Skip to main content

Showing 1–17 of 17 results for author: Cheikh, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.13139  [pdf, ps, other

    cs.LG cs.AR

    Efficient Implementation of LinearUCB through Algorithmic Improvements and Vector Computing Acceleration for Embedded Learning Systems

    Authors: Marco Angioli, Marcello Barbirotta, Abdallah Cheikh, Antonio Mastrandrea, Francesco Menichelli, Mauro Olivieri

    Abstract: As the Internet of Things expands, embedding Artificial Intelligence algorithms in resource-constrained devices has become increasingly important to enable real-time, autonomous decision-making without relying on centralized cloud servers. However, implementing and executing complex algorithms in embedded devices poses significant challenges due to limited computational power, memory, and energy r… ▽ More

    Submitted 22 January, 2025; originally announced January 2025.

  2. arXiv:2407.14658  [pdf, other

    cs.CV cs.AI

    A New Lightweight Hybrid Graph Convolutional Neural Network -- CNN Scheme for Scene Classification using Object Detection Inference

    Authors: Ayman Beghdadi, Azeddine Beghdadi, Mohib Ullah, Faouzi Alaya Cheikh, Malik Mallem

    Abstract: Scene understanding plays an important role in several high-level computer vision applications, such as autonomous vehicles, intelligent video surveillance, or robotics. However, too few solutions have been proposed for indoor/outdoor scene classification to ensure scene context adaptability for computer vision frameworks. We propose the first Lightweight Hybrid Graph Convolutional Neural Network… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

  3. arXiv:2401.16549  [pdf

    cs.LG cs.CV

    Deep Learning for Multi-Label Learning: A Comprehensive Survey

    Authors: Adane Nega Tarekegn, Mohib Ullah, Faouzi Alaya Cheikh

    Abstract: Multi-label learning is a rapidly growing research area that aims to predict multiple labels from a single input data point. In the era of big data, tasks involving multi-label classification (MLC) or ranking present significant and intricate challenges, capturing considerable attention in diverse domains. Inherent difficulties in MLC include dealing with high-dimensional data, addressing label co… ▽ More

    Submitted 25 June, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: 20 pages, 5 tables

  4. arXiv:2311.06976  [pdf, other

    cs.CV cs.DB

    CD-COCO: A Versatile Complex Distorted COCO Database for Scene-Context-Aware Computer Vision

    Authors: Ayman Beghdadi, Azeddine Beghdadi, Malik Mallem, Lotfi Beji, Faouzi Alaya Cheikh

    Abstract: The recent development of deep learning methods applied to vision has enabled their increasing integration into real-world applications to perform complex Computer Vision (CV) tasks. However, image acquisition conditions have a major impact on the performance of high-level image processing. A possible solution to overcome these limitations is to artificially augment the training databases or to de… ▽ More

    Submitted 12 November, 2023; originally announced November 2023.

  5. A Neural Network based Framework for Effective Laparoscopic Video Quality Assessment

    Authors: Zohaib Amjad Khan, Azeddine Beghdadi, Mounir Kaaniche, Faouzi Alaya Cheikh, Osama Gharbi

    Abstract: Video quality assessment is a challenging problem having a critical significance in the context of medical imaging. For instance, in laparoscopic surgery, the acquired video data suffers from different kinds of distortion that not only hinder surgery performance but also affect the execution of subsequent tasks in surgical navigation and robotic surgeries. For this reason, we propose in this paper… ▽ More

    Submitted 14 April, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

  6. Residual Networks based Distortion Classification and Ranking for Laparoscopic Image Quality Assessment

    Authors: Zohaib Amjad Khan, Azeddine Beghdadi, Mounir Kaaniche, Faouzi Alaya Cheikh

    Abstract: Laparoscopic images and videos are often affected by different types of distortion like noise, smoke, blur and nonuniform illumination. Automatic detection of these distortions, followed generally by application of appropriate image quality enhancement methods, is critical to avoid errors during surgery. In this context, a crucial step involves an objective assessment of the image quality, which i… ▽ More

    Submitted 12 June, 2021; originally announced June 2021.

    Comments: 5 Pages, ICIP 2020

  7. Klessydra-T: Designing Vector Coprocessors for Multi-Threaded Edge-Computing Cores

    Authors: Abdallah Cheikh, Stefano Sordillo, Antonio Mastrandrea, Francesco Menichelli, Giuseppe Scotti, Mauro Olivieri

    Abstract: Computation intensive kernels, such as convolutions, matrix multiplication and Fourier transform, are fundamental to edge-computing AI, signal processing and cryptographic applications. Interleaved-Multi-Threading (IMT) processor cores are interesting to pursue energy efficiency and low hardware cost for edge-computing, yet they need hardware acceleration schemes to run heavy computational workloa… ▽ More

    Submitted 7 February, 2021; v1 submitted 17 July, 2020; originally announced July 2020.

    Comments: Final revision accepted for publication on IEEE Micro Journal

    ACM Class: C.1

    Journal ref: IEEE Micro, 2021

  8. arXiv:2006.06134  [pdf, other

    cs.CV cs.LG eess.IV

    Kalman Filter Based Multiple Person Head Tracking

    Authors: Mohib Ullah, Maqsood Mahmud, Habib Ullah, Kashif Ahmad, Ali Shariq Imran, Faouzi Alaya Cheikh

    Abstract: For multi-target tracking, target representation plays a crucial rule in performance. State-of-the-art approaches rely on the deep learning-based visual representation that gives an optimal performance at the cost of high computational complexity. In this paper, we come up with a simple yet effective target representation for human tracking. Our inspiration comes from the fact that the human body… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

    Comments: 5 pages, 2 figures

  9. arXiv:1907.06082  [pdf, other

    cs.CV

    Adaptive Context Encoding Module for Semantic Segmentation

    Authors: Congcong Wang, Faouzi Alaya Cheikh, Azeddine Beghdadi, Ole Jakob Elle

    Abstract: The object sizes in images are diverse, therefore, capturing multiple scale context information is essential for semantic segmentation. Existing context aggregation methods such as pyramid pooling module (PPM) and atrous spatial pyramid pooling (ASPP) design different pooling size or atrous rate, such that multiple scale information is captured. However, the pooling sizes and atrous rates are chos… ▽ More

    Submitted 13 July, 2019; originally announced July 2019.

  10. arXiv:1902.00311  [pdf, other

    cs.CV

    Generative Smoke Removal

    Authors: Oleksii Sidorov, Congcong Wang, Faouzi Alaya Cheikh

    Abstract: In minimally invasive surgery, the use of tissue dissection tools causes smoke, which inevitably degrades the image quality. This could reduce the visibility of the operation field for surgeons and introduces errors for the computer vision algorithms used in surgical navigation systems. In this paper, we propose a novel approach for computational smoke removal using supervised image-to-image trans… ▽ More

    Submitted 4 December, 2019; v1 submitted 1 February, 2019; originally announced February 2019.

    Comments: Presented at NeurIPS Workshop and published in Proceedings of Machine Learning Research

  11. arXiv:1812.10784  [pdf, other

    cs.CV

    Can Image Enhancement be Beneficial to Find Smoke Images in Laparoscopic Surgery?

    Authors: Congcong Wang, Vivek Sharma, Yu Fan, Faouzi Alaya Cheikh, Azeddine Beghdadi, Ole Jacob Elle, Rainer Stiefelhagen

    Abstract: Laparoscopic surgery has a limited field of view. Laser ablation in a laproscopic surgery causes smoke, which inevitably influences the surgeon's visibility. Therefore, it is of vital importance to remove the smoke, such that a clear visualization is possible. In order to employ a desmoking technique, one needs to know beforehand if the image contains smoke or not, to this date, there exists no ac… ▽ More

    Submitted 27 December, 2018; originally announced December 2018.

    Comments: In proceedings of IST, Color and Imaging Conference (CIC 26). Congcong Wang and Vivek Sharma contributed equally to this work and listed in alphabetical order

  12. arXiv:1803.08410  [pdf, other

    cs.CV

    A Smoke Removal Method for Laparoscopic Images

    Authors: Congcong Wang, Faouzi Alaya Cheikh, Mounir Kaaniche, Ole Jacob Elle

    Abstract: In laparoscopic surgery, image quality can be severely degraded by surgical smoke, which not only introduces error for the image processing (used in image guided surgery), but also reduces the visibility of the surgeons. In this paper, we propose to enhance the laparoscopic images by decomposing them into unwanted smoke part and enhanced part using a variational approach. The proposed method relie… ▽ More

    Submitted 22 March, 2018; originally announced March 2018.

  13. The microarchitecture of a multi-threaded RISC-V compliant processing core family for IoT end-nodes

    Authors: Abdallah Cheikh, Gianmarco Cerutti, Antonio Mastrandrea, Francesco Menichelli, Mauro Olivieri

    Abstract: Internet-of-Things end-nodes demand low power processing platforms characterized by heterogeneous dedicated units, controlled by a processor core running concurrent control threads. Such architecture scheme fits one of the main target application domain of the RISC-V instruction set. We present an open-source processing core compliant with RISC-V on the software side and with the popular Pulpino p… ▽ More

    Submitted 13 December, 2017; originally announced December 2017.

    Comments: 8 pages

    Journal ref: ApplePies 2017. Lecture Notes in Electrical Engineering, vol 512. 2019. Springer

  14. Efficiency Evaluation Metrics for Wireless Intelligent Sensors Applications

    Authors: Saad Chakkor, El Ahmadi Cheikh, Mostafa Baghouri, Abderrahmane Hajraoui

    Abstract: The metrology field has been progressed with the appearance of the wireless intelligent sensor systems providing more capabilities such as signal processing, remote multi-sensing fusion etc. This kind of devices is rapidly making their way into medical and industrial monitoring, collision avoidance, traffic control, automotive and others applications. However, numerous design challenges for wirele… ▽ More

    Submitted 24 September, 2014; originally announced September 2014.

    Comments: 10 pages, 14 figures, 7 tables, journal research paper. arXiv admin note: substantial text overlap with arXiv:1409.6884

    Journal ref: International Journal of Intelligent Systems and Application, Volume 6 No 10, October 2014, Mecs Press Publisher

  15. Comparative Performance Analysis of Wireless Communication Protocols for Intelligent Sensors and Their Applications

    Authors: Saad Chakkor, El Ahmadi Cheikh, Mostafa Baghouri, Abderrahmane Hajraoui

    Abstract: The systems based on intelligent sensors are currently expanding, due to theirs functions and theirs performances of intelligence: transmitting and receiving data in real-time, computation and processing algorithms, metrology remote, diagnostics, automation and storage measurements...The radio frequency wireless communication with its multitude offers a better solution for data traffic in this kin… ▽ More

    Submitted 24 September, 2014; originally announced September 2014.

    Comments: 10 pages, 11 figures, 7 tables, journal paper

    Journal ref: (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 4, 2014, pages 76-85

  16. arXiv:1206.2610   

    cs.CR math.NT

    An Efficient Signature Scheme based on Factoring and Discrete Logarithm

    Authors: Abdoul Aziz Ciss, Ahmed Youssef Ould Cheikh

    Abstract: This paper proposes a new signature scheme based on two hard problems : the cube root extraction modulo a composite moduli (which is equivalent to the factorisation of the moduli, IFP) and the discrete logarithm problem(DLP). By combining these two cryptographic assumptions, we introduce an efficient and strongly secure signature scheme. We show that if an adversary can break the new scheme with a… ▽ More

    Submitted 21 September, 2012; v1 submitted 12 June, 2012; originally announced June 2012.

    Comments: There are some mistakes in the paper

  17. arXiv:1205.1212   

    cs.CR math.NT

    A Factoring and Discrete Logarithm based Cryptosystem

    Authors: Abdoul Aziz Ciss, Ahmed Youssef Ould Cheikh, Djiby Sow

    Abstract: This paper introduces a new public key cryptosystem based on two hard problems : the cube root extraction modulo a composite moduli (which is equivalent to the factorisation of the moduli) and the discrete logarithm problem. These two hard problems are combined during the key generation, encryption and decryption phases. By combining the IFP and the DLP we introduce a secure and efficient public k… ▽ More

    Submitted 23 September, 2012; v1 submitted 6 May, 2012; originally announced May 2012.

    Comments: Something was not correct in the paper