Papers by Souhail GUENNOUNI
Recent advances in computer science and communications, Mar 13, 2020
Object detection has been attracting much interest due to the wide spectrum of applications that ... more Object detection has been attracting much interest due to the wide spectrum of applications that use it. Object detection technology has been driven by an increasing processing power available in software and hardware. In this work we present a developed application for multiple objects detection based on OpenCV libraries. The complexity-related aspects that were considered in the object detection using cascade classifier are described. Furthermore, we discuss the profiling and porting of the application into an embedded platform and comparing the results with the regular platform. The proposed application deals with real time systems implementation and the results give an indication of where the cases of object detection applications may be more complex and where it may be simpler.

IntechOpen eBooks, Sep 9, 2020
Nowadays, we are talking more and more about insecurity in various sectors as well as the compute... more Nowadays, we are talking more and more about insecurity in various sectors as well as the computer techniques to be implemented to counter this trend: access control to computers, e-commerce, banking, etc. There are two traditional ways of identifying an individual. The first method is a knowledge-based method. It is based on the knowledge of an individual's information such as the PIN code to allow him/her to activate a mobile phone. The second method is based on the possession of token. It can be a piece of identification, a key, a badge, etc. These two methods of identification can be used in a complementary way to obtain increased security like in bank cards. However, they each have their weaknesses. In the first case, the password can be forgotten or guessed by a third party. In the second case, the badge (or ID or key) may be lost or stolen. Biometric features are an alternative solution to the two previous identification modes. The advantage of using the biometric features is that they are all universal, measurable, unique, and permanent. The interest of applications using biometrics can be summed up in two classes: to facilitate the way of life and to avoid fraud.
One of the major research areas attracting much interest is face recognition. This is due to the ... more One of the major research areas attracting much interest is face recognition. This is due to the growing need of detection and recognition in the modern days' industrial applications. However, this need is conditioned with the high performance standards that these applications require in terms of speed and accuracy. In this work we present a comparison between two main techniques of face recognition in unconstraint scenes. The first one is Edge-Orientation Matching and the second technique is Haar-like feature selection combined cascade classifiers.
2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS)

Eye Tracking and New Trends [Working Title]
Nowadays, we are talking more and more about insecurity in various sectors as well as the compute... more Nowadays, we are talking more and more about insecurity in various sectors as well as the computer techniques to be implemented to counter this trend: access control to computers, e-commerce, banking, etc. There are two traditional ways of identifying an individual. The first method is a knowledge-based method. It is based on the knowledge of an individual's information such as the PIN code to allow him/her to activate a mobile phone. The second method is based on the possession of token. It can be a piece of identification, a key, a badge, etc. These two methods of identification can be used in a complementary way to obtain increased security like in bank cards. However, they each have their weaknesses. In the first case, the password can be forgotten or guessed by a third party. In the second case, the badge (or ID or key) may be lost or stolen. Biometric features are an alternative solution to the two previous identification modes. The advantage of using the biometric features is that they are all universal, measurable, unique, and permanent. The interest of applications using biometrics can be summed up in two classes: to facilitate the way of life and to avoid fraud.
Modelling and Simulation in Engineering, 2015
Object detection has been attracting much interest due to the wide spectrum of applications that ... more Object detection has been attracting much interest due to the wide spectrum of applications that use it. It has been driven by an increasing processing power available in software and hardware platforms. In this work we present a developed application for multiple objects detection based on OpenCV libraries. The complexity-related aspects that were considered in the object detection using cascade classifier are described. Furthermore, we discuss the profiling and porting of the application into an embedded platform and compare the results with those obtained on traditional platforms. The proposed application deals with real-time systems implementation and the results give a metric able to select where the cases of object detection applications may be more complex and where it may be simpler.

Recent Patents on Computer Science
Background: Real-time object detection has been attracting much attention recently due the increa... more Background: Real-time object detection has been attracting much attention recently due the increasing market need of such systems. Therefore, different detection algorithms and techniques have been evaluated to create a reliable detection system. The main challenge to implement a realtime reliable detection system relies on the algorithm training phase. During this phase, a large number of object image database needs to be prepared for each object to be detected. Objective: In this work, we implement a simultaneous object detection system based on local Edge Orientation Histograms (EOH) as feature extraction method with a smaller objects image database. Then, we evaluate the performance of this detection system in two separate platforms. Methods: We evaluated the performance of the detection of Ede Orientation Histograms against HAAR and Local Binary Patterns (LBP) algorithms using two different objects. After that, we discussed the evaluation of the detection systems on the standar...
2014 Third IEEE International Colloquium in Information Science and Technology (CIST), 2014
Uploads
Papers by Souhail GUENNOUNI