Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–10 of 10 results for author: Ghézala, H B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.14017  [pdf, other

    cs.LG cs.AI

    Revolutionizing Disease Diagnosis: A Microservices-Based Architecture for Privacy-Preserving and Efficient IoT Data Analytics Using Federated Learning

    Authors: Safa Ben Atitallah, Maha Driss, Henda Ben Ghezala

    Abstract: Deep learning-based disease diagnosis applications are essential for accurate diagnosis at various disease stages. However, using personal data exposes traditional centralized learning systems to privacy concerns. On the other hand, by positioning processing resources closer to the device and enabling more effective data analyses, a distributed computing paradigm has the potential to revolutionize… ▽ More

    Submitted 27 August, 2023; originally announced August 2023.

  2. arXiv:2105.08199  [pdf

    eess.IV cs.CV

    Randomly Initialized Convolutional Neural Network for the Recognition of COVID-19 using X-ray Images

    Authors: Safa Ben Atitallah, Maha Driss, Wadii Boulila, Henda Ben Ghézala

    Abstract: By the start of 2020, the novel coronavirus disease (COVID-19) has been declared a worldwide pandemic. Because of the severity of this infectious disease, several kinds of research have focused on combatting its ongoing spread. One potential solution to detect COVID-19 is by analyzing the chest X-ray images using Deep Learning (DL) models. In this context, Convolutional Neural Networks (CNNs) are… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

  3. arXiv:2105.04430  [pdf

    cs.CV cs.LG

    An Enhanced Randomly Initialized Convolutional Neural Network for Columnar Cactus Recognition in Unmanned Aerial Vehicle Imagery

    Authors: Safa Ben Atitallah, Maha Driss, Wadii Boulila, Anis Koubaa, Nesrine Atitallah, Henda Ben Ghézala

    Abstract: Recently, Convolutional Neural Networks (CNNs) have made a great performance for remote sensing image classification. Plant recognition using CNNs is one of the active deep learning research topics due to its added-value in different related fields, especially environmental conservation and natural areas preservation. Automatic recognition of plants in protected areas helps in the surveillance pro… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

  4. Towards a Collaborative Approach to Decision Making Based on Ontology and Multi-Agent System Application to crisis management

    Authors: Ahmed Maalel, Henda Ben Ghézala

    Abstract: The coordination and cooperation of all the stakeholders involved is a decisive point for the control and the resolution of problems. In the insecurity events, the resolution should refer to a plan that defines a general framework of the procedures to be undertaken and the instructions to be complied with; also, a more precise process must be defined by the actors to deal with the case represented… ▽ More

    Submitted 16 March, 2020; originally announced March 2020.

    Comments: 6 pages, 4 figures

    Journal ref: Procedia Computer Science 164 193,198 (2019)

  5. Distributed firewalls and IDS interoperability checking based on a formal approach

    Authors: Kamel Karoui, Fakher Ben Ftima, Henda Ben Ghezala

    Abstract: To supervise and guarantee a network security, the administrator uses different security components, such as firewalls, IDS and IPS. For a perfect interoperability between these components, they must be configured properly to avoid misconfiguration between them. Nevertheless, the existence of a set of anomalies between filtering rules and alerting rules, particularly in distributed multi-component… ▽ More

    Submitted 10 October, 2013; originally announced October 2013.

    Comments: Security component, relevancy, misconfigurations detection, interoperability cheking, formal correction,formal verification, projection, IDS, Firewall

    ACM Class: C.2; C.2.0; C.2.1; C.2.3; D.2.12

    Journal ref: International Journal of Computer Networks & Communications, September 2013, Volume 5. Number 5, pp 95-115

  6. arXiv:1204.2079  [pdf

    cs.IR cs.SE

    A Theoretical and Empirical Evaluation of Software Component Search Engines, Semantic Search Engines and Google Search Engine in the Context of COTS-Based Development

    Authors: Nacim Yanes, Sihem Ben Sassi, Henda Hajjami Ben Ghezala

    Abstract: COTS-based development is a component reuse approach promising to reduce costs and risks, and ensure higher quality. The growing availability of COTS components on the Web has concretized the possibility of achieving these objectives. In this multitude, a recurrent problem is the identification of the COTS components that best satisfy the user requirements. Finding an adequate COTS component impli… ▽ More

    Submitted 10 April, 2012; originally announced April 2012.

    Comments: 9 pages, 4 figures, 11 tables

    ACM Class: D.2.13

  7. arXiv:1203.5452  [pdf

    cs.AI

    Modeling of Mixed Decision Making Process

    Authors: Nesrine Ben Yahia, Narjès Bellamine, Henda Ben Ghezala

    Abstract: Decision making whenever and wherever it is happened is key to organizations success. In order to make correct decision, individuals, teams and organizations need both knowledge management (to manage content) and collaboration (to manage group processes) to make that more effective and efficient. In this paper, we explain the knowledge management and collaboration convergence. Then, we propose a f… ▽ More

    Submitted 24 March, 2012; originally announced March 2012.

    Comments: Keywords-collaborative knowledge management; mixed decision making; dynamicity of actors; UML-G

    Journal ref: In Proceedings of IEEE International Conference on Information Technology and e-Services 2012, pp. 555-559 ISBN: 978-9938-9511-1-0

  8. arXiv:1202.6104  [pdf

    cs.HC

    On the Convergence of Collaboration and Knowledge Management

    Authors: Nesrine Ben yahia, Narjès Bellamine, Henda Ben Ghézala

    Abstract: Collaboration technology typically focuses on collaboration and group processes (cooperation, communication, coordination and coproduction). Knowledge Management (KM) technology typically focuses on content (creation, storage, sharing and use of data, information and knowledge). Yet, to achieve their common goals, teams and organizations need both KM and collaboration technology to make that more… ▽ More

    Submitted 27 February, 2012; originally announced February 2012.

  9. arXiv:1112.2404  [pdf

    cs.NI

    Performance Evaluation and Impact of Weighting Factors on an Energy and Delay Aware Dynamic Source Routing Protocol

    Authors: Jihen Drira Rekik, Leila Baccouche, Henda Ben Ghezala

    Abstract: Typical applications of the mobile ad-hoc network, MANET, are in disaster recovery operations which have to respect time constraint needs. Since MANET is affected by limited resources such as power constraints, it is a challenge to respect the deadline of a real-time data. This paper proposes the Energy and Delay aware based on Dynamic Source Routing protocol, ED-DSR. ED-DSR efficiently utilizes t… ▽ More

    Submitted 11 December, 2011; originally announced December 2011.

    Comments: 20 pages; International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 4, August 2011

  10. arXiv:1112.2401  [pdf

    cs.DB

    A Real-Time Database QoS-aware Service Selection Protocol for MANET

    Authors: Jihen Drira Rekik, Leila Baccouche, Henda Ben Ghezala

    Abstract: The real-time database service selection depends typically to the system stability in order to handle the time-constrained transactions within their deadline. However, applying the real-time database system in the mobile ad hoc networks requires considering the mobile nodes limited capacities. In this paper, we propose cross-layer service selection which combines performance metrics measured in th… ▽ More

    Submitted 11 December, 2011; originally announced December 2011.

    Comments: 16 pages; International Journal of Database Management Systems (IJDMS), November 2011, 101-116