{"id":5320,"date":"2023-04-24T14:36:45","date_gmt":"2023-04-24T13:36:45","guid":{"rendered":"http:\/\/www.univ-oeb.dz\/fsesnv\/?page_id=5320"},"modified":"2023-04-27T08:59:01","modified_gmt":"2023-04-27T07:59:01","slug":"curriculum-vitae-makhlouf-derdour","status":"publish","type":"page","link":"https:\/\/www.univ-oeb.dz\/fsesnv\/curriculum-vitae-makhlouf-derdour\/","title":{"rendered":"Curriculum Vitae Makhlouf DERDOUR"},"content":{"rendered":"\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:24% auto\"><figure class=\"wp-block-media-text__media\"><img fetchpriority=\"high\" decoding=\"async\" width=\"221\" height=\"309\" src=\"https:\/\/www.univ-oeb.dz\/fsesnv\/wp-content\/uploads\/2023\/04\/Image1-15.jpg\" alt=\"\" class=\"wp-image-5321 size-full\" srcset=\"https:\/\/www.univ-oeb.dz\/fsesnv\/wp-content\/uploads\/2023\/04\/Image1-15.jpg 221w, https:\/\/www.univ-oeb.dz\/fsesnv\/wp-content\/uploads\/2023\/04\/Image1-15-215x300.jpg 215w\" sizes=\"(max-width: 221px) 100vw, 221px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Prof. Makhlouf DERDOUR<\/p>\n\n\n\n<p>Professor, Department of Mathematics and Computer Science, University of Oum El Bouaghi, Algeria.<\/p>\n\n\n\n<p>E-mail: derdour.makhlouf@univ-oeb.dz<\/p>\n\n\n\n<p>Mobile: +213662458391<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-very-light-gray-to-cyan-bluish-gray-gradient-background has-background\"><strong>Researcher identity<\/strong><\/p>\n\n\n\n<p>Google Scholar: <a href=\"https:\/\/scholar.google.com\/citations?hl=fr&amp;user=eJ4BHkIAAAAJ\" data-type=\"URL\" data-id=\"https:\/\/scholar.google.com\/citations?hl=fr&amp;user=eJ4BHkIAAAAJ\">link<\/a><\/p>\n\n\n\n<p>ReaserchGate: <a href=\"https:\/\/www.researchgate.net\/profile\/Makhlouf-Derdour\" data-type=\"URL\" data-id=\"https:\/\/www.researchgate.net\/profile\/Makhlouf-Derdour\">link<\/a><\/p>\n\n\n\n<p>ORCID: <a href=\"https:\/\/orcid.org\/0000-0001-6622-4355\" data-type=\"URL\" data-id=\"https:\/\/orcid.org\/0000-0001-6622-4355\">link<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center has-very-light-gray-to-cyan-bluish-gray-gradient-background has-background\">Education<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ph.D.&rsquo;s degree<\/strong> in computer sciences <strong>Option<\/strong>: Networks and information systems<\/li>\n\n\n\n<li><strong>Magister&rsquo;s degree<\/strong> in Computer sciences <strong>Option<\/strong>: advanced information systems<\/li>\n\n\n\n<li><strong>Engineer\u2019s degree<\/strong> in computer sciences <strong>Option<\/strong>: advanced information systems<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center has-very-light-gray-to-cyan-bluish-gray-gradient-background has-background\">Functions and Affiliations<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>December 2020: Full Professor at the University of Oum El Bouaghi<\/strong><\/li>\n\n\n\n<li><strong>October 2005 to November 2020:<\/strong> <strong>Professor<\/strong> at the University of TEBESSA.<\/li>\n<\/ul>\n\n\n\n<p><strong>o June 2019:<\/strong> University professor in computer science<\/p>\n\n\n\n<p><strong>o<\/strong> <strong>October 2014<\/strong> Lecturer \u201cA\u201d<\/p>\n\n\n\n<p><strong>o January 2012<\/strong> Lecturer \u201cB\u201d<\/p>\n\n\n\n<p><strong>o February 2009<\/strong> Assistant professor \u201cA\u201d<\/p>\n\n\n\n<p><strong>o October 2005<\/strong> Assistant professor \u201cB\u201d<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>2002\/2003, 2003\/2004 and 2004\/2005:<\/strong> Temporary teacher in the computer science department of the University of Constantine.<\/li>\n\n\n\n<li><strong>May 2005 \u2013 October 2005<\/strong>: Executive within the national mining and phosphate company \u201cSOMIPHOS\u201d as network administrator.<\/li>\n\n\n\n<li><strong>November 2004 &#8211; June 2005<\/strong>: Teaching contract at the Chamber of Commerce for TS and Computer Engineer.<\/li>\n\n\n\n<li><strong>November 2002 &#8211; October 2004<\/strong>: Owner and employee in the company S.N.C: Cybercaf\u00e9, Installation of networks and data processing.<\/li>\n\n\n\n<li>&nbsp;<strong>July 2002 \u2013 October 2002:<\/strong> Manager of a design office and IT advice.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center has-very-light-gray-to-cyan-bluish-gray-gradient-background has-background\">Teaching modules<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><u>PhD<\/u><\/strong><\/li>\n\n\n\n<li>Advanced Network Programming (1st Year)<\/li>\n\n\n\n<li>Intelligent Computing (1st Year)<\/li>\n\n\n\n<li>Biometric systems and Intrusion detection (1st Year)<\/li>\n\n\n\n<li><strong><u>Master<\/u><\/strong><\/li>\n\n\n\n<li>Distributed Architecture (1st Year Master \u2013 Distributed Architecture option)<\/li>\n\n\n\n<li>TCP\/IP Network (1st Year Master \u2013 Distributed Architecture Option)<\/li>\n\n\n\n<li>Mobile Networks (1st Year Master \u2013 Networks and IT Security Option)<\/li>\n\n\n\n<li>Architectures of computer networks (1st Year Master &#8211; Option Networks and computer security)<\/li>\n\n\n\n<li>Biometric Systems (1st Year Master &#8211; Option Networks and IT Security)<\/li>\n\n\n\n<li>Pervasive Information Systems. (1st Year Master &#8211; Systems and Multimedia option)<\/li>\n\n\n\n<li>Human Machine Interface (1st Year Master \u2013 Information Systems option)<\/li>\n\n\n\n<li>Advanced Software Engineering (1st Year Master \u2013 Information Systems option)<\/li>\n\n\n\n<li>Seminar &amp; Workshop: Emerging Technologies and Blockchain<\/li>\n\n\n\n<li>Seminar &amp; Workshop: Cryptography, blockchain and information security (specialty: SyM and SI)<\/li>\n\n\n\n<li><strong><u>Engineer &amp; License<\/u><\/strong><\/li>\n\n\n\n<li>Software engineering (2nd Year License, 3rd Year Engineer)<\/li>\n\n\n\n<li>UML design language (3rd Year License)<\/li>\n\n\n\n<li>Cognition (2nd Year License)<\/li>\n\n\n\n<li>Databases (3rd Year DEUA)<\/li>\n\n\n\n<li>Expert systems (4th Engineer)<\/li>\n\n\n\n<li>Programming in C, C++, PASCAL, DELPHI, JAVA, SQL SERVER, ACCESS.<\/li>\n\n\n\n<li>Development of Web applications and dynamic Web sites with ASP, PHP, JAVA, XML, XSLT.<\/li>\n\n\n\n<li>Design and development of Multi Agent systems with the JADE platform.<\/li>\n\n\n\n<li>Configuration of LAN\/WAN type networks, and the various site interconnection solutions with fibre, wireless, XDSL, converters, etc.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center has-very-light-gray-to-cyan-bluish-gray-gradient-background has-background\">International publications<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Zakaria Tolba, <strong>Makhlouf Derdour<\/strong>, Mohamed Amine Ferrag, S M Muyeen, Mohamed Benbouzid , Automated deep learning BLACK-BOX attack for multimedia P-BOX security assessment. September 2022, IEEE Access&nbsp;PP(99), DOI:&nbsp;10.1109\/ACCESS.2022.3204175.<\/li>\n\n\n\n<li>B Nadira, <strong>D Makhlouf<\/strong>, M Amroune, Personalized Online Learning: Context Driven Massive Open Online Courses. International Journal of Web-Based Learning and Teaching Technologies, 2021.<\/li>\n\n\n\n<li>A Zeroual, M Amroune, <strong>M Derdour<\/strong>, A Bentahar, <a href=\"https:\/\/scholar.google.com\/citations?view_op=view_citation&amp;hl=fr&amp;user=eJ4BHkIAAAAJ&amp;sortby=pubdate&amp;citation_for_view=eJ4BHkIAAAAJ:35N4QoGY0k4C\">Lightweight deep learning model to secure authentication in Mobile Cloud Computing<\/a>. Journal of King Saud University-Computer and Information Sciences. <a href=\"https:\/\/www.sciencedirect.com\/journal\/journal-of-king-saud-university-computer-and-information-sciences\/vol\/34\/issue\/9\">Volume 34, Issue 9<\/a>,&nbsp;October 2022, Pages 6938-6948<\/li>\n\n\n\n<li>MS Kahil, A Bouramoul, <strong>M Derdour<\/strong>, GreedyBigVis\u2013A greedy approach for preparing large datasets to multidimensional visualization. International Journal of Computers and Applications, 1-10.<\/li>\n\n\n\n<li>F Bouakkaz, <strong>M Derdour<\/strong>, Maximizing WSN life using power efficient grid-chain routing protocol (PEGCP). Wireless Personal Communications 117 (2), 1007-1023. 2021.<\/li>\n\n\n\n<li>F Bouakkaz, W Ali, <strong>M Derdour<\/strong>, Forest Fire Detection Using Wireless Multimedia Sensor Networks and Image Compression.Instrum. Mes. M\u00e9trologie 20, 57-63<\/li>\n\n\n\n<li>S Abdelatif, <strong>M Derdour<\/strong>, N Ghoualmi\u2010Zine, B Marzak. ANET : A novel service for predicting and disseminating vehicle traffic information\u200f. International Journal of Communication Systems 33 (6), e4288\u200f. 2020.<\/li>\n\n\n\n<li>S Menaceur, <strong>M Derdour<\/strong>, A Bouramoul\u200f, Using Query Expansion Techniques and Content-Based Filtering for Personalizing Analysis in Big Data\u200f. International Journal of Information Technology and Web Engineering (IJITWE) 2020.<\/li>\n\n\n\n<li>Mohamed Amine Ferrag, <strong>Makhlouf Derdour<\/strong>, Mithun Mukherjee, Member, IEEE, Abdelouahid Derhab, Leandros Maglaras. Blockchain Technologies for the Internet of Things : Research Issues and Challenges. DOI 10.1109\/JIOT.2018.2882794, IEEE Internet of Things Journal.<\/li>\n\n\n\n<li>Sahraoui, A., <strong>Makhlouf, D.<\/strong>, &amp; Roose, P. (2018).&nbsp;Smart Traffic Management System for Anticipating Unexpected Road Incidents in Intelligent Transportation Systems.&nbsp;International Journal of Grid and High-Performance Computing (IJGHPC),&nbsp;10(4), 67-82.<\/li>\n\n\n\n<li>Sahraoui, A., <strong>Derdour, M.<\/strong>, &amp; Marzak, B. (2018). A Multi-Objective ACO to Solve the Daily Carpool Problem.&nbsp;International Journal of Strategic Information Technology and Applications (IJSITA),&nbsp;9(2), 50-60.<\/li>\n\n\n\n<li>Sahraoui Abdelatif, <strong>Derdour Makhlouf<\/strong>, Ahmim Ahmed, Roose Philippe \u2013 Vehicular-Cloud Simulation Framework for Predicting Traffic Flow Data \u2013 International Journal of Internet Technology and Secured Transactions \u2013 2018 (accepted, to be published)<\/li>\n\n\n\n<li>Achouri, M., Alti, A., <strong>Derdour, M.<\/strong>, Laborie, S., &amp; Roose, P. A New Two-level Clustering Approach for Situations Management in Distributed Smart Environments. International Journal of Ambient Computing and Intelligence. Volume 10, Issue 2, 2018.<\/li>\n\n\n\n<li>Achouri, M., Alti, A., <strong>Derdour, M.<\/strong>, Laborie, S., &amp; Roose, P. (2018). Smart fog computing for efficient situations management in smart health environments.&nbsp;Journal of ICT,&nbsp;17(4), 537-567.<\/li>\n\n\n\n<li><a href=\"mailto:subs@inderscience.com\"><\/a><strong>Ahmed Ahmim, Makhlouf Derdour, Amin Ferag. An intrusion detection system based on combining probability predictions of a tree of classifiers, <\/strong><a href=\"http:\/\/onlinelibrary.wiley.com\/journal\/10.1002\/(ISSN)1099-1131\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>International Journal of Communication Systems<\/strong><\/a><strong>, DOI:10.1002\/dac.3547, 2018. <\/strong><strong><\/strong><\/li>\n\n\n\n<li><strong>Merzoug Soltane, Derdour Makhlouf and Kazar Okba. Smart Configuration and Auto Allocation of Resource in Cloud Data Centers. International Journal of Information Technology Project Management. 2018. Volume 5, Issue 4. <\/strong><strong><\/strong><\/li>\n\n\n\n<li>Sadek Menaceur, <strong>Makhlouf Derdour<\/strong>, Abdelkrim Bouramoul. <strong>Personalized Online Analytical Processing in Big Data Context Using User Profile and Search Context.&nbsp; IJSITA. Volume 8, Issue 4, 2018.<\/strong><strong><\/strong><\/li>\n\n\n\n<li><strong>Makhlouf Derdour, Adel Alti, Mohamed Gasmi, Philippe Roose, Security architecture metamodel for Model Driven security, <\/strong><a href=\"http:\/\/www.sciencedirect.com\/science\/journal\/23526645\"><strong>Journal of Innovation in Digital Ecosystems<\/strong><\/a><strong>, <\/strong><a href=\"http:\/\/dx.doi.org\/10.1016\/j.jides.2015.12.001\"><strong>doi:10.1016\/j.jides.2015.12.001<\/strong><\/a><strong>.<\/strong><strong><\/strong><\/li>\n\n\n\n<li><strong>Mohamed Gharzouli and Makhlouf Derdour &#8211; To implement an open-MAS architecture for semantic web services discovery, what kind of P2P protocol we need? &#8211; International Journal of Agent Technologies and Systems (IJATS), Vol 6 N\u00b0 3. 2014.<\/strong><strong><\/strong><\/li>\n\n\n\n<li><strong>M. Derdour and F. Chabane &#8211; Energy Constraint in the MMSN (Mobile Multimedia Sensor Networks) &#8211; Computing Science and Technology International Journal, Vol 1, PP.15-20, 2013.&nbsp;<\/strong><strong><\/strong><\/li>\n\n\n\n<li><strong>N. Ghoualmi-zine, D. Makhlouf, Ph. Roose, M. Dalmau &#8211; QoS-AWARE SERVICE COMPOSITION FOR ADAPTATION OF PERVASIVE SYSTEMS &#8211; The Mediterranean Journal of Computers and Networks, Volume 8, No. 3, pp. 75-84, July 2012.<\/strong><strong><\/strong><\/li>\n\n\n\n<li><strong>Makhlouf Derdour,&nbsp;Philippe Roose,&nbsp;Marc Dalmau, Nacira Ghoualmi Zine &#8211;&nbsp;<\/strong><a href=\"http:\/\/www.emeraldinsight.com\/fwd.htm?id=aob&amp;ini=aob&amp;doi=10.1108\/13287261211221119\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>An adaptation platform for multimedia applications &#8211; CSC (Component, Service, Connector)&nbsp;<\/strong><\/a><strong>&#8211;&nbsp;<\/strong><a href=\"http:\/\/www.emeraldinsight.com\/products\/journals\/journals.htm?id=jsit\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Journal of Systems and Information Technology<\/strong><\/a><strong>&nbsp;&#8211; Vol. 14, Issue 1&nbsp; &#8211;&nbsp;&nbsp;(Mars 2012)&nbsp; &#8211; ISSN: 1328-7265&nbsp;&#8211; (Rate 15%)<\/strong><strong><\/strong><\/li>\n\n\n\n<li><strong>Makhlouf Derdour, Marc Dalmau, Philippe Roose, Nac\u00e9ra Ghoualmi Zine &#8211; <em>Typing of Adaptation Connectors in MMSA Approach Case Study: Sending MMS<\/em> &#8211; International Journal of Research and Reviews in Computer Science (<\/strong><a href=\"http:\/\/scholarlyexchange.org\/ojs\/index.php\/IJRRCS\"><strong>IJRRCS<\/strong><\/a><strong>), ISSN: 2079-2557 &#8211; 12\/2010.<\/strong><strong><\/strong><\/li>\n\n\n\n<li><strong>Makhlouf Derdour<\/strong>, Nac\u00e9ra. Ghoualmi Zine, Philippe Roose, Marc Dalmau, A. Alti &#8211; <em>UML-Profile for Multimedia Software Architectures <\/em>&#8211; International Journal of Multimedia Intelligence and Security (<a href=\"http:\/\/www.inderscience.com\/browse\/index.php?journalCODE=ijmis\">IJMIS<\/a>) Inderscience Publishers,&nbsp; Vol. 1, No. 3, pp. 209-231, 2010.<\/li>\n\n\n\n<li><strong>Makhlouf Derdour, Philippe Roose, <\/strong>Marc Dalmau, Nac\u00e9ra Ghoualmi Zine, Adel Alti &#8211; <em>MMSA: Metamodel Multimedia Software Architecture <\/em>&#8211; Advances in Multimedia, <a href=\"http:\/\/www.hindawi.com\/\">Hindawi Ed<\/a>. &#8211;&nbsp; vol. 2010, Article ID 386035, 17 pages, 2010. doi:10.1155\/2010\/386035.<\/li>\n\n\n\n<li><strong>Makhlouf Derdour, Philippe Roose, <\/strong>Marc Dalmau, Nac\u00e9ra Ghoualmi Zine, Adel Alti &#8211; <em>Une approche pour les architectures logicielles \u00e0 composants multim\u00e9dia<\/em> &#8211; <a href=\"http:\/\/www.revue-i3.org\/\">Revue I3<\/a> Vol. 10 N. 2, pp. 67-92 &#8211; 2010.<\/li>\n\n\n\n<li><strong>Makhlouf Derdour,<\/strong> <strong>Philippe Roose<\/strong><strong>, <\/strong>Marc Dalmau, Nacira Ghoualmi-Zine, Adel Alti &#8211;<em> Vers une architecture d&rsquo;adaptation automatique des applications reparties bas\u00e9es composants<\/em> &#8211; <a href=\"http:\/\/cal-idm-lmo-gpl-2010.univ-pau.fr\/\">CAL 2010<\/a> &#8211; pp. 1-14, RNTI L-5 &#8211; ISSN : 174.1667 &#8211; ISBN : 978.2.85128.930.5&nbsp; &#8211; March 2010, Pau, France.<strong><\/strong><\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center has-very-light-gray-to-cyan-bluish-gray-gradient-background has-background\">Interests and Qualifications<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Interest: <\/strong>Sports (football, swimming)<\/li>\n\n\n\n<li><strong>Other: <\/strong>president of a CHS sports club<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-pullquote has-white-color has-text-color\"><blockquote><p>pdf version: <a href=\"https:\/\/www.univ-oeb.dz\/fsesnv\/wp-content\/uploads\/2023\/04\/Short-CV-derdour-makhlouf-2023.pdf\">Short CV derdour makhlouf 2023<\/a><br>Scopus: <a href=\"https:\/\/www.scopus.com\/authid\/detail.uri?authorId=36550031000\">Makhlouf, Derdour &#8211; Author details &#8211; Scopus Preview<\/a><\/p><\/blockquote><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Prof. Makhlouf DERDOUR Professor, Department of Mathematics and Computer Science, University of Oum El Bouaghi, Algeria. E-mail: derdour.makhlouf@univ-oeb.dz Mobile: +213662458391 Researcher identity Google Scholar: link ReaserchGate: link ORCID: link Education Ph.D.&rsquo;s degree in computer sciences Option: Networks and information systems Magister&rsquo;s degree in Computer sciences Option: advanced information systems Engineer\u2019s degree in computer sciences Option: &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5320","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.univ-oeb.dz\/fsesnv\/wp-json\/wp\/v2\/pages\/5320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.univ-oeb.dz\/fsesnv\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.univ-oeb.dz\/fsesnv\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.univ-oeb.dz\/fsesnv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.univ-oeb.dz\/fsesnv\/wp-json\/wp\/v2\/comments?post=5320"}],"version-history":[{"count":0,"href":"https:\/\/www.univ-oeb.dz\/fsesnv\/wp-json\/wp\/v2\/pages\/5320\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.univ-oeb.dz\/fsesnv\/wp-json\/wp\/v2\/media?parent=5320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}