• lavia@univ-tebessa.dz
  • +213
lan
  • En
  • ع
  • Fr

ADOM Team Publications

Home > Publications > ADOM Team Pubs

Description scientific research program

"Document and media analysis"

  • Speech analysis and recognition
  • Document analysis and recognition
  • Natural language processing
  • Handwriting analysis
  • Handwriting analysis for the detection of degenerative diseases
  • Exploration of new techniques relating to analysis of multimedia documents in the different projects
  • Development of systems in strategic areas for the automatic and intelligent processing of information from documents, video streams, handwritten documents
  • Organization of research projects in the specified areas and adopted by team leaders in collaboration possibly with socio-economic partners.

Scientific Productions

Publications

  • 1 Yousfi Douaa, Gattal Abdeljalil, and Djeddi Chawki. Keyword Spotting from Historical Handwritten Manuscripts using CLBP and CRLBP [J]. Int J Performability Eng, 2024, 20(2): 91-98. https://doi.org/10.23940/ijpe.24.02.p4.9198
  • 2 Abbas Faycel, Abdeljalil Gattal, and Rafik Menassel. "Local binary pattern and its derivatives to handwriting-based gender classification." Bulletin of Electrical Engineering and Informatics vol. 12, no. 6 ,2023, pp. 3571-3583. DOI: https://doi.org/10.11591/eei.v12i6.5488

Books/Chapter book

  • 1 Ravi, R.V., Goyal, S.B., Djeddi, C. (2024). Image Encryption Using Spined Bit Plane Diffusion and Chaotic Permutation for Color Image Security. In: Ortis, A., Hameed, A.A., Jamil, A. (eds) Advanced Engineering, Technology and Applications. ICAETA 2023. Communications in Computer and Information Science, vol 1983. Springer, Cham. https://doi.org/10.1007/978-3-031-50920-9_2
  • 2 Pant, P., Goyal, S.B., Rajawat, A.S., Potgantwar, A., Bedi, P., Djeddi, C. (2024). Anomaly Detection Algorithm with Blockchain to Detect Potential Security Attacks in the IIoT Model of Industry 5.0. In: Ortis, A., Hameed, A.A., Jamil, A. (eds) Advanced Engineering, Technology and Applications. ICAETA 2023. Communications in Computer and Information Science, vol 1983. Springer, Cham. https://doi.org/10.1007/978-3-031-50920-9_14
  • 3 Ravi, R.V., Goyal, S.B., Djeddi, C. (2024). Image Encryption Using Quadrant Level Permutation and Chaotic Double Diffusion. In: Ortis, A., Hameed, A.A., Jamil, A. (eds) Advanced Engineering, Technology and Applications. ICAETA 2023. Communications in Computer and Information Science, vol 1983. Springer, Cham. https://doi.org/10.1007/978-3-031-50920-9_10

Communications and proceedings

  • 1
  • 2

Thesis Doctorates

  • 1
  • 2

Others

  • 1
  • 2
  • About
  • Contact