
Sidi Mohamed Benslimane- PhD, Professor(Full) in Computer Science
- Professor (Full) at Ecole Superieure en Informatique, Sidi Bel Abbes, Algeria
Sidi Mohamed Benslimane
- PhD, Professor(Full) in Computer Science
- Professor (Full) at Ecole Superieure en Informatique, Sidi Bel Abbes, Algeria
Head of the Ecole Supérieure en Informatique -08 Mai 1945 - Sidi Bel Abbes
About
183
Publications
40,417
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
732
Citations
Introduction
Sidi Mohamed Benslimane is a Full Professor at Ecole Superieure en Informatique, Sidi Bel-Abbes, Algeria. He received his PhD degree in computer science from Sidi Bel
Abbes University in 2007. He is currently Head of Research Team 'Service Oriented Computing' at the LabRI Laboratory. His research interests include, semantic web, service oriented computing, and cloud computing, ontology engineering, information and knowledge management, , Context-Aware Computing. He has published papers in well-known journals (IEEE Transactions on Knowledge and Data Engineering, World Wide Web Springer, etc.)
Current institution
Ecole Superieure en Informatique, Sidi Bel Abbes, Algeria
Current position
- Professor (Full)
Additional affiliations
June 2015 - May 2016
École Supérieure en Informatique Sidi Bel Abbe
Position
- Professor (Full)
December 2001 - June 2015
December 2011 - June 2015
Education
January 2002 - June 2007
September 1998 - June 2001
September 1989 - June 1994
Publications
Publications (183)
With the emergence of the open data movement, hundreds of thousands of datasets from various concerns are now freely available on Internet. The access to a good number of these datasets is carried out through Web services which provide a standard way to interact with data. In this context, user’s queries often require the composition of multiple da...
Automated semantic web service composition is one of the critical research challenges of service-oriented computing, since it allows users to create an application simply by specifying the inputs that the application requires, the outputs it should produce, and any constraints it should respect. The composition problem has been handled using a vari...
Machine Learning (ML) for swarm motion prediction is a relatively unexplored area that could help sustain and monitor daily swarm robotics collective tasks. This paper focuses on a specific application of swarm robotics which is pattern formation, to demonstrate the ability of Ensemble Learning (EL) approaches to predict the motion speed of swarm r...
Offshore wind energy is expected to be the first source of energy in the future thanks to its numerous advantages. However, its maintenance is a complex and costly activity, which is increasingly attracting the attention of researchers and industrials. This paper proposes a simulation-optimization approach for the routing and the scheduling of main...
This paper addresses the critical issue of preserving privacy in data
sharing by introducing "ImBLd," an enhanced multidimensional bottom-up
anonymization approach based on the l-diversity privacy model. Implemented
on the Apache Spark framework, ImBLd optimizes data utility through
efficient data insertion and splitting processes. Our method i...
One of the critical challenges in the big data analytics is the individual’s privacy issues. Data anonymization models including k-anonymity and l-diversity are used to guarantee the tradeoff between privacy and data utility while publishing the data. However, these models focus only on the single release of datasets and produce a certain level of...
Predictive medicine aims to improve the stratification and management of individuals according to their probability of developing a pathology in the future. The risk of breast cancer is influenced by multiple factors, such as lifestyle, age, breast density, and family history. Nevertheless, radiologists face challenges in accurately classifying bre...
Breast density classification presents a crucial risk factor for breast cancer. The breast density evaluation via the breast imaging reporting and data system (BI-RADS) presents several challenges for medical professionals due to their variable diagnostics and workload. To address these challenges, researchers have developed computer-aided diagnost...
The emergence of Industry 4.0 has heralded notable progress in manufacturing processes, utilizing sophisticated sensing and data analytics technologies to maximize efficiency. A vital component within this model is predictive maintenance, which is instrumental in ensuring the dependability and readiness of production systems. Nonetheless, the heter...
The advent of industry 4.0 (I4.0) has brought about significant advancements in manufacturing processes, leveraging advanced sensing and data analytics technologies to optimize efficiency. Within this paradigm, predictive maintenance (PdM) plays a crucial role in ensuring the reliability and availability of production systems. There are several exi...
The emergence of Industry 4.0 has heralded notable progress in manufacturing processes , utilizing sophisticated sensing and data analytics technologies to maximize efficiency. A vital component within this model is predictive maintenance, which is instrumental in ensuring the dependability and readiness of production systems. Nonetheless, the hete...
Humans are often impacted by the presentation of choices in a digital environment. But they differ in their characteristics, behaviours, skills, limitations, and act differently in the same environment. Therefore, Influencing users choices through adaptive human-machine interfaces is crucial in context-aware technologies characterizing the industry...
Multimodal interfaces offer users different and appropriate ways to communicate with smart devices. However, despite the advantages of multimodal interactions and their interest in connected environments, only a few of them could reach end users. One of the problems causing this concerns the obligation of using intermediate equipment between users...
Three classes of documents, based on their data,
circulate in the web: Unstructured documents (.Doc,
.html, .pdf, ...), semi-structured documents (.xml,
.Owl ...) and structured documents (Tables database
for example). A semi-structured document is
organized around predefined tags or defined by its
author.
However, many studies use a document class...
: The first phase of reverse engineering of web-oriented applications is the extraction of concepts
hidden in HTML pages including tables, lists and
forms, or marked in XML documents. In this paper, we
present an approach to index semantically these two
sources of information (HTML page and XML
document) using on the one hand, domain ontology to...
Sentiment analysis is one of the recent areas of emerging research in the classification of sentiment polarity and text mining, particularly with the considerable number of opinions available on social media. The Algerian Operator Telephone Ooredoo, as other operators, deploys in its new strategy to conquer new customers, by exploiting their opinio...
The main purpose in this work is to explore the fact that chaos, as a biological characteristic in the brain, should be used in an Artificial Neural Network (ANN) system. In fact, as long as chaos is present in brain functionalities, its properties need empirical investigations to show their potential to enhance accuracies in artificial neural netw...
Forms of influence are widely applied in social networks in order to encourage users to take actions that are favourable to these technologies providers. In our prior work, we proposed a set of influence patterns that are applied in social networks (suggestion pattern, reminder pattern, reward pattern, interaction pattern and social influence patte...
Stress is a serious health problem that affects a large part of humanity. Early stress detection helps preventing stress-related health problems. The Internet of Things (IoT) plays an important role in healthcare monitoring. In this paper, we present an automatic stress detection system (QASIS), to increases the effectiveness and efficiency of heal...
This article aims to propose an ontological user model called OUPIP (Ontology-Based User Profile for Impairment Person), that extends existing ontologies to help designers and developers to adapt applications and devices according to the user's profile, disability and dynamic context. Besides, the approach has been applied in a typical real-life sc...
Nowadays the Internet has become an essential tool for exchanging information, both on a personal and professional level. Today, the analysis of sentiment offers us a great interest for research, marketing and industry. With millions of comments and tweeting published every day, the information available on the Internet and in social media has beco...
Stress is a serious health problem that affects a large part of humanity. Early stress detection helps preventing stress-related health problems. The Internet of Things (IoT) plays an important role in healthcare monitoring. In this paper, we present an automatic stress detection system (QASIS), to increases the effectiveness and efficiency of heal...
Context-Aware Recommender Systems (CARS) improve traditional Recommender Systems (RS) in a wide array of domains and applications. However, CARS suffer from several inherent issues such as data sparsity and cold start. Incorporating trust into recommender systems can handle these issues. Trust-aware recommender systems use information from social n...
Artificial Neural Networks (ANNs) are largely used in multiple domains and represent an offshoot of pattern recognition paradigms. This work studies the use of three different ANN models, applied as classification technics for breast cancer identification, and as an intelligent data processing module for a multi-wavelength optoelectronic biochemica...
All generations of renewable energy systems stepped into a huge evolution around the world. Countries with big potential of gaz and petroleum energies are finally concerned by
the potential of this sector and are currently developing it. Algeria has a huge potential in fossil fuels, however, the government aim to exploit the renewable energy potent...
In the last decade, social media have become a necessary tool for communication in the daily life of Internet users. They use various platforms to share their views on a variety of topics or to target opinions and comments on the satisfaction of a given product. Companies and large distributions surface are increasingly affected by new technology a...
The addressed issue in the present work revolves around the area of business process management in general and in particular optimization. The problem involves the generation of optimized business process designs from a business process model in a multi-criteria optimization environment by appealing an evolutionary algorithm. Thus, the main contrib...
Collaborative and content-based recommender systems are widely employed in several activity domains helping users in finding relevant products and services (i.e., items). However, with the increasing features of items, the users are getting more demanding in their requirements, and these recommender systems are becoming not able to be efficient for...
Many organizations, especially small and medium business (SMB) enterprises require the collection and sharing of data containing personal information. The privacy of this data must be preserved before outsourcing to the commercial public. Privacy preserving data publishing PPDP refers to the process of publishing useful information while preserving...
The ontology has marked its presence in several research fields in order to address issues in knowledge mod-eling, Artificial Intelligence, classification, clustering and more specifically in knowledge engineering. In the Web Service field, ontology is used principally to describe the Web Service interface for discovering, storing and composing Web...
Mobile Multimodal Interaction aims at exploiting complementary aspects of human communication capacities and new mobile sensors. Recently, most mobile applications are limited to a basic interaction modality, namely touchscreen, which is subject to restricted interaction under certain situations. In this paper, we present On-the-Fly Interaction Edi...
Data Mashups are Web applications that combine complementary (raw) data pieces from different data services or Web data APIs to provide value added information to users. They became so popular over the last few years; their applications are numerous and vary from addressing transient business needs in modern enterprises. Even though Data Mashups ha...
Purpose
Improving reliability is a key factor in reducing the cost of wind energy, which is strongly influenced by the cost of maintenance operations. In this context, this paper aims to propose a degradation model that describes the phenomenon of fault propagation to apply proactive maintenance that will act on the cause of failure to prevent its...
The efficient evaluation of top-k queries is crucial for many applications where a huge quantity of data should be ranked and sorted to return the best answers to users in a reasonable time. Examples include, e-commerce platforms (e.g., amazon.com), multimedia sharing platforms, web databases, etc. Most often, these applications need to retrieve da...
The web of things (WoT) uses web technologies to connect
embedded objects to each other and to deliver services to stakeholders. The
context of these interactions (situation) is a key source of information which
can be sometimes uncertain. In this paper, we focus on the development of
intelligent web services. The main requirements for intelligent...
Sentiment analysis is one of the recent areas of emerging research in the classification of sentiment polarity and text mining, particularly with the considerable number of opinions available on social media. The Algerian Operator Telephone Ooredoo, as other operators, deploys in its new strategy to conquer new customers, by exploiting their opinio...
Business process modeling notation (BPMN) is a widely used business model process. The importance of security is apparent, but traditionally, it is considered after the business processes definition. There is a need for integrated tools and a methodology that allows for specifying and enforcing compliance and security requirements for business proc...
This article aims to propose an ontological user model called OUPIP (Ontology-Based User Profile for Impairment Person), that extends existing ontologies to help designers and developers to adapt applications and devices according to the user's profile, disability and dynamic context. Besides, the approach has been applied in a typical real-life sc...
In privacy preserving data publishing, the
privacy models focuse only on single release of anonymzed
data. The scenario of publishing is more complicated where
the data is anonymized in different manners and at different
times. Privacy Preserving Dynamic Data Publishing is the
paradigm that addresses the dynamic data anonymization for
various purpo...
The web of things (WoT) uses web technologies to connect embedded objects to each other and to deliver services to stakeholders. The context of these interactions (situation) is a key source of information which can be sometimes uncertain. In this paper, we focus on the development of intelligent web services. The main requirements for intelligent...
Ontology Modularization is one of the techniques that bear good promises of effective help towards scalability in ontology design, use, and management. The development of proper ontological modules should provide a mechanism for packaging coherent sets of concepts, relationships, axioms, and instances, and a means for reusing these sets in new envi...
Ontology alignment is an important way of establishing interoperability between Semantic Web applications that use different but related ontologies. Ontology alignment is the process of identifying semantically equivalent entities from multiple ontologies. This is not always obvious because technical constraints such as data volume and execution ti...
In the internet of things world, sensors continually generate contextual information that is the core stone for understanding and adapting to the environment according to the user situation. However, diversity of contextual data sources, its imperfection nature and the complexity to identify and model the pertinent situation make it more challengin...
The rise of the semantic web and the development of different technologies allow different actors to access knowledge found in different ontologies. This is not always obvious because technical constraints such as data volume and execution time are determining factors in the choice of an alignment algorithm.
Among the solutions for scaling, the ext...
In the world of BI, the importance of facts is undeniable. Sentiment Analysis (SA) is a research area at the crossroads of many areas, such as data mining, natural language processing, and machine learning. This is the automatic extraction of opinions expressed in a given text. Due to its many applications, numerous studies have been conducted in t...
Context aware splitting approach (CASA) is one of the most efficient pre-filtering approach of context aware recommender system (CARS). The idea under this approach is
that an item (and/or user) evaluated in two different contextual conditions is considered as two different items (or/and users).
Subsequently, after this process, we can use any trad...
Predictive, proactive and reliability-based maintenance are considered among the most widely used approaches in the field of maintenance optimization of wind turbines. Nevertheless, most existing models are designed to optimize the maintenance of a single component of a wind turbine and do not take into consideration the different dependencies that...
In this paper, a research was carried out on the problem of evolutionary multi objective business process optimization. It does involve (i) to construct feasible business process designs with optimum attributes, and (ii) to classify the obtained solutions using a simple and scientific approach understandable by the decision maker. The business proc...
Using social media is one of the most common activities for mobile users. However, the over-use of these time-consuming activity can lead to addiction. In this paper, we bring out the gaps in HCI ergonomics theory that gave rise to addictive interfaces. We evaluate the usability and persuasion of the social networking mobile applications, Facebook...
ABSTRACT: Data locality is becoming one of the most critical factors to affect performance of MapReduce clusters because of network bisection bandwidth becomes a bottleneck. Task scheduler assigns the most appropriate map tasks to nodes. If map tasks are scheduled to nodes without input data, these tasks will issue remote I/O operations to copy the...
Many organizations, especially small and medium business (SMB) enterprises require the collection and sharing of data containing personal information. The privacy of this data must be preserved before outsourcing to the commercial public. Privacy preserving data publishing PPDP refers to the process of publishing useful information while preserving...
In this paper, we propose an approach to extract ontological structures from datasets generated by health care users of social networking sites. The objective of this approach is to exploit the users generated implicit semantics as complement to more formalized knowledge representations. We aim by this latter to leverage the adoption level of the E...
Optimization is known as the process of finding the best possible solution to a problem given a set of constraints. The problem becomes challenging when dealing with conflicting objectives, which leads to a multiplicity of solutions. Evolutionary algorithms, which use a population approach in their search procedures, are advised to suitably solve t...
Optimization is known as the process of finding the best possible solution to a problem given a set of constraints. The problem becomes challenging when dealing with conflicting objectives, which leads to a multiplicity of solutions. Evolutionary algorithms, which use a population approach in their search procedures, are advised to suitably solve t...
In smart cities environments, a recommender system (RS) has for goal to recommend relevant services to the user who is sometimes mobile. Thus, to be able to provide accurate personalized recommendations, the RS should be aware to the user's context (preferences, location, activities, environment, ...), thereby, it should be Context-Aware Recommende...
The emergence of sensor-based modalites enriches the human-mobile interaction. However, mobile applications end-users are often faced with interaction restrictions and do not yet have the possibility to modify their interaction modalities, according to their needs. In this paper, we present an approach that allows smartphone users to add and modify...
This poster covers an evolutionary multi-objective optimization issue, which refers to utilize evolutionary algorithms to solve problem with (at least) two objectives. Using as a Framework, we present an approach for an evolutionary combinatorial multi-objective optimization of business process designs using a variation of NSGAII. We discuss an opt...
Le Cloud Computing représente un nouveau modèle d'entreprise qui assure le partage de ressources informatiques contenant des informations personnelles à travers plusieurs bases de données distribuées et privées. La confidentialité et la sécurité sont les principaux obstacles qui empêchent l'adoption extensive de cette nouvelle technologie. La confi...
Web services become increasingly important in the world of internet. Thus, users need to access and effectively share web services. The centralised UDDI is a less robust structure and does not support a large number
of web services. If the distributed environment is introduced into the UDDI, there will be a rapid increase in services with minimisat...
Business processes design optimization is known as the problem of creating feasible business processes while optimizing their criteria such as resource cost and execution time. In this paper, the authors propose an evolutionary multi-criteria approach based on a modified evolutionary algorithm for generating optimized business processes. The main c...
Recommender systems have contributed to the success of personalized websites as they can automatically and efficiently select items or services adapted to the user's interest from huge datasets. However, these systems suffer of issues related to small number of evaluations; cold start system and data sparsity. Several approaches have been explored...
Cloud computing represents a new business model which enables diverse benefits such as the sharing
of computing resources containing personal information across multiple distributed and private
databases. However, privacy and security concerns are a significant obstacle that is preventing the
extensive adoption of this new technology. Anonymization...
Web services become increasingly important in the world of
internet. Thus, users need to access and effectively share web services. The centralised UDDI is a less robust structure and does not support a large number of web services. If the distributed environment is introduced into the UDDI, there will be a rapid increase in services with minimisat...
Three classes of documents, based on their data, circulate in the web: Unstructured documents (.Doc, .html, .pdf ...), semi-structured documents (.xml, .Owl ...) and structured documents (Tables database for example). A semi-structured document is organized around predefined tags or defined by its author. However, many studies use a document classi...
In enterprise, optimization is seen as making business decisions by varying some parameters to maximize profit and reduce loss. We focus on business processes design optimization. It is known as the problem of creating feasible business processes while optimizing their criteria such as resource cost and execution time. In this paper, we propose an...
Several approaches for services development in SOA (Service Oriented Architecture) suggest business processes as a starting point. However, there is a lack of systematic methods for services identification during business analysis. It is recognized that in service engineering, service identification plays a critical role as it lays the foundation f...
The Web services technology uses a set of standards, namely SOAP, WSDL and UDDI. In particular, UDDI is a platform for storing and retrieving Web services. Thus, the problem of Web service discovery is often attached to the UDDI. As Web services are developed through Internet, users must be able to effectively access and share these services. The p...
The proliferation of wireless communications and mobile computing is producing a revolutionary change in information society. Ubiquitous Computing is a recent paradigm whose objective is to support users in accomplishing their tasks, accessing information, or communicating with other users anytime, anywhere. In this paper, the authors present novel...
The idea of using ontologies in the field of software engineering is not new. For more than 10 years, the Software Engineering community arouse great interest for this tool of semantic web, so to improve; their performance in production time and realisation complexity on the one hand, and software reliability and quality on the other hand. The stan...
Recommender systems help users find relevant Web service based on peers' previous experiences dealing with Web services (WSs). However, with the proliferation of WSs, recommendation has become "questionable". Social computing seems offering innovative solutions to improve the quality of recommendations. Social computing is at the crossroad of compu...
Semantic similarity calculation models are found in
many applications, with the aim to give additional knowledge to
reason about their data. The choice of a similarity measure is
quite crucial for a successful implementation of reasoning. In
this work, we present an update of similarity calculation
presented by Wu and Palmer which is considered the...
Professional use of cloud health storage around the world implies Information-Retrieval extensions. These developments should help users find what they need among thousands or billions of enterprise documents and reports. However, extensions must offer protection against existing threats, for instance, hackers, server administrators and service pro...
The semantic web goal is to share and integrate data
across different domains and organizations. The knowledge
representations of semantic data are made possible by ontology.
As the usage of semantic web increases, construction of the
semantic web ontologies is also increased. Moreover, due to
the monolithic nature of the ontology various semantic...
Web service selection is an indispensable process
for web service composition. However it became a difficult
task as many web services are increased on the web and mostly
they offer similar functionalities, which service will be the best.
User preferences are the key to retain only the best services for
the composition. In this paper, we have propo...
Pervasive computing is a paradigm that focuses on the availability of computer resources anytime anywhere for any application and supports integration of computing services into everyday life. Context awareness is the core feature of pervasive computing. High-level context awareness can be enhanced by situation awareness that represents the ability...