on October 21-22, 2020 at 08 May 1945 University in Guelma. As the previous editions IAM’18 and IAM’19, it offers an excellent forum for researchers and practitioners from vario...
Conference Paper
In this paper, we introduce a deep RBF neural network for medical classification. The proposed classifier consists of two parts: an auto-encoder and an RBF neural network. The auto-encoder is used to decrease the number of the characteristics of the presented samples. Then, the obtained new features are presented to the RBF neural network. The desi...
Chapter
Full-text available
This paper presents a robust segmentation scheme for noisy medical images exploiting hybrid cooperative segmentation. Two competing process use duality between edge detection and region extraction methods to improve their mutual results. Parallel execution and information exchange are combined to reduce the error rates generated by each of the meth...
Article
Full-text available
Background subtraction is an essential step in the video monitoring process. Several models have been proposed to differentiate background pixels from foreground pixels. However, most of these methods fail to distinguish them in highly dynamic environments. In this paper, we propose a new method robust and more efficient for distinguishing moving o...
Article
Tags, when properly assigned to limited access papers, help users to estimate their relevance. This paper introduces a new approach for the selection of relevant tags as well as a recommendation for scientific papers tagging. The approach defines the relatedness between the tags attributed by users and the concepts extracted from the available sect...
Book
Full-text available
CITSC Aims to bring together the scientists, young and senior researchers to propose their ideas, contributions and to exchange and share their experiences and research results on all aspects of Innovative Trends in Computer Science. It also provides a premier platform for researchers, practitioners and educators to present and discuss the most rec...
Article
In recent years, the number of sensor and actuator nodes in the Internet of Things (IoT) networks has increased, generating a large amount of data. Most research techniques are based on dividing target data into subsets. On a large scale, this volume increases exponentially, which will affect search algorithms. This problem is caused by the inheren...
Article
Full-text available
Wireless multimedia sensor networks (WMSNs) currently face the problem of rapidly decreasing energy due to the acquisition, processing and transmission of massive multimedia data. This decrease in energy affects the life of the network, resulting in higher overhead costs and a deterioration in quality of service (QoS). This paper presents a new gro...
Conference Paper
Full-text available
In this paper a novel approach for relevant tags selection and recommendation for scientific papers tagging is proposed. This approach describes the relationship between user-attributed tags and concepts derived from the limited access paper sections available based on certain parameters are: the frequency, the position, the co-occurrence and the s...
Article
Full-text available
Background subtraction is an essential step in the process of monitoring videos. Several works have proposed models to differentiate the background pixels from the foreground pixels. Mixtures of Gaussian (GMM) are among the most popular models for a such problem. However, the use of a fixed number of Gaussians influence on their results quality. Th...
Chapter
Foraging constitutes one of the main benchmarks in robotic problems. It is known as the act of searching for objects/tokens and, when found, transport them to one or multiple locations. Swarm intelligence based algorithms have been widely used in foraging problem. The ambient light sensors technology in nowadays robots makes easy using and implemen...
Article
Tracking of moving objects is a very important step in building an intelligent video surveillance system. The movement of non-rigid objects, appearance variations and luminosity changes make tracking even more difficult. This paper proposes a new automatic multi-target tracking system that can deal with the most confronted problems without any prio...
Conference Paper
Full-text available
Considerable amounts of data have been produced over the past decade as the miniaturization of Internet of Things (IoT) devices has increased. This explosion has created the need to manage these volumes of data to make the most of this mass of information for an ever-growing audience. Effective indexing and searching in large data collections is th...
Article
Full-text available
Setting a compact and accurate rule base constitutes the principal objective in designing fuzzy rule-based classifiers. In this regard, the authors propose a designing scheme based on the combination of the subtractive clustering (SC) and the particle swarm optimization (PSO). The main idea relies on the application of the SC on each class separate...
Article
In this paper, an improved Ant Colony System algorithm applied to image edge detection is presented. During their movement on image, artificial ants establish pheromone graph which represents the image edge information. The ant movement is directed by the local variation of the image's intensity values. To improve this method, supplementary behavio...
Poster
Full-text available
Over the past decade, a large amount of data has been generated exponentially by an increasing number of devices in the Internet of Things (IoT) world. This explosion has created the need to create data processing systems capable of managing these huge volumes of data and offering high-performance solutions in order to make the most of this mass of...
Article
Full-text available
Background subtraction is an essential step in the process of monitoring videos. Several works have been proposed to differentiate the background pixels from the foreground ones. Mixtures of Gaussian (GMM) are among the most popular models for this problem. However , they suffer from some inconveniences related to light variations and complex scene...
Conference Paper
Full-text available
Background subtraction is an essential step in the process of monitoring videos. Several works have proposed models to dierentiate the background pixels from the foreground pixels. Mixtures of Gaussian (GMM) are among the most popular models for a such problem. However, they suer from certain inconveniences related to the light variations and compl...
Chapter
Full-text available
Smart cities are complex and large distributed systems characterized by their heterogeneity, security, and reliability challenges. In addition, they are required to take into account several scalability, efficiency, safety, real-time responses, and smartness issues. All of this means that building smart city applications is extremely complex. Swarm...
Conference Paper
Full-text available
Vision-based steel surface inspection systems have gained increasing interest over the two past decades because they offer the possibility to meet the requirements of manufacturers in terms of time, cost and accuracy compared to traditional methods based on human vision. The main objective of this paper is to propose an efficient inspection system...
Article
Full-text available
Similarity searchfor content-basedretrieval- a sustained problem;many applications endures.Most of the similarity measures intend focusing the least possible set of elements to find an answer. In the literature, most work is based on splitting the target data set into subsets using balls. However, in the era of big data, where efficient indexing is...
Article
Full-text available
The cirrus clouds is one of the objects existing in the troposphere how play an important role in the process of climate change. The research presented in this paper is aimed to present a model for detecting of clouds, presenting theirs distributions and giving a measure about altitudes by a stereovision system. Two cameras simultaneously take imag...
Conference Paper
Searching for similar images in a data collection, based on a query image is a fundamental problem for many applications that use large amounts of complex data. The search for images by its content and on a large scale is a topical challenge for the search and management of large image databases. Several information can be extracted such as color,...
Conference Paper
Full-text available
The cirrus clouds is one of the objects existing in the troposphere how play an important role in the process of climate change. The research presented in this paper is aimed to present a model for detecting of clouds, presenting theirs distributions and giving a measure about altitudes by a stereovision system. Two cameras simultaneously take imag...
Conference Paper
Breast cancer has become one of the most deadly cancer among women all over the word. Fortunately, an early diagnosis of this type of cancer can considerably enhances the success of treatment. In this work, we propose a classification system of the breast cancer based on neural networks. The proposed system is a neural network with single hidden la...
Poster
Full-text available
Thanks to the technological development of the Internet and communication that the world has experienced in recent years, researchers have proposed several strategies to address the weaknesses of traditional video surveillance systems where they are becoming continuous and high-performance. Among these strategies, the one that is most used and effe...
Article
Full-text available
The most challenging aspect of rebuilding the puzzle is finding out the right pair of pieces of the image. To do this, we need, an accurate estimation of the pairwise compatibility measure between local patches and the assembly strategy. In this paper, we propose a novel pairwise compatibility measure for the assembly of computational square jigsaw...
Article
IoT-based systems are complex and dynamic aggregations of entities (Smart Objects) which usually lack decentralized control. Swarm Intelligence systems are decentralized, self-organized algorithms used to resolve complex problems with dynamic properties, incomplete information, and limited computation capabilities. This study provides an initial un...
Chapter
Full-text available
The Internet of Things (IoT) represents the global network which interconnects digital and physical entities. It aims at providing objects with intelligence that allows them to perceive, decide and cooperate with other objects, machines, systems and even humans to enable a whole new class of applications and services. Agent-Based Computing paradigm...
Conference Paper
Nowadays, the reality of getting everything rapidly imposes itself upon getting information. The access to relevant information requires its valuable representation and management. Recent description methods based on tags may have a better impact on the information access task if they are attributed adequately. In order to overcome the categorizati...
Conference Paper
Full-text available
n this paper a Search strategy based on Lévy Walk is proposed. Lévy Walk increases the diversity of solutions, and constitutes good strategies to move away from local to global search. The amount of exploration and exploitation and the fine balance between them determine the efficiency of search algorithm. The highly diffusive behavior of the origi...
Article
Full-text available
In this paper, we propose an off-line system for the segmentation and recognition of the unconstrained handwritten connected digits. The proposed system provides new segmentation paths by finding two types of structural features. The background and foreground features points are found from the input string image. The possible cutting paths are gene...
Conference Paper
Full-text available
Moving cast shadow removal is an important task in computer vision, which is used after foreground segmentation to improve the tracking performance. The existing approaches, in terms of ability in discrimination between shadows and foreground object, remain inaccurate. In this paper, a new system is proposed to detect the shadow of moving objects i...
Article
We present in this paper a novel and efficient method that will significantly reduce GMM drawbacks in the presence of complex and dynamic scene. The main idea is to combine global and local features to remove local variations and the instant variations in the brightness that, in most cases, decrease the performance of background subtraction models....
Article
Full-text available
The arab writing is originally cursive, difficult to segment and has a great variability. To overcome these problems, we propose two holistic approaches for the recognition of the handwritten arabic words in a limited vocabulary based on the Hidden Markov Models (HMMs): discrete with wk-means and continuous. In the suggested approach, each word of...
Article
Full-text available
This study investigates the combination of different classifiers to improve Arabic handwritten word recognition. Features based on Discrete Cosine Transform (DCT) and Histogram of Oriented Gradients (HOG) are computed to represent the handwritten words. The dimensionality of the HOG features is reduced by applying Principal Component Analysis (PCA)...
Conference Paper
Full-text available
Le suivi des objets en mouvement est une étape essentielle pour construire un système intelligent de prise de décision précis et rapide. Cependant, il y a plusieurs conditions rendent le suivi d'objet difficile. Ces conditions incluent le mouvement d'objet non-rigide, les variations d'apparence de cibles dues à des changements d'illumination, et l'...
Conference Paper
Full-text available
In this document, we present a scene as bag of sub-images, and we treat each fragment as a basic element of an image to reconstruct the original view (puzzle). This reconstruction of image from set of sub images can be reduced to solving a standard jigsaw puzzle. We explore and examine the patch transform and the puzzle solving techniques which are...
Article
Full-text available
Background The foraging task is one of the canonical testbeds for cooperative robotics, in which a collection of robots has to search and transport objects to specific storage point(s). In this paper, we investigate the Multi-Agent Foraging (MAF) problem from several perspectives that we analyze in depth. ResultsFirst, we define the Foraging Proble...
Article
Full-text available
Cast shadow affects computer vision tasks such as image segmentation, object detection and tracking since objects and shadows share the same visual motion characteristics. This unavoidable problem decreases video surveillance system performance. The basic idea of this paper is to exploit the evidence that shadows darken the surface which they are c...
Article
Full-text available
Cast shadow affects computer vision tasks such as image segmentation, object detection and tracking since objects and shadows share the same visual motion characteristics. This unavoidable problem decreases video surveillance system performance. The basic idea of this paper is to exploit the evidence that shadows darken the surface which they are c...
Conference Paper
Full-text available
the importance of quality control of steel products is increasing day by day in the manufacturing industrial systems because it offers the possibility of knowing the state of the products without stopping the production line which allows the control of a defect before it becomes a complex problem and avoiding production losses. Human quality contro...
Conference Paper
Full-text available
Background: Breast cancer constitutes a major health problem around the world because of its frequency, morbidity and mortality, as well as its impact on women, their families and society. At present, it is the second leading cause of death for women. There is still no way to prevent breast cancer and the solution lies in their early detection in o...