-
Système d'indexation et de recherche de vidéo intégrant un système gestuel pour les personnes handicapées
Authors:
Mohamed Hamroun,
Mohamed Salim Bouhlel
Abstract:
The amount of audio-visual information has increased dramatically with the advent of High Speed Internet. Furthermore, technological advances in recent years in the field of information technology, have simplified the use of video data in various fields by the general public. This made it possible to store large collections of video documents into computer systems. To enable efficient use of these…
▽ More
The amount of audio-visual information has increased dramatically with the advent of High Speed Internet. Furthermore, technological advances in recent years in the field of information technology, have simplified the use of video data in various fields by the general public. This made it possible to store large collections of video documents into computer systems. To enable efficient use of these collections, it is necessary to develop tools to facilitate access to these documents and handling them. In this paper we propose a method for indexing and retrieval of video sequences in a video database of large dimension, based on a weighting technique to calculate the degree of membership of a concept in a video also a structuring of the data of the audio-visual (context / concept / video). Finally, we decided to create a search system, offering in addition to the usual commands, different types of access to the system, depending on the disability of the person. Indeed, the application consists of a search system but offers access to commands through voice or gestures. Our contribution at the experimental level consists with the implementation of prototype. We integrated the techniques proposed in system to evaluate it contributions in terms of effectiveness and precision.
△ Less
Submitted 24 April, 2019;
originally announced April 2019.
-
Image encryption with dynamic chaotic Look-Up Table
Authors:
Med Karim Abdmouleh,
Ali Khalfallah,
Med Salim Bouhlel
Abstract:
In this paper we propose a novel image encryption scheme. The proposed method is based on the chaos theory. Our cryptosystem uses the chaos theory to define a dynamic chaotic Look-Up Table (LUT) to compute the new value of the current pixel to cipher. Applying this process on each pixel of the plain image, we generate the encrypted image. The results of different experimental tests, such as Key sp…
▽ More
In this paper we propose a novel image encryption scheme. The proposed method is based on the chaos theory. Our cryptosystem uses the chaos theory to define a dynamic chaotic Look-Up Table (LUT) to compute the new value of the current pixel to cipher. Applying this process on each pixel of the plain image, we generate the encrypted image. The results of different experimental tests, such as Key space analysis, Information Entropy and Histogram analysis, show that the proposed encryption image scheme seems to be protected against various attacks. A comparison between the plain and encrypted image, in terms of correlation coefficient, proves that the plain image is very different from the encrypted one.
△ Less
Submitted 9 February, 2016;
originally announced February 2016.
-
A new Watermarking Technique for Medical Image using Hierarchical Encryption
Authors:
Med Karim Abdmouleh,
Ali Khalfallah,
Med Salim Bouhlel
Abstract:
In recent years, characterized by the innovation of technology and the digital revolution, the field of media has become important. The transfer and exchange of multimedia data and duplication have become major concerns of researchers. Consequently, protecting copyrights and ensuring service safety is needed. Cryptography has a specific role, is to protect secret files against unauthorized access.…
▽ More
In recent years, characterized by the innovation of technology and the digital revolution, the field of media has become important. The transfer and exchange of multimedia data and duplication have become major concerns of researchers. Consequently, protecting copyrights and ensuring service safety is needed. Cryptography has a specific role, is to protect secret files against unauthorized access. In this paper, a hierarchical cryptosystem algorithm based on Logistic Map chaotic systems is proposed. The results show that the proposed method improves the security of the image. Experimental results on a database of 200 medical images show that the proposed method significantly gives better results.
△ Less
Submitted 16 September, 2014;
originally announced September 2014.
-
Algorithmes dynamiques pour la communication dans le réseau ad hoc Coloration des graphes
Authors:
Ali Mansouri,
Mohamed Salim Bouhlel
Abstract:
Several authors modelled networks ad hoc by oriented or disoriented graphs, whereby the problem of allowance (allocation) of the frequencies at the level of the network was transformed into coloring problem of nodes in the graph. Graph coloring is a tool to characterize the graphs. In our study, we were interested in particular in the coloring of vertex. In this domain, a large number of parameter…
▽ More
Several authors modelled networks ad hoc by oriented or disoriented graphs, whereby the problem of allowance (allocation) of the frequencies at the level of the network was transformed into coloring problem of nodes in the graph. Graph coloring is a tool to characterize the graphs. In our study, we were interested in particular in the coloring of vertex. In this domain, a large number of parameters of coloring were defined. A coloring for which two neighboring summits do not have same color is called proper coloring. We proposed to evaluate two other parameters vertex coloring maximizing the number of colors to use: b-chromatic number and especially the number of Grundy. These studies have focused on two types of graphs, which are the powers graphs and Cartesian sum of graphs. In the first part, we determined borders among Grundy for the Cartesian sum of graphs and finally we proposed algorithms for the coloration of graphs. First of all, we gave some properties and results for simple graphs (stable, chain, cycle, full, star, bipartisan). Secondly, we studied the Cartesian sum of two graphs by giving exact values of the number of Grundy for diverse classes of graphs (sum of a chain and a chain, a chain and a cycle, a cycle and a cycle) then we estimated borders of this parameter for the sum of a complete graph and any other graph. In the second part, we presented the results of the Cartesian sum of several graphs and in the last part; we also gave an algorithm for generating graphs with a given number of Grundy. Thereafter, we studied another parameter namely the partial coloring Grundy. The properties of this parameter are close to those of total Grundy. Finally, we used parameters of coloring total Grundy and partial Grundy to generate algorithms of coloring of graphs. We proposed algorithms of coloring basing on the properties of certain graphs.
△ Less
Submitted 5 June, 2014;
originally announced June 2014.
-
A linear algorithm for the grundy number of a tree
Authors:
Ali Mansouri,
Mohamed Salim Bouhlel
Abstract:
A coloring of a graph G = (V,E) is a partition {V1, V2, . . ., Vk} of V into independent sets or color classes. A vertex v Vi is a Grundy vertex if it is adjacent to at least one vertex in each color class Vj . A coloring is a Grundy coloring if every color class contains at least one Grundy vertex, and the Grundy number of a graph is the maximum number of colors in a Grundy coloring. We derive a…
▽ More
A coloring of a graph G = (V,E) is a partition {V1, V2, . . ., Vk} of V into independent sets or color classes. A vertex v Vi is a Grundy vertex if it is adjacent to at least one vertex in each color class Vj . A coloring is a Grundy coloring if every color class contains at least one Grundy vertex, and the Grundy number of a graph is the maximum number of colors in a Grundy coloring. We derive a natural upper bound on this parameter and show that graphs with sufficiently large girth achieve equality in the bound. In particular, this gives a linear time algorithm to determine the Grundy number of a tree.
△ Less
Submitted 1 June, 2014;
originally announced June 2014.
-
Coloration de nombre de Grundy pour les graphes triangulés
Authors:
Ali Mansouri,
Mohamed Salim bouhlel
Abstract:
The problem of the data routing management, it provides a method or a strategy that guarantees at any time the connection between any pair of nodes in the network. This routing method must be able to cope with frequent changes in the topology and also other characteristics of the ad hoc network as bandwidth, the number of links, network resources etc.. We also illustrate the utility of the propose…
▽ More
The problem of the data routing management, it provides a method or a strategy that guarantees at any time the connection between any pair of nodes in the network. This routing method must be able to cope with frequent changes in the topology and also other characteristics of the ad hoc network as bandwidth, the number of links, network resources etc.. We also illustrate the utility of the proposed algorithms: the problem of assignment or frequency allotment in a radio network or mobile phones as in the following way: how to attribute a frequency to every transmitter(issuer) or an unity(unit) of the network, so that two broadcasting stations (issuers) which can interfere have frequencies distant enough from each other ? Thus to affect the wavelengths means finding a coloring of the graph, but because the network is not stable and the topology is dynamic, we need a method which maintains the initial allocation of the frequencies or to look for a new allocation to maintain the stability of the network.
△ Less
Submitted 28 May, 2014;
originally announced May 2014.
-
Results for grundy number of the complement of bipartite graphs
Authors:
Ali Mansouri,
Mohamed Salim Bouhlel
Abstract:
A Grundy k-coloring of a graph G, is a vertex k-coloring of G such that for each two colors i and j with i < j, every vertex of G colored by j has a neighbor with color i. The Grundy chromatic number (G), is the largest integer k for which there exists a Grundy k-coloring for G. In this note we first give an interpretation of (G) in terms of the total graph of G, when G is the complement of a bipa…
▽ More
A Grundy k-coloring of a graph G, is a vertex k-coloring of G such that for each two colors i and j with i < j, every vertex of G colored by j has a neighbor with color i. The Grundy chromatic number (G), is the largest integer k for which there exists a Grundy k-coloring for G. In this note we first give an interpretation of (G) in terms of the total graph of G, when G is the complement of a bipartite graph. Then we prove that determining the Grundy number of the complement of bipartite graphs is an NP-Complete problem
△ Less
Submitted 25 May, 2014;
originally announced May 2014.
-
Exact values for the Grundy number of some graphs
Authors:
Ali Mansouri,
Mohamed Salim Bouhlel
Abstract:
The Grundy number of a graph G is the maximum number k of colors used to color the vertices of G such that the coloring is proper and every vertex x colored with color i, is adjacent to (i - 1) vertices colored with each color j, In this paper we give bounds for the Grundy number of some graphs and Cartesian products of graphs. In particular, we determine an exact value of this parameter for n-dim…
▽ More
The Grundy number of a graph G is the maximum number k of colors used to color the vertices of G such that the coloring is proper and every vertex x colored with color i, is adjacent to (i - 1) vertices colored with each color j, In this paper we give bounds for the Grundy number of some graphs and Cartesian products of graphs. In particular, we determine an exact value of this parameter for n-dimensional meshes and some n-dimensional toroidal meshes. Finally, we present an algorithm to generate all graphs for a given Grundy number
△ Less
Submitted 25 May, 2014;
originally announced May 2014.
-
The result for the grundy number on p4 classes
Authors:
Ali Mansouri,
Mohamed Salim bouhlel
Abstract:
Our work becomes integrated into the general problem of the stability of the network ad hoc. Some, works attacked (affected) this problem. Among these works, we find the modelling of the network ad hoc in the form of a graph. We can resume the problem of coherence of the network ad hoc of a problem of allocation of frequency We study a new class of graphs, the fat-extended P4 graphs, and we give a…
▽ More
Our work becomes integrated into the general problem of the stability of the network ad hoc. Some, works attacked (affected) this problem. Among these works, we find the modelling of the network ad hoc in the form of a graph. We can resume the problem of coherence of the network ad hoc of a problem of allocation of frequency We study a new class of graphs, the fat-extended P4 graphs, and we give a polynomial time algorithm to calculate the Grundy number of the graphs in this class. This result implies that the Grundy number can be found in polynomial time for many graphs
△ Less
Submitted 30 January, 2014;
originally announced January 2014.
-
Progressive Compression of 3D Objects with an Adaptive Quantization
Authors:
Zeineb Abderrahim,
Elhem Techini,
Mohamed Salim Bouhlel
Abstract:
This paper presents a new progressive compression method for triangular meshes. This method, in fact, is based on a schema of irregular multi-resolution analysis and is centered on the optimization of the rate-distortion trade-off. The quantization precision is adapted to each vertex during the encoding / decoding process to optimize the rate-distortion compromise. The Optimization of the treated…
▽ More
This paper presents a new progressive compression method for triangular meshes. This method, in fact, is based on a schema of irregular multi-resolution analysis and is centered on the optimization of the rate-distortion trade-off. The quantization precision is adapted to each vertex during the encoding / decoding process to optimize the rate-distortion compromise. The Optimization of the treated mesh geometry improves the approximation quality and the compression ratio at each level of resolution. The experimental results show that the proposed algorithm gives competitive results compared to the previous works dealing with the rate-distortion compromise.
△ Less
Submitted 12 September, 2013;
originally announced September 2013.
-
Improvement of ISOM by using filter
Authors:
Imen Chaabouni,
Wiem Fourati,
Med Salim Bouhlel
Abstract:
Image compression helps in storing the transmitted data in proficient way by decreasing its redundancy. This technique helps in transferring more digital or multimedia data over internet as it increases the storage space. It is important to maintain the image quality even if it is compressed to certain extent. Depend upon this the image compression is classified into two categories : lossy and los…
▽ More
Image compression helps in storing the transmitted data in proficient way by decreasing its redundancy. This technique helps in transferring more digital or multimedia data over internet as it increases the storage space. It is important to maintain the image quality even if it is compressed to certain extent. Depend upon this the image compression is classified into two categories : lossy and lossless image compression. There are many lossy digital image compression techniques exists. Among this Incremental Self Organizing Map is a familiar one. The good pictures quality can be retrieved if image denoising technique is used for compression and also provides better compression ratio. Image denoising is an important pre-processing step for many image analysis and computer vision system. It refers to the task of recovering a good estimate of the true image from a degraded observation without altering and changing useful structure in the image such as discontinuities and edges. Many approaches have been proposed to remove the noise effectively while preserving the original image details and features as much as possible. This paper proposes a technique for image compression using Incremental Self Organizing Map (ISOM) with Discret Wavelet Transform (DWT) by applying filtering techniques which play a crucial role in enhancing the quality of a reconstructed image. The experimental result shows that the proposed technique obtained better compression ratio value.
△ Less
Submitted 10 July, 2012;
originally announced July 2012.