Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Farid Benhammadi is active.

Publication


Featured researches published by Farid Benhammadi.


international symposium on parallel and distributed computing | 2009

CPU Load Prediction Model for Distributed Computing

K. Beghdad Bey; Farid Benhammadi; Aicha Mokhtari; Zahia Guessoum

Resources performance forecasting constitutes one of particularly significant research problems in distributed computing. To ensure an adequate use of the computing resources in a metacomputing environment, there is a need for effective and flexible forecasting method to determine the available performance on each resource. In this paper, we present a modeling approach to estimating the future value of CPU load. This modeling prediction approach uses the combination of Adaptive Network-based Fuzzy Inference Systems (ANFIS) and the clustering process applied on the CPU Load time series. Experiments show the feasibility and effectiveness of this approach that achieves significant improvement and outperforms the existing CPU load prediction models reported in literature.


Neurocomputing | 2011

CPU load prediction using neuro-fuzzy and Bayesian inferences

Kadda Beghdad Bey; Farid Benhammadi; Zahia Gessoum; Aicha Mokhtari

Ensuring adequate use of the computing resources for highly fluctuating availability in multi-user computational environments requires effective prediction models, which play a key role in achieving application performance for large-scale distributed applications. Predicting the processor availability for scheduling a new process or task in a distributed environment is a basic problem that arises in many important contexts. The present paper aims at developing a model for single-step-ahead CPU load prediction that can be used to predict the future CPU load in a dynamic environment. Our prediction model is based on the control of multiple Local Adaptive Network-based Fuzzy Inference Systems Predictors (LAPs) via the Naive Bayesian Network inference between clusters states of CPU load time points obtained by the C-means clustering process. Experimental results show that our model performs better and has less overhead than other approaches reported in the literature.


Image and Vision Computing | 2014

Password hardened fuzzy vault for fingerprint authentication system

Farid Benhammadi; Kadda Beghdad Bey

The present work attempts to build a bio-cryptographic system that combines transformed minutiae pairwise feature and user-generated password fuzzy vault. The fingerprint fuzzy vault is based on a new minutiae pairwise structure, which overcomes the fingerprint feature publication while the secret binary vault code is generated according to the fingerprint fuzzy vault result. The authentication process involves two stages: fuzzy vault matching and secret vault code validation. Our minutiae pairwise transformation produces different templates thus resolving the problem of cross matching attacks in fingerprint fuzzy vault. So, the original fingerprint template cannot be recreated because it is protected by the key generated from the user password. In addition, the proposed bio-cryptographic system ensures an acceptable security level for user authentication.


Annales Des Télécommunications | 2014

Dempster–Shafer theory-based human activity recognition in smart home environments

Faouzi Sebbak; Farid Benhammadi; Abdelghani Chibani; Yacine Amirat; Aicha Mokhtari

Context awareness and activity recognition are becoming a hot research topic in ambient intelligence (AmI) and ubiquitous robotics, due to the latest advances in wireless sensor network research which provides a richer set of context data and allows a wide coverage of AmI environments. However, using raw sensor data for activity recognition is subject to different constraints and makes activity recognition inaccurate and uncertain. The Dempster–Shafer evidence theory, known as belief functions, gives a convenient mathematical framework to handle uncertainty issues in sensor information fusion and facilitates decision making for the activity recognition process. Dempster–Shafer theory is more and more applied to represent and manipulate contextual information under uncertainty in a wide range of activity-aware systems. However, using this theory needs to solve the mapping issue of sensor data into high-level activity knowledge. The present paper contributes new ways to apply the Dempster–Shafer theory using binary discrete sensor information for activity recognition under uncertainty. We propose an efficient mapping technique that allows converting and aggregating the raw data captured, using a wireless senor network, into high-level activity knowledge. In addition, we propose a conflict resolution technique to optimize decision making in the presence of conflicting activities. For the validation of our approach, we have used a real dataset captured using sensors deployed in a smart home. Our results demonstrate that the improvement of activity recognition provided by our approaches is up to of 79 %. These results demonstrate also that the accuracy of activity recognition using the Dempster–Shafer theory with the proposed mappings outperforms both naïve Bayes classifier and J48 decision tree.


international conference on modeling simulation and applied optimization | 2015

New tasks scheduling strategy for resources allocation in Cloud computing Environment

Kadda Beghdad Bey; Farid Benhammadi; Faouzi Sebbak; M'hamed Mataoui

Scientific applications are very complex and need massive computing power and storage space. Distributed computing environment has become a new technology to execute large-scale applications and Cloud computing is one of these technologies. Resource allocation is one of the most important challenges in the Cloud Computing. The optimally assigning of the available resources to the needed cloud applications is known to be a NP complete problem. In this paper, we propose a new task scheduling strategy for resource allocation for maximizing profit in cloud computing environment. We focus on minimizing the total executing time (makespan) of task scheduling and maximizing the resources exploitation. To show the interest of the proposed solution, Experiments results are conducted on a simulation data set.


2015 12th International Symposium on Programming and Systems (ISPS) | 2015

Balancing heuristic for independent task scheduling in cloud computing

Kadda Beghdad Bey; Farid Benhammadi; Redha Benaissa

Distributed computing environment has become a new technology to execute large-scale applications and Cloud computing is one of these technologies. Resource allocation is one of the most important challenges in the Cloud Computing. The optimally assigning of the available resources to the needed cloud applications is known to be a NP complete problem. In this paper, we propose a new task scheduling strategy based on the total order for resource allocation to improve the Min-Min algorithm. We focus on minimizing the total executing time (makespan) of task scheduling and maximizing the use of resources. Experimental results demonstrate that the proposed approach permits more adaptive resources allocation for independent jobs scheduling in the cloud computing environment.


International Journal of Pattern Recognition and Artificial Intelligence | 2013

EMBEDDED FINGERPRINT MATCHING ON SMART CARD

Farid Benhammadi; Kadda Beghdad Bey

This paper describes an embedded minutia-based matching algorithm using the reference point neighborhoods minutiae. The proposed matching algorithm is implemented in restricted environments such as smart card devices requiring careful monitoring of both memory and processing time usage. The proposed algorithm uses a circular tessellation to encode fingerprint features in neighborhood minutia localization binary codes. The objective of the present study is the development of a new matching approach which reduces both computing time and required space memory for fingerprint matching on Java Card. The main advantage of our approach is avoiding the implicit alignment of fingerprint images during the matching process while improving the fingerprint verification accuracy. Tests carried out on the public fingerprint databases DB1-a and DB2-a of FVC2002 have shown the effectiveness of our approach.


Annales Des Télécommunications | 2017

Majority-consensus fusion approach for elderly IoT-based healthcare applications

Faouzi Sebbak; Farid Benhammadi

Nowadays, tremendous growth of Internet of Things (IoT) applications is seen in smart environments such as medical remote care applications which are crucial due to the general aging of the population. With the recent advancements in IoT-based healthcare technologies, activity recognition can be used as the key part of the intelligent healthcare systems to monitor elderly people to live independently at homes and promote a better care. Recently, the evidence theory and its derivates approaches began to take place in the fields of activity recognition in these smart systems. However, these approaches are generally inconsistent with the probability calculus due to the lower and upper probability bounds considering the combined evidences. To overcome these challenges and to get more precisely the reconcilement between the evidence theory with the frequentist approach of probability calculus, this work proposes a new methodology for combining beliefs, addressing some of the disadvantages exhibited by the evidence theory and its derivatives. This methodology merges the non-normalized conjunctive and the majority rules. The proposed rule is evaluated in numerical simulation case studies involving the activity recognition in a smart home environment. The results show that this strategy produces intuitive results in favor of the more committed hypothesis.


ubiquitous computing | 2012

An evidential fusion approach for activity recognition under uncertainty in ambient intelligence environments

Faouzi Sebbak; Abdelghani Chibani; Yacine Amirat; Farid Benhammadi; Aicha Mokhtari

In ambient intelligence environments, the information provided by robots embedded sensors and physical or logical entities may be inaccurate and uncertain. The Dempster-Shafer evidence Theory (DST) gives a mathematical convenient framework for the evidential fusion representation and inference of uncertain information. However, DST yields counterintuitive results in high conflicting ambient intelligence situations. This paper aims to provide a new strategy to manage conflict in activity recognition process in the ambient intelligence applications. It addresses the challenge of uncertainty and proposes an evidential fusion model based on the management of conflicting situation to optimize decision making in activity recognition. The proposed approach gives intuitive interpretation for combining multiple sources in conflicting situations and avoids the problems of using The Dempster-Shafer rule of combination.


Future Generation Computer Systems | 2010

Mixture of ANFIS systems for CPU load prediction in metacomputing environment

Kadda Beghdad Bey; Farid Benhammadi; Aicha Mokhtari; Zahia Gessoum

The metacomputing environments are becoming real distributed running platforms for compute-intensive services. One of the most difficult problems to be solved by metacomputing systems is ensuring accurate and fast prediction of available performance on each resource. The main objective of the present study is to develop a new prediction model that can be used to predict the future CPU load in a distributed computing environment. This prediction model is based on a mixture of Adaptive Network based Fuzzy Inference Systems (ANFIS) via the naive Bayes assumption. Experimental results for different load time series confirm that the new prediction model performs better than other CPU load prediction methods. In addition, a comparison with previous prediction methods to evaluate their accuracy is presented.

Collaboration


Dive into the Farid Benhammadi's collaboration.

Top Co-Authors

Avatar

Faouzi Sebbak

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Kadda Beghdad Bey

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aicha Mokhtari

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

M'hamed Mataoui

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

A. Chibani

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sofiane Bouznad

Paris 12 Val de Marne University

View shared research outputs
Top Co-Authors

Avatar

Aicha Mokhtari

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge