• Home
  • Sidi Mohamed Benslimane
Sidi Mohamed Benslimane

Sidi Mohamed Benslimane
  • PhD, Professor(Full) in Computer Science
  • Professor (Full) at Ecole Superieure en Informatique, Sidi Bel Abbes, Algeria

Head of the Ecole Supérieure en Informatique -08 Mai 1945 - Sidi Bel Abbes

About

183
Publications
40,417
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
732
Citations
Introduction
Sidi Mohamed Benslimane is a Full Professor at Ecole Superieure en Informatique, Sidi Bel-Abbes, Algeria. He received his PhD degree in computer science from Sidi Bel Abbes University in 2007. He is currently Head of Research Team 'Service Oriented Computing' at the LabRI Laboratory. His research interests include, semantic web, service oriented computing, and cloud computing, ontology engineering, information and knowledge management, , Context-Aware Computing. He has published papers in well-known journals (IEEE Transactions on Knowledge and Data Engineering, World Wide Web Springer, etc.)
Current institution
Ecole Superieure en Informatique, Sidi Bel Abbes, Algeria
Current position
  • Professor (Full)
Additional affiliations
June 2015 - May 2016
École Supérieure en Informatique Sidi Bel Abbe
Position
  • Professor (Full)
December 2001 - June 2015
Djillali Liabes University Sidi Bel Abbès
Position
  • Professor
December 2011 - June 2015
Djillali Liabes University Sidi Bel Abbès
Position
  • associat professor
Education
January 2002 - June 2007
Djillali Liabes University Sidi Bel Abbès
Field of study
  • Computer Science
September 1998 - June 2001
Djillali Liabes University Sidi Bel Abbès
Field of study
  • Computer Science
September 1989 - June 1994
Djillali Liabes University Sidi Bel Abbès
Field of study
  • Computer Science

Publications

Publications (183)
Article
Full-text available
With the emergence of the open data movement, hundreds of thousands of datasets from various concerns are now freely available on Internet. The access to a good number of these datasets is carried out through Web services which provide a standard way to interact with data. In this context, user’s queries often require the composition of multiple da...
Article
Full-text available
Automated semantic web service composition is one of the critical research challenges of service-oriented computing, since it allows users to create an application simply by specifying the inputs that the application requires, the outputs it should produce, and any constraints it should respect. The composition problem has been handled using a vari...
Article
Machine Learning (ML) for swarm motion prediction is a relatively unexplored area that could help sustain and monitor daily swarm robotics collective tasks. This paper focuses on a specific application of swarm robotics which is pattern formation, to demonstrate the ability of Ensemble Learning (EL) approaches to predict the motion speed of swarm r...
Article
Offshore wind energy is expected to be the first source of energy in the future thanks to its numerous advantages. However, its maintenance is a complex and costly activity, which is increasingly attracting the attention of researchers and industrials. This paper proposes a simulation-optimization approach for the routing and the scheduling of main...
Article
This paper addresses the critical issue of preserving privacy in data sharing by introducing "ImBLd," an enhanced multidimensional bottom-up anonymization approach based on the l-diversity privacy model. Implemented on the Apache Spark framework, ImBLd optimizes data utility through efficient data insertion and splitting processes. Our method i...
Article
Full-text available
One of the critical challenges in the big data analytics is the individual’s privacy issues. Data anonymization models including k-anonymity and l-diversity are used to guarantee the tradeoff between privacy and data utility while publishing the data. However, these models focus only on the single release of datasets and produce a certain level of...
Chapter
Predictive medicine aims to improve the stratification and management of individuals according to their probability of developing a pathology in the future. The risk of breast cancer is influenced by multiple factors, such as lifestyle, age, breast density, and family history. Nevertheless, radiologists face challenges in accurately classifying bre...
Article
Full-text available
Breast density classification presents a crucial risk factor for breast cancer. The breast density evaluation via the breast imaging reporting and data system (BI-RADS) presents several challenges for medical professionals due to their variable diagnostics and workload. To address these challenges, researchers have developed computer-aided diagnost...
Chapter
The emergence of Industry 4.0 has heralded notable progress in manufacturing processes, utilizing sophisticated sensing and data analytics technologies to maximize efficiency. A vital component within this model is predictive maintenance, which is instrumental in ensuring the dependability and readiness of production systems. Nonetheless, the heter...
Conference Paper
Full-text available
The advent of industry 4.0 (I4.0) has brought about significant advancements in manufacturing processes, leveraging advanced sensing and data analytics technologies to optimize efficiency. Within this paradigm, predictive maintenance (PdM) plays a crucial role in ensuring the reliability and availability of production systems. There are several exi...
Conference Paper
The emergence of Industry 4.0 has heralded notable progress in manufacturing processes , utilizing sophisticated sensing and data analytics technologies to maximize efficiency. A vital component within this model is predictive maintenance, which is instrumental in ensuring the dependability and readiness of production systems. Nonetheless, the hete...
Conference Paper
Humans are often impacted by the presentation of choices in a digital environment. But they differ in their characteristics, behaviours, skills, limitations, and act differently in the same environment. Therefore, Influencing users choices through adaptive human-machine interfaces is crucial in context-aware technologies characterizing the industry...
Chapter
Multimodal interfaces offer users different and appropriate ways to communicate with smart devices. However, despite the advantages of multimodal interactions and their interest in connected environments, only a few of them could reach end users. One of the problems causing this concerns the obligation of using intermediate equipment between users...
Conference Paper
Three classes of documents, based on their data, circulate in the web: Unstructured documents (.Doc, .html, .pdf, ...), semi-structured documents (.xml, .Owl ...) and structured documents (Tables database for example). A semi-structured document is organized around predefined tags or defined by its author. However, many studies use a document class...
Conference Paper
: The first phase of reverse engineering of web-oriented applications is the extraction of concepts hidden in HTML pages including tables, lists and forms, or marked in XML documents. In this paper, we present an approach to index semantically these two sources of information (HTML page and XML document) using on the one hand, domain ontology to...
Chapter
Sentiment analysis is one of the recent areas of emerging research in the classification of sentiment polarity and text mining, particularly with the considerable number of opinions available on social media. The Algerian Operator Telephone Ooredoo, as other operators, deploys in its new strategy to conquer new customers, by exploiting their opinio...
Article
Full-text available
The main purpose in this work is to explore the fact that chaos, as a biological characteristic in the brain, should be used in an Artificial Neural Network (ANN) system. In fact, as long as chaos is present in brain functionalities, its properties need empirical investigations to show their potential to enhance accuracies in artificial neural netw...
Article
Full-text available
Forms of influence are widely applied in social networks in order to encourage users to take actions that are favourable to these technologies providers. In our prior work, we proposed a set of influence patterns that are applied in social networks (suggestion pattern, reminder pattern, reward pattern, interaction pattern and social influence patte...
Article
Full-text available
Stress is a serious health problem that affects a large part of humanity. Early stress detection helps preventing stress-related health problems. The Internet of Things (IoT) plays an important role in healthcare monitoring. In this paper, we present an automatic stress detection system (QASIS), to increases the effectiveness and efficiency of heal...
Chapter
This article aims to propose an ontological user model called OUPIP (Ontology-Based User Profile for Impairment Person), that extends existing ontologies to help designers and developers to adapt applications and devices according to the user's profile, disability and dynamic context. Besides, the approach has been applied in a typical real-life sc...
Chapter
Nowadays the Internet has become an essential tool for exchanging information, both on a personal and professional level. Today, the analysis of sentiment offers us a great interest for research, marketing and industry. With millions of comments and tweeting published every day, the information available on the Internet and in social media has beco...
Article
Full-text available
Stress is a serious health problem that affects a large part of humanity. Early stress detection helps preventing stress-related health problems. The Internet of Things (IoT) plays an important role in healthcare monitoring. In this paper, we present an automatic stress detection system (QASIS), to increases the effectiveness and efficiency of heal...
Article
Full-text available
Context-Aware Recommender Systems (CARS) improve traditional Recommender Systems (RS) in a wide array of domains and applications. However, CARS suffer from several inherent issues such as data sparsity and cold start. Incorporating trust into recommender systems can handle these issues. Trust-aware recommender systems use information from social n...
Conference Paper
Artificial Neural Networks (ANNs) are largely used in multiple domains and represent an offshoot of pattern recognition paradigms. This work studies the use of three different ANN models, applied as classification technics for breast cancer identification, and as an intelligent data processing module for a multi-wavelength optoelectronic biochemica...
Conference Paper
All generations of renewable energy systems stepped into a huge evolution around the world. Countries with big potential of gaz and petroleum energies are finally concerned by the potential of this sector and are currently developing it. Algeria has a huge potential in fossil fuels, however, the government aim to exploit the renewable energy potent...
Chapter
Full-text available
In the last decade, social media have become a necessary tool for communication in the daily life of Internet users. They use various platforms to share their views on a variety of topics or to target opinions and comments on the satisfaction of a given product. Companies and large distributions surface are increasingly affected by new technology a...
Article
The addressed issue in the present work revolves around the area of business process management in general and in particular optimization. The problem involves the generation of optimized business process designs from a business process model in a multi-criteria optimization environment by appealing an evolutionary algorithm. Thus, the main contrib...
Article
Full-text available
Collaborative and content-based recommender systems are widely employed in several activity domains helping users in finding relevant products and services (i.e., items). However, with the increasing features of items, the users are getting more demanding in their requirements, and these recommender systems are becoming not able to be efficient for...
Chapter
Many organizations, especially small and medium business (SMB) enterprises require the collection and sharing of data containing personal information. The privacy of this data must be preserved before outsourcing to the commercial public. Privacy preserving data publishing PPDP refers to the process of publishing useful information while preserving...
Conference Paper
Full-text available
The ontology has marked its presence in several research fields in order to address issues in knowledge mod-eling, Artificial Intelligence, classification, clustering and more specifically in knowledge engineering. In the Web Service field, ontology is used principally to describe the Web Service interface for discovering, storing and composing Web...
Article
Mobile Multimodal Interaction aims at exploiting complementary aspects of human communication capacities and new mobile sensors. Recently, most mobile applications are limited to a basic interaction modality, namely touchscreen, which is subject to restricted interaction under certain situations. In this paper, we present On-the-Fly Interaction Edi...
Article
Data Mashups are Web applications that combine complementary (raw) data pieces from different data services or Web data APIs to provide value added information to users. They became so popular over the last few years; their applications are numerous and vary from addressing transient business needs in modern enterprises. Even though Data Mashups ha...
Article
Purpose Improving reliability is a key factor in reducing the cost of wind energy, which is strongly influenced by the cost of maintenance operations. In this context, this paper aims to propose a degradation model that describes the phenomenon of fault propagation to apply proactive maintenance that will act on the cause of failure to prevent its...
Article
The efficient evaluation of top-k queries is crucial for many applications where a huge quantity of data should be ranked and sorted to return the best answers to users in a reasonable time. Examples include, e-commerce platforms (e.g., amazon.com), multimedia sharing platforms, web databases, etc. Most often, these applications need to retrieve da...
Article
Full-text available
The web of things (WoT) uses web technologies to connect embedded objects to each other and to deliver services to stakeholders. The context of these interactions (situation) is a key source of information which can be sometimes uncertain. In this paper, we focus on the development of intelligent web services. The main requirements for intelligent...
Article
Sentiment analysis is one of the recent areas of emerging research in the classification of sentiment polarity and text mining, particularly with the considerable number of opinions available on social media. The Algerian Operator Telephone Ooredoo, as other operators, deploys in its new strategy to conquer new customers, by exploiting their opinio...
Article
Business process modeling notation (BPMN) is a widely used business model process. The importance of security is apparent, but traditionally, it is considered after the business processes definition. There is a need for integrated tools and a methodology that allows for specifying and enforcing compliance and security requirements for business proc...
Article
This article aims to propose an ontological user model called OUPIP (Ontology-Based User Profile for Impairment Person), that extends existing ontologies to help designers and developers to adapt applications and devices according to the user's profile, disability and dynamic context. Besides, the approach has been applied in a typical real-life sc...
Conference Paper
Full-text available
In privacy preserving data publishing, the privacy models focuse only on single release of anonymzed data. The scenario of publishing is more complicated where the data is anonymized in different manners and at different times. Privacy Preserving Dynamic Data Publishing is the paradigm that addresses the dynamic data anonymization for various purpo...
Article
Full-text available
The web of things (WoT) uses web technologies to connect embedded objects to each other and to deliver services to stakeholders. The context of these interactions (situation) is a key source of information which can be sometimes uncertain. In this paper, we focus on the development of intelligent web services. The main requirements for intelligent...
Conference Paper
Ontology Modularization is one of the techniques that bear good promises of effective help towards scalability in ontology design, use, and management. The development of proper ontological modules should provide a mechanism for packaging coherent sets of concepts, relationships, axioms, and instances, and a means for reusing these sets in new envi...
Article
Full-text available
Ontology alignment is an important way of establishing interoperability between Semantic Web applications that use different but related ontologies. Ontology alignment is the process of identifying semantically equivalent entities from multiple ontologies. This is not always obvious because technical constraints such as data volume and execution ti...
Conference Paper
In the internet of things world, sensors continually generate contextual information that is the core stone for understanding and adapting to the environment according to the user situation. However, diversity of contextual data sources, its imperfection nature and the complexity to identify and model the pertinent situation make it more challengin...
Conference Paper
The rise of the semantic web and the development of different technologies allow different actors to access knowledge found in different ontologies. This is not always obvious because technical constraints such as data volume and execution time are determining factors in the choice of an alignment algorithm. Among the solutions for scaling, the ext...
Conference Paper
In the world of BI, the importance of facts is undeniable. Sentiment Analysis (SA) is a research area at the crossroads of many areas, such as data mining, natural language processing, and machine learning. This is the automatic extraction of opinions expressed in a given text. Due to its many applications, numerous studies have been conducted in t...
Conference Paper
Context aware splitting approach (CASA) is one of the most efficient pre-filtering approach of context aware recommender system (CARS). The idea under this approach is that an item (and/or user) evaluated in two different contextual conditions is considered as two different items (or/and users). Subsequently, after this process, we can use any trad...
Conference Paper
Predictive, proactive and reliability-based maintenance are considered among the most widely used approaches in the field of maintenance optimization of wind turbines. Nevertheless, most existing models are designed to optimize the maintenance of a single component of a wind turbine and do not take into consideration the different dependencies that...
Chapter
In this paper, a research was carried out on the problem of evolutionary multi objective business process optimization. It does involve (i) to construct feasible business process designs with optimum attributes, and (ii) to classify the obtained solutions using a simple and scientific approach understandable by the decision maker. The business proc...
Conference Paper
Full-text available
Using social media is one of the most common activities for mobile users. However, the over-use of these time-consuming activity can lead to addiction. In this paper, we bring out the gaps in HCI ergonomics theory that gave rise to addictive interfaces. We evaluate the usability and persuasion of the social networking mobile applications, Facebook...
Article
ABSTRACT: Data locality is becoming one of the most critical factors to affect performance of MapReduce clusters because of network bisection bandwidth becomes a bottleneck. Task scheduler assigns the most appropriate map tasks to nodes. If map tasks are scheduled to nodes without input data, these tasks will issue remote I/O operations to copy the...
Article
Many organizations, especially small and medium business (SMB) enterprises require the collection and sharing of data containing personal information. The privacy of this data must be preserved before outsourcing to the commercial public. Privacy preserving data publishing PPDP refers to the process of publishing useful information while preserving...
Article
Full-text available
In this paper, we propose an approach to extract ontological structures from datasets generated by health care users of social networking sites. The objective of this approach is to exploit the users generated implicit semantics as complement to more formalized knowledge representations. We aim by this latter to leverage the adoption level of the E...
Conference Paper
Optimization is known as the process of finding the best possible solution to a problem given a set of constraints. The problem becomes challenging when dealing with conflicting objectives, which leads to a multiplicity of solutions. Evolutionary algorithms, which use a population approach in their search procedures, are advised to suitably solve t...
Chapter
Optimization is known as the process of finding the best possible solution to a problem given a set of constraints. The problem becomes challenging when dealing with conflicting objectives, which leads to a multiplicity of solutions. Evolutionary algorithms, which use a population approach in their search procedures, are advised to suitably solve t...
Chapter
In smart cities environments, a recommender system (RS) has for goal to recommend relevant services to the user who is sometimes mobile. Thus, to be able to provide accurate personalized recommendations, the RS should be aware to the user's context (preferences, location, activities, environment, ...), thereby, it should be Context-Aware Recommende...
Conference Paper
The emergence of sensor-based modalites enriches the human-mobile interaction. However, mobile applications end-users are often faced with interaction restrictions and do not yet have the possibility to modify their interaction modalities, according to their needs. In this paper, we present an approach that allows smartphone users to add and modify...
Poster
Full-text available
This poster covers an evolutionary multi-objective optimization issue, which refers to utilize evolutionary algorithms to solve problem with (at least) two objectives. Using as a Framework, we present an approach for an evolutionary combinatorial multi-objective optimization of business process designs using a variation of NSGAII. We discuss an opt...
Thesis
Le Cloud Computing représente un nouveau modèle d'entreprise qui assure le partage de ressources informatiques contenant des informations personnelles à travers plusieurs bases de données distribuées et privées. La confidentialité et la sécurité sont les principaux obstacles qui empêchent l'adoption extensive de cette nouvelle technologie. La confi...
Article
Full-text available
Web services become increasingly important in the world of internet. Thus, users need to access and effectively share web services. The centralised UDDI is a less robust structure and does not support a large number of web services. If the distributed environment is introduced into the UDDI, there will be a rapid increase in services with minimisat...
Article
Full-text available
Business processes design optimization is known as the problem of creating feasible business processes while optimizing their criteria such as resource cost and execution time. In this paper, the authors propose an evolutionary multi-criteria approach based on a modified evolutionary algorithm for generating optimized business processes. The main c...
Article
Full-text available
Recommender systems have contributed to the success of personalized websites as they can automatically and efficiently select items or services adapted to the user's interest from huge datasets. However, these systems suffer of issues related to small number of evaluations; cold start system and data sparsity. Several approaches have been explored...
Article
Full-text available
Cloud computing represents a new business model which enables diverse benefits such as the sharing of computing resources containing personal information across multiple distributed and private databases. However, privacy and security concerns are a significant obstacle that is preventing the extensive adoption of this new technology. Anonymization...
Article
Full-text available
Web services become increasingly important in the world of internet. Thus, users need to access and effectively share web services. The centralised UDDI is a less robust structure and does not support a large number of web services. If the distributed environment is introduced into the UDDI, there will be a rapid increase in services with minimisat...
Article
Three classes of documents, based on their data, circulate in the web: Unstructured documents (.Doc, .html, .pdf ...), semi-structured documents (.xml, .Owl ...) and structured documents (Tables database for example). A semi-structured document is organized around predefined tags or defined by its author. However, many studies use a document classi...
Conference Paper
Full-text available
In enterprise, optimization is seen as making business decisions by varying some parameters to maximize profit and reduce loss. We focus on business processes design optimization. It is known as the problem of creating feasible business processes while optimizing their criteria such as resource cost and execution time. In this paper, we propose an...
Article
Full-text available
Several approaches for services development in SOA (Service Oriented Architecture) suggest business processes as a starting point. However, there is a lack of systematic methods for services identification during business analysis. It is recognized that in service engineering, service identification plays a critical role as it lays the foundation f...
Article
Full-text available
The Web services technology uses a set of standards, namely SOAP, WSDL and UDDI. In particular, UDDI is a platform for storing and retrieving Web services. Thus, the problem of Web service discovery is often attached to the UDDI. As Web services are developed through Internet, users must be able to effectively access and share these services. The p...
Article
The proliferation of wireless communications and mobile computing is producing a revolutionary change in information society. Ubiquitous Computing is a recent paradigm whose objective is to support users in accomplishing their tasks, accessing information, or communicating with other users anytime, anywhere. In this paper, the authors present novel...
Article
Full-text available
The idea of using ontologies in the field of software engineering is not new. For more than 10 years, the Software Engineering community arouse great interest for this tool of semantic web, so to improve; their performance in production time and realisation complexity on the one hand, and software reliability and quality on the other hand. The stan...
Article
Full-text available
Recommender systems help users find relevant Web service based on peers' previous experiences dealing with Web services (WSs). However, with the proliferation of WSs, recommendation has become "questionable". Social computing seems offering innovative solutions to improve the quality of recommendations. Social computing is at the crossroad of compu...
Article
Full-text available
Semantic similarity calculation models are found in many applications, with the aim to give additional knowledge to reason about their data. The choice of a similarity measure is quite crucial for a successful implementation of reasoning. In this work, we present an update of similarity calculation presented by Wu and Palmer which is considered the...
Article
Full-text available
Professional use of cloud health storage around the world implies Information-Retrieval extensions. These developments should help users find what they need among thousands or billions of enterprise documents and reports. However, extensions must offer protection against existing threats, for instance, hackers, server administrators and service pro...
Article
Full-text available
The semantic web goal is to share and integrate data across different domains and organizations. The knowledge representations of semantic data are made possible by ontology. As the usage of semantic web increases, construction of the semantic web ontologies is also increased. Moreover, due to the monolithic nature of the ontology various semantic...
Article
Full-text available
Web service selection is an indispensable process for web service composition. However it became a difficult task as many web services are increased on the web and mostly they offer similar functionalities, which service will be the best. User preferences are the key to retain only the best services for the composition. In this paper, we have propo...
Article
Full-text available
Pervasive computing is a paradigm that focuses on the availability of computer resources anytime anywhere for any application and supports integration of computing services into everyday life. Context awareness is the core feature of pervasive computing. High-level context awareness can be enhanced by situation awareness that represents the ability...

Network

Cited By