Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Exploring issues of story-based effort estimation in Agile Software Development (ASD)
- Muhammad Iqbal,
- Muhammad Ijaz,
- Tehseen Mazhar,
- Tariq Shahzad,
- Qamar Abbas,
- YazeedYasin Ghadi,
- Wasim Ahmad,
- Habib Hamam
Science of Computer Programming (SCPR), Volume 236, Issue Chttps://doi.org/10.1016/j.scico.2024.103114Abstract ContextEffort estimation based on user stories plays a pivotal role in agile software development, where accurate predictions of project efforts are vital for success. While various supervised ML tools attempt to estimate effort, the prevalence ...
- research-articleAugust 2024
Using blockchain and AI technologies for sustainable, biodiverse, and transparent fisheries of the future
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 13, Issue 1https://doi.org/10.1186/s13677-024-00696-8AbstractThis paper proposes a total fusion of blockchain and AI tech for tomorrow’s viable, rich in diversity and transparent fisheries. It outlines the main goal of tackling overfishing challenges due to lack of transparency and biodiversity depletion in ...
- articleMay 2024
Enhancing Logistics Optimization: A Double-Layer Site-Selection Model Approach
Journal of Organizational and End User Computing (JOEUC-IGI), Volume 36, Issue 1Pages 1–15https://doi.org/10.4018/JOEUC.344039With the expansion of the logistics network, enterprise logistics distribution faces increasing challenges, including high transportation costs, low distribution efficiency, and unstable distribution networks. To address these issues, this study focuses ...
- review-articleMay 2024
Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 13, Issue 1https://doi.org/10.1186/s13677-024-00654-4AbstractPatient-focused healthcare applications are important to patients because they offer a range of advantages that add value and improve the overall healthcare experience. The 5G networks, along with Mobile Edge Computing (MEC), can greatly transform ...
- research-articleNovember 2023
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks
- Bakht Sher Ali,
- Inam Ullah,
- Tamara Al Shloul,
- Izhar Ahmed Khan,
- Ijaz Khan,
- Yazeed Yasin Ghadi,
- Akmalbek Abdusalomov,
- Rashid Nasimov,
- Khmaies Ouahada,
- Habib Hamam
The Journal of Supercomputing (JSCO), Volume 80, Issue 6Pages 7876–7905https://doi.org/10.1007/s11227-023-05764-5AbstractThe growing volume of data, especially in cases of imbalanced datasets, has posed significant challenges in the classification process, particularly when it comes to identifying cyberattacks on industrial control systems (ICS) networks, which have ...
-
- research-articleJuly 2023
Low Power Blockchain in Industry 4.0 Case Study: Water Management in Tunisia
Journal of Signal Processing Systems (JSPS), Volume 96, Issue 3Pages 257–271https://doi.org/10.1007/s11265-023-01880-wAbstractIndustry has undergone, during this decade, significant technological changes and improvements. The industrial sector is further moving towards IIoT (Industrial IoT) and Industry 4.0. Security and data reliability are IoT limitations that can be ...
- research-articleJune 2023
Fog computing network security based on resources management
EURASIP Journal on Wireless Communications and Networking (JWCN), Volume 2023, Issue 1https://doi.org/10.1186/s13638-023-02256-1AbstractFog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the requirements of the Internet of Things (IoT). However, due to its features, fog obviously confronts ...
- research-articleMarch 2023
Embedded decision support platform based on multi-agent systems
Multimedia Tools and Applications (MTAA), Volume 82, Issue 21Pages 32607–32633https://doi.org/10.1007/s11042-023-14843-xAbstractThere has been an outstanding use of memory storage of processors as current applications: Artificial Intelligence-based applications, 3D-reconstruction or Blockchain ones, take advantage of their large computing effort, as well as their ability ...
- ArticleMay 2023
Blockchain Olive Oil Supply Chain
AbstractIn Tunisia, one of the major problems in the olive oil industry is marketing. Several factors have an impact such as quality, originality, lobbying, subvention, and Extra Virgin Olive Oil certification. The major issue is still traceability of the ...
- research-articleAugust 2022
A novel detail injection framework using latent low-rank decomposition for multispectral pan-sharpening
Multimedia Tools and Applications (MTAA), Volume 82, Issue 4Pages 5987–6012https://doi.org/10.1007/s11042-022-12770-xAbstractA novel framework for pansharpening based on Latent Low-Rank Representation theory, called Detail injection using Latent Low-Rank decomposition based Pansharpening approach (DiLRP), is proposed. Our proposal comprises two fusion stages. In the ...
- research-articleJanuary 2022
Barnacles Mating Optimizer with Deep Transfer Learning Enabled Biomedical Malaria Parasite Detection and Classification
- Laxmi Lydia,
- Ashit Kumar Dutta,
- R. Uma Mageswari,
- A. Gayathri,
- J. Mary Dallfin Bruxella,
- Mohamad Khairi Ishak,
- Samih M. Mostafa,
- Habib Hamam
Biomedical engineering involves ideologies and problem-solving methods of engineering to biology and medicine. Malaria is a life-threatening illness, which has gained significant attention among researchers. Since the manual diagnosis of malaria in a ...
- research-articleJanuary 2022
Empirical Analysis of Machine Learning Algorithms for Multiclass Prediction
- Alireza Souri,
- Umar Ishfaq,
- Danial Shabbir,
- Jumshaid Khan,
- Hikmat Ullah Khan,
- Salman Naseer,
- Azeem Irshad,
- Muhammad Shafiq,
- Habib Hamam
With the emergence of big data and the interest in deriving valuable insights from ever-growing and ever-changing streams of data, machine learning has appeared as an effective data analytic technique as compared to traditional methodologies. Big ...
- research-articleJanuary 2022
A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption
- Celestine Iwendi,
- Xiaowei Wang,
- Shoulin Yin,
- Muhammad Shafiq,
- Asif Ali Laghari,
- Shahid Karim,
- Omar Cheikhrouhou,
- Wajdi Alhakami,
- Habib Hamam
In the transmission of medical images, if the image is not processed, it is very likely to leak data and personal privacy, resulting in unpredictable consequences. Traditional encryption algorithms have limited ability to deal with complex data. The ...
- research-articleJanuary 2022
Design of Resource-Aware Load Allocation for Heterogeneous Fog Computing Environments
The architecture employed by most of the researchers for the deployment of latency-sensitive Internet of Things (IoT) applications is fog computing. Fog computing architecture offers less delay as compared to the cloud computing paradigm by ...
- research-articleSeptember 2021
Deep learning based detection of COVID-19 from chest X-ray images
Multimedia Tools and Applications (MTAA), Volume 80, Issue 21-23Pages 31803–31820https://doi.org/10.1007/s11042-021-11192-5AbstractThe whole world is facing a health crisis, that is unique in its kind, due to the COVID-19 pandemic. As the coronavirus continues spreading, researchers are concerned by providing or help provide solutions to save lives and to stop the pandemic ...
- research-articleJuly 2021
Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection
Multimedia Tools and Applications (MTAA), Volume 80, Issue 17Pages 26813–26832https://doi.org/10.1007/s11042-021-10886-0AbstractThe increasing performances of personal computers, as well as software of image processing, enable the easy manipulation of digital media content. Unfortunately, this easy manipulation makes the detection of changes in the multimedia content a ...
- research-articleJanuary 2021
Analytic Study of a Novel Color Image Encryption Method Based on the Chaos System and Color Codes
- Jorge-Antonio Lopez-Renteria,
- Shamsa Kanwal,
- Saba Inam,
- Omar Cheikhrouhou,
- Kinza Mahnoor,
- Atef Zaguia,
- Habib Hamam
Due to the growing of the use of Internet and communication media, image encryption is rapidly increased. Image sharing through unsafe open channels is vulnerable for attacking and stealing. For protecting the images from attacks, encryption techniques ...
- research-articleJanuary 2021
Recognition of Ziziphus lotus through Aerial Imaging and Deep Transfer Learning Approach
- Fazlullah Khan,
- Ahsan Bin Tufail,
- Inam Ullah,
- Rahim Khan,
- Luqman Ali,
- Adnan Yousaf,
- Ateeq Ur Rehman,
- Wajdi Alhakami,
- Habib Hamam,
- Omar Cheikhrouhou,
- Yong-Kui Ma
There is a growing demand for the detection of endangered plant species through machine learning approaches. Ziziphus lotus is an endangered deciduous plant species in the buckthorn family (Rhamnaceae) native to Southern Europe. Traditional methods such ...
- review-articleJanuary 2021
Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks
Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both ...