41 results on '"Habib Hamam"'
Search Results
2. Efficient Algorithms for E-Healthcare to Solve Multiobject Fuse Detection Problem
- Author
-
Ateeq Ur Rehman, Wali Ullah Khan, Habib Hamam, Inam Ullah, Ijaz Ahmad, Omar Cheikhrouhou, Muhammad Shafiq, Mohmmed S. Adrees, and Muhammad Qaiser Saleem
- Subjects
Medicine (General) ,Article Subject ,Computer science ,Biomedical Engineering ,Health Informatics ,02 engineering and technology ,Machine learning ,computer.software_genre ,Convolutional neural network ,Field (computer science) ,R5-920 ,Robustness (computer science) ,Medical technology ,0202 electrical engineering, electronic engineering, information engineering ,R855-855.5 ,Face detection ,business.industry ,020206 networking & telecommunications ,Backpropagation ,Object detection ,Fuse (electrical) ,020201 artificial intelligence & image processing ,Surgery ,Artificial intelligence ,Applications of artificial intelligence ,business ,computer ,Biotechnology - Abstract
Object detection plays a vital role in the fields of computer vision, machine learning, and artificial intelligence applications (such as FUSE-AI (E-healthcare MRI scan), face detection, people counting, and vehicle detection) to identify good and defective food products. In the field of artificial intelligence, target detection has been at its peak, but when it comes to detecting multiple targets in a single image or video file, there are indeed challenges. This article focuses on the improved K-nearest neighbor (MK-NN) algorithm for electronic medical care to realize intelligent medical services and applications. We introduced modifications to improve the efficiency of MK-NN, and a comparative analysis was performed to determine the best fuse target detection algorithm based on robustness, accuracy, and computational time. The comparative analysis is performed using four algorithms, namely, MK-NN, traditional K-NN, convolutional neural network, and backpropagation. Experimental results show that the improved K-NN algorithm is the best model in terms of robustness, accuracy, and computational time.
- Published
- 2021
- Full Text
- View/download PDF
3. IMG‐forensics: Multimedia‐enabled information hiding investigation using convolutional neural network
- Author
-
Abdullah Ayub Khan, Habib Hamam, Mamoon Rashid, Asif Ali Laghari, Aftab Ahmed Shaikh, Muhammad Shafiq, and Omar Cheikhrouhou
- Subjects
Multimedia ,Computer science ,Information hiding ,Signal Processing ,Computer Vision and Pattern Recognition ,IMG ,computer.file_format ,Electrical and Electronic Engineering ,computer.software_genre ,Convolutional neural network ,computer ,Software - Published
- 2021
- Full Text
- View/download PDF
4. Regularized Least Square Multi-Hops Localization Algorithm for Wireless Sensor Networks
- Author
-
Hend Liouane, Omar Cheikhrouhou, Habib Hamam, Mohammed Baz, and Sana Messous
- Subjects
General Computer Science ,business.industry ,Computer science ,Reliability (computer networking) ,General Engineering ,Location awareness ,Distance vector-hop algorithm ,computer.software_genre ,localization ,TK1-9971 ,Spread spectrum ,Position (vector) ,Sensor node ,Global Positioning System ,Computer Science::Networking and Internet Architecture ,Wireless ,General Materials Science ,localization accuracy ,regularized least square ,Electrical engineering. Electronics. Nuclear engineering ,business ,computer ,Wireless sensor network ,Algorithm ,multi-hop wireless sensor networks - Abstract
Position awareness is very important for many sensor network applications. However, the use of Global Positioning System receivers to every sensor node is very costly. Therefore, anchor based localization techniques are proposed. The lack of anchors in some Wireless Sensor Networks lead to the appearance of multi-hop localization, which permits to localize nodes even if they are far from anchors. One of the well-known multi-hop localization algorithms is the Distance Vector-Hop algorithm (DV-Hop). Although its simplicity, DV-Hop presents some deficiencies in terms of localization accuracy. Therefore, to deal with this issue, we propose in this paper an improvement of DV-Hop algorithm, called Regularized Least Square DV-Hop Localization Algorithm for multi-hop wireless sensors networks. The proposed solution improves the location accuracy of sensor nodes within their sensing field in both isotropic and anisotropic networks. We used the double Least Square localization method and the statistical filtering optimization strategy, which is the Regularized Least Square method. Simulation results prove that the proposed algorithm outperforms the original DV-Hop algorithm with up to 60%, as well as other related works, in terms of localization accuracy.
- Published
- 2021
5. An Intelligent Optimized Route-Discovery Model for IoT-Based VANETs
- Author
-
Ibrahim Alsukayti, Rajakumar Ramalingam, Ankur Dumka, Muhammad Ibrahim, Dinesh Karunanidy, Divya Anand, Habib Hamam, and Rajesh Singh
- Subjects
IoT-based VANET ,Vehicular ad hoc network ,Optimization problem ,Java ,java macaque algorithm ,Computer science ,Process Chemistry and Technology ,Distributed computing ,autonomous vehicle ,Chemical technology ,Particle swarm optimization ,intelligent route discovery ,energy efficiency ,Bioengineering ,TP1-1185 ,Chemistry ,Search algorithm ,Genetic algorithm ,Chemical Engineering (miscellaneous) ,Cuckoo search ,computer ,Metaheuristic ,QD1-999 ,computer.programming_language - Abstract
Intelligent Transportation system are becoming an interesting research area, after Internet of Things (IoT)-based sensors have been effectively incorporated in vehicular ad hoc networks (VANETs). The optimal route discovery in a VANET plays a vital role in establishing reliable communication in uplink and downlink direction. Thus, efficient optimal path discovery without a loop-free route makes network communication more efficient. Therefore, this challenge is addressed by nature-inspired optimization algorithms because of their simplicity and flexibility for solving different kinds of optimization problems. NIOAs are copied from natural phenomena and fall under the category of metaheuristic search algorithms. Optimization problems in route discovery are intriguing because the primary objective is to find an optimal arrangement, ordering, or selection process. Therefore, many researchers have proposed different kinds of optimization algorithm to maintain the balance between intensification and diversification. To tackle this problem, we proposed a novel Java macaque algorithm based on the genetic and social behavior of Java macaque monkeys. The behavior model mimicked from the Java macaque monkey maintains well-balanced exploration and exploitation in the search process. The experimentation outcome depicts the efficiency of the proposed Java macaque algorithm compared to existing algorithms such as discrete cuckoo search optimization (DCSO) algorithm, grey wolf optimizer (GWO), particle swarm optimization (PSO), and genetic algorithm (GA).
- Published
- 2021
6. Student-Performulator: Student Academic Performance Using Hybrid Deep Neural Network
- Author
-
Sher Afzal Khan, Habib Hamam, Ateeq Ur Rehman, Taj Ur Rahman, Inayat Khan, Mohammed Baz, Inam Ullah, Bashir Khan Yousafzai, and Omar Cheikhrouhou
- Subjects
educational data mining ,Computer science ,Geography, Planning and Development ,TJ807-830 ,Feature selection ,Management, Monitoring, Policy and Law ,Machine learning ,computer.software_genre ,TD194-195 ,Educational data mining ,Renewable energy sources ,feature selection ,grade prediction ,Feature (machine learning) ,Performance prediction ,GE1-350 ,student performance prediction ,Artificial neural network ,Environmental effects of industries and plants ,Renewable Energy, Sustainability and the Environment ,business.industry ,Deep learning ,Environmental sciences ,deep neural networks ,Sequence learning ,Artificial intelligence ,Raw data ,business ,attention mechanism ,computer - Abstract
Educational data generated through various platforms such as e-learning, e-admission systems, and automated result management systems can be effectively processed through educational data mining techniques in order to gather highly useful insights into students’ performance. The prediction of student performance from historical academic data is a highly desirable application of educational data mining. In this regard, there is an urgent need to develop an automated technique for student performance prediction. Existing studies on student performance prediction primarily focus on utilizing the conventional feature representation schemes, where extracted features are fed to a classifier. In recent years, deep learning has enabled researchers to automatically extract high-level features from raw data. Such advanced feature representation schemes enable superior performance in challenging tasks. In this work, we examine the deep neural network model, namely, the attention-based Bidirectional Long Short-Term Memory (BiLSTM) network to efficiently predict student performance (grades) from historical data. In this article, we have used the most advanced BiLSTM combined with an attention mechanism model by analyzing existing research problems, which are based on advanced feature classification and prediction. This work is really vital for academicians, universities, and government departments to early predict the performance. The superior sequence learning capabilities of BiLSTM combined with attention mechanism yield superior performance compared to the existing state-of-the-art. The proposed method has achieved a prediction accuracy of 90.16%.
- Published
- 2021
- Full Text
- View/download PDF
7. Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection
- Author
-
Ahmed Ben Hamida, Hanen Rhayma, Habib Hamam, and Achraf Makhloufi
- Subjects
Discrete wavelet transform ,Computer Networks and Communications ,Computer science ,Data_MISCELLANEOUS ,Hash function ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Image processing ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Wavelet ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Computer vision ,Digital watermarking ,business.industry ,020207 software engineering ,Watermark ,computer.file_format ,Hardware and Architecture ,JPEG 2000 ,Artificial intelligence ,business ,computer ,Software - Abstract
The increasing performances of personal computers, as well as software of image processing, enable the easy manipulation of digital media content. Unfortunately, this easy manipulation makes the detection of changes in the multimedia content a very difficult task. Digital watermarking is among the most appropriate techniques to verify the integrity of multimedia content. In this paper, we propose a semi-fragile watermarking scheme for JPEG2000 image self-authentication that ensuring the robustness of the watermark against the compression attacks generated by the JPEG2000 encoder itself. The scheme is combined with the JPEG2000 encoder by embedding the generated watermark into the host image during the JPEG2000 compression process. To generate the watermark we suppose to use a perceptual hash function (PHF) operating on discrete wavelet coefficients of the host image. The proposed watermark generation process leads the system to verify the integrity of the image without the need to any file except for the watermarked image. The watermark is embedded during the JPEG2000 compression process after Discrete Wavelet Transform (DWT) step into the approximation sub-band coefficients of the five wavelet decomposition using Index Modulation Quantification (QIM), and can be extracted during image decoding. To prove the authentication of the image, the system compares the extracted watermark with the new watermark generated from the received image. Experimental results show that our proposed approach has not only an extremely high accuracy of tampering detection but also a relatively very high resistance against JPEG2000 compression attacks.
- Published
- 2021
- Full Text
- View/download PDF
8. COVID-19 Diagnosis in Chest X-Rays Using Deep Learning and Majority Voting
- Author
-
Anis Koubaa, Habib Hamam, Adel Ammar, Marwa Ben Jabra, and Bilel Benjdira
- Subjects
Majority rule ,Coronavirus disease 2019 (COVID-19) ,Computer science ,Weighted voting ,MobileNet ,02 engineering and technology ,Machine learning ,computer.software_genre ,lcsh:Technology ,Task (project management) ,ResNet ,lcsh:Chemistry ,X-ray ,densenet ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Instrumentation ,lcsh:QH301-705.5 ,Fluid Flow and Transfer Processes ,majority voting ,business.industry ,lcsh:T ,Process Chemistry and Technology ,Deep learning ,General Engineering ,COVID-19 ,deep learning ,Pneumonia ,021001 nanoscience & nanotechnology ,EfficientNet ,lcsh:QC1-999 ,Computer Science Applications ,Random forest ,Support vector machine ,VGGNet ,lcsh:Biology (General) ,lcsh:QD1-999 ,classification ,lcsh:TA1-2040 ,Comparison study ,020201 artificial intelligence & image processing ,Artificial intelligence ,0210 nano-technology ,business ,lcsh:Engineering (General). Civil engineering (General) ,computer ,inception ,lcsh:Physics - Abstract
The COVID-19 disease has spread all over the world, representing an intriguing challenge for humanity as a whole. The efficient diagnosis of humans infected by COVID-19 still remains an increasing need worldwide. The chest X-ray imagery represents, among others, one attractive means to detect COVID-19 cases efficiently. Many studies have reported the efficiency of using deep learning classifiers in diagnosing COVID-19 from chest X-ray images. They conducted several comparisons among a subset of classifiers to identify the most accurate. In this paper, we investigate the potential of the combination of state-of-the-art classifiers in achieving the highest possible accuracy for the detection of COVID-19 from X-ray. For this purpose, we conducted a comprehensive comparison study among 16 state-of-the-art classifiers. To the best of our knowledge, this is the first study considering this number of classifiers. This paper’s innovation lies in the methodology that we followed to develop the inference system that allows us to detect COVID-19 with high accuracy. The methodology consists of three steps: (1) comprehensive comparative study between 16 state-of-the-art classifiers, (2) comparison between different ensemble classification techniques, including hard/soft majority, weighted voting, Support Vector Machine, and Random Forest, and (3) finding the combination of deep learning models and ensemble classification techniques that lead to the highest classification confidence on three classes. We found that using the Majority Voting approach is an adequate strategy to adopt in general cases for this task and may achieve an average accuracy up to 99.314%.
- Published
- 2021
- Full Text
- View/download PDF
9. Cognitive IoT-Based e-Learning System: Enabling Context-Aware Remote Schooling during the Pandemic
- Author
-
Atef Zaguia, MohamedAmime Haddar, Habib Hamam, Darine Ameyed, and Omar Cheikhrouhou
- Subjects
Medicine (General) ,Computer science ,E-learning (theory) ,Internet of Things ,Biomedical Engineering ,Health Informatics ,Context (language use) ,computer.software_genre ,Cognition ,Interactivity ,R5-920 ,Artificial Intelligence ,Medical technology ,Humans ,R855-855.5 ,Augmented learning ,Pandemics ,Virtual class ,Multimedia ,COVID-19 ,Synchronous learning ,Asynchronous learning ,Surgery ,Augmented reality ,computer ,Research Article ,Computer-Assisted Instruction ,Biotechnology - Abstract
The 2019–2020 coronavirus pandemic had far-reaching consequences beyond the spread of the disease and efforts to cure it. Today, it is obvious that the pandemic devastated key sectors ranging from health to economy, culture, and education. As far as education is concerned, one direct result of the spread of the pandemic was the resort to suspending traditional in-person classroom courses and relying on remote learning and homeschooling instead, by exploiting e-learning technologies, but many challenges are faced by these technologies. Most of these challenges are centered around the efficiency of these delivery methods, interactivity, and knowledge testing. These issues raise the need to develop an advanced smart educational system that assists home-schooled students, provides teachers with a range of smart new tools, and enable a dynamic and interactive e-learning experience. Technologies like the Internet of things (IoT) and artificial intelligence (AI), including cognitive models and context-awareness, can be a driving force in the future of e-learning, opening many opportunities to overcome the limitation of the existing remote learning systems and provide an efficient reliable augmented learning experience. Furthermore, virtual reality (VR) and augmented reality (AR), introduced in education as a way for asynchronous learning, can be a second driving force of future synchronous learning. The teacher and students can see each other in a virtual class even if they are geographically spread in a city, a country, or the globe. The main goal of this work is to design and provide a model supporting intelligent teaching assisting and engaging e-learning activity. This paper presents a new model, ViRICTA, an intelligent system, proposing an end-to-end solution with a stack technology integrating the Internet of things and artificial intelligence. The designed system aims to enable a valuable learning experience, providing an efficient, interactive, and proactive context-aware learning smart services.
- Published
- 2021
10. An OWASP Top Ten Driven Survey on Web Application Protection Methods
- Author
-
Habib Hamam, Ouissem Ben Fredj, Omar Cheikhrouhou, Abdelouahid Derhab, and Moez Krichen
- Subjects
Exploit ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Variety (cybernetics) ,Workflow ,Data exchange ,0202 electrical engineering, electronic engineering, information engineering ,Web application ,020201 artificial intelligence & image processing ,business ,computer - Abstract
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they are exposed to a variety of attacks. The biggest challenge facing organizations is how to develop a WA that fulfills their requirements with respect to sensitive data exchange, E-commerce, and secure workflows. This paper identifies the most critical web vulnerabilities according to OWASP Top Ten, their corresponding attacks, and their countermeasures. The application of these countermeasures will guarantee the protection of the WAs against the most severe attacks and prevent several unknown exploits.
- Published
- 2021
- Full Text
- View/download PDF
11. Comparative Study on Feature-Based Scoring Using Vector Space Modelling System
- Author
-
Habib Hamam, Omar Cheikhrouhou, Tarandeep Singh Walia, and Tarek Frikha
- Subjects
Article Subject ,Semantic feature ,Computer science ,General Mathematics ,media_common.quotation_subject ,02 engineering and technology ,010501 environmental sciences ,computer.software_genre ,Notation ,01 natural sciences ,Similarity (network science) ,QA1-939 ,0202 electrical engineering, electronic engineering, information engineering ,Function (engineering) ,0105 earth and related environmental sciences ,media_common ,Cosine similarity ,General Engineering ,Novelty ,Engineering (General). Civil engineering (General) ,020201 artificial intelligence & image processing ,State (computer science) ,Data mining ,TA1-2040 ,computer ,Mathematics ,Vector space - Abstract
This paper shows the importance of automated scoring (AS) and that it is better than human graders in terms of degree of reproducibility. Considering the potential of the automated scoring system, there is further a need to refine and develop the existing system. The paper goes through the state of the art. It presents the results concerning the problems of existing systems. The paper also presents the semantic features that are indispensable in the scoring system as they have complete content. Moreover, in the present research, a huge deviation has been exhibited by the system which has been shown later in performance analysis of the study, and this clearly indicates the novelty and improved results of the system. It explains the algorithms included in the methodology of this proposed system. The novelty of our work consists in the use of its own similarity function and its notation mechanism. It does not use the cosine similarity function between two vectors. This paper describes and develops a more accurate system which employs a statistical method for scoring. This system adopts and integrates rule-based semantic feature analysis.
- Published
- 2021
- Full Text
- View/download PDF
12. Machine Learning Classification Models with SPD/ED Dataset: Comparative Study of Abstract Versus Full Article Approach
- Author
-
Habib Hamam, Mehdi Ben Ammar, Mohamed Jmaiel, Hatem Bellaaj, and Mayara Khadhraoui
- Subjects
Computer science ,business.industry ,010401 analytical chemistry ,Decision tree ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,Machine learning ,computer.software_genre ,01 natural sciences ,0104 chemical sciences ,Random forest ,Full article ,Domain (software engineering) ,Support vector machine ,Statistical classification ,ComputingMethodologies_PATTERNRECOGNITION ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,Gradient boosting ,business ,computer - Abstract
In response to the researchers need in the bio-medical domain, we opted for automating the bibliographic research stage. In this context, several classification models of supervised machine learning are used. Namely the SVM, Random Forest, Decision Tree, KNN, and Gradient Boosting. In this paper, we conduct a comparative study between experimental results of full article classification and abstract classification approaches. Furthermore, we evaluate our results by using evaluation metrics such as accuracy, precision, recall and F1-score. We observe that the abstract approach outperforms the full article approach in terms of learning time and efficiency.
- Published
- 2020
- Full Text
- View/download PDF
13. AI-based Pilgrim Detection using Convolutional Neural Networks
- Author
-
Marwa Ben Jabra, Habib Hamam, Anis Koubaa, Adel Ammar, and Omar Cheikhrouhou
- Subjects
FOS: Computer and information sciences ,Computer Science - Machine Learning ,Pilgrim ,Computer science ,business.industry ,Computer Vision and Pattern Recognition (cs.CV) ,Deep learning ,0211 other engineering and technologies ,Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Neural and Evolutionary Computing ,02 engineering and technology ,Pilgrimage ,Machine learning ,computer.software_genre ,Convolutional neural network ,Machine Learning (cs.LG) ,Extractor ,Feature (computer vision) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Neural and Evolutionary Computing (cs.NE) ,Artificial intelligence ,business ,computer ,021101 geological & geomatics engineering - Abstract
Pilgrimage represents the most important Islamic religious gathering in the world where millions of pilgrims visit the holy places of Makkah and Madinah to perform their rituals. The safety and security of pilgrims is the highest priority for the authorities. In Makkah, 5000 cameras are spread around the holy for monitoring pilgrims, but it is almost impossible to track all events by humans considering the huge number of images collected every second. To address this issue, we propose to use artificial intelligence technique based on deep learning and convolution neural networks to detect and identify Pilgrims and their features. For this purpose, we built a comprehensive dataset for the detection of pilgrims and their genders. Then, we develop two convolutional neural networks based on YOLOv3 and Faster-RCNN for the detection of Pilgrims. Experiments results show that Faster RCNN with Inception v2 feature extractor provides the best mean average precision over all classes of 51%., Accepted in ATSIP'2020
- Published
- 2019
14. Self-Embedding Watermarking Scheme based on Discrete Wavelet Domain
- Author
-
Achraf Makhloufi, Ahmed Ben Hamida, Habib Hamam, and Hanen Rhayma
- Subjects
Scheme (programming language) ,Authentication ,Self-embedding ,Wavelet ,Computer science ,computer ,Digital watermarking ,Algorithm ,computer.programming_language ,Domain (software engineering) - Published
- 2018
- Full Text
- View/download PDF
15. Banking Security System Based on SVD Fingerprints and Cryptography Passwords
- Author
-
Habib Hamam, Ala Balti, Farhat Fnaiech, and Sofienne Srihi
- Subjects
Password ,Mathematical principle ,business.industry ,Computer science ,Singular value decomposition ,Cryptography ,Confidentiality ,business ,Encryption ,Computer security ,computer.software_genre ,computer ,Security system - Abstract
This work tackles the issue of the protection of confidential private data. Special attention is given to online banking. We made profit random functions to produce unpredictable results for intruders. By creating a list of passwords and by encrypting each word in two different steps based on random functions we obtain efficient double protection. Additional security is offered by biometrical data such as fingerprints. The fingerprints are watermarked in a well-chosen image which serves a shared key between the bank and its customer. This image is merged in the customer's fingerprints by using the mathematical principle of singular value decomposition (SVD). As a result we get a blurred image that is only understandable by the bank.
- Published
- 2018
- Full Text
- View/download PDF
16. Design of emotional educational system mobile games for autistic children
- Author
-
Nazih Heni and Habib Hamam
- Subjects
Multimedia ,Intelligent character recognition ,Process (engineering) ,business.industry ,Computer science ,Transition (fiction) ,05 social sciences ,02 engineering and technology ,computer.software_genre ,medicine.disease ,Facial recognition system ,Software ,Interactivity ,Autism spectrum disorder ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Mobile telephony ,business ,computer ,050107 human factors - Abstract
The rise and popularization of smartphones resulted in an obvious transition from personal computing to smartphones computing; all while guarding interactivity. Consequently, intelligent instruments can possess a “Facial Emotion Detection” (FED) system and an “Automatic Speech Recognition” (ASR) process. Such performances give new opportunities to develop a variability of software's that would otherwise be impossible. One group that would strongly benefit from the aforementioned applications concerns kids with Autism Spectrum Disorder (ASD). Although most recent educational mobile games targeting autistic children are not emotion-aware, our research laboratory inspects how portable technologies, facial expression recognition, and voice recognition algorithms can help autistic kids learn and improve their academic skills. We have designed a computerized system, “World of Kids” which facilitates the development of behaviour detection software's in portable devices. We aim to identify the mobile user's emotions via facial detection in order to extract the best appropriate and favourable game(s), which may even be a learning game(s). This paper describes the process in designing “World of Kids” and discusses the given results after testing the facial expression recognition application to detect emotion.
- Published
- 2016
- Full Text
- View/download PDF
17. Android for Enterprise Automated Systems
- Author
-
Fahmi Ncibi, Habib Hamam, and Ezzedine Ben Braiek
- Subjects
Enterprise system ,Computer science ,business.industry ,Embedded system ,Operating system ,Android (operating system) ,computer.software_genre ,business ,computer - Abstract
In this chapter, various aspects pertaining to the open operating system Android OS such as its history, architecture, features, and utility for business purposes will be introduced, following which the role of Android in enterprise management will be explained. The chapter will be concluded by a detailed report of the BYOD approach that uses Android for industrial control and automation. Since mobile devices have become progressively more powerful and accessible, mobile computing has greatly changed our daily lives. As one of the most popular mobile operating systems, Android provides the tools and API for Android developers to develop Android applications. Android is an open source operating system for mobile devices. Today its primary use is lodged in the mobile phone industry. During the recent past years, many projects have been created, with the objective to elevate Android to other platforms, such as sub-notebooks or embedded systems.
- Published
- 2016
- Full Text
- View/download PDF
18. Information Security
- Author
-
Ala Balti, Habib Hamam, Farhat Fnaiech, and Sofienne Srihi
- Subjects
Cloud computing security ,Certified Information Security Manager ,business.industry ,Internet privacy ,Information security ,Computer security ,computer.software_genre ,Asset (computer security) ,Security information and event management ,Security service ,Information security management ,Security through obscurity ,Business ,computer - Abstract
In this chapter, we define Information Security (IS) and elaborate on the different methods and technology used. We proceed to explain some of the IS tools and risks found in private and confidential data. We detail the latest algorithms and systems of security and discuss how to implement those systems in business to upgrade performances and increase profits.
- Published
- 2016
- Full Text
- View/download PDF
19. Real-time optical 2D wavelet transform based on the JPEG2000 standards
- Author
-
Ayman Alfalou, Abdulsalam Alkholidi, Habib Hamam, G. Keryer, A. Cottour, Laboratoire ISEN (L@BISEN), Institut supérieur de l'électronique et du numérique (ISEN)-YNCREA OUEST (YO), Light Scatter Learning (LABISEN-LSL), Institut supérieur de l'électronique et du numérique (ISEN)-YNCREA OUEST (YO)-Institut supérieur de l'électronique et du numérique (ISEN)-YNCREA OUEST (YO), Université de Moncton - Faculté d'ingénierie (FACULTÉ D'INGÉNIERIE), and Université de Moncton
- Subjects
Signal processing ,Computer science ,Color image ,Fourier optics ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Wavelet transform ,Image processing ,02 engineering and technology ,computer.file_format ,Condensed Matter Physics ,01 natural sciences ,Electronic, Optical and Magnetic Materials ,010309 optics ,[SPI]Engineering Sciences [physics] ,020210 optoelectronics & photonics ,Computer engineering ,0103 physical sciences ,JPEG 2000 ,0202 electrical engineering, electronic engineering, information engineering ,Instrumentation ,computer ,Image compression ,Coding (social sciences) - Abstract
In image processing, the Wavelet Transform (WT) is largely used. However, time requirements for large two-dimensional image transforms are hard to meet with sequential implementations. Parallel implementation decreases the processing time and allows to reach a real-time operation in image coding. Unfortunately, this parallel coding increases the hardware complexity. We propose an optical implementation of the JPEG2000 compression using a special implementation of the WT. Special attention is paid to propose a simple all optical setup carrying out the optical implementation of JPEG2000 compression for gray-level images. Finally, an adaptation of our technique to colored images is proposed. Wb
- Published
- 2008
- Full Text
- View/download PDF
20. A new approach for optical colored image compression using the JPEG standards
- Author
-
Habib Hamam, Abdulsalam Alkholidi, and Ayman Alfalou
- Subjects
Color image ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Image processing ,Data_CODINGANDINFORMATIONTHEORY ,computer.file_format ,Lossy compression ,JPEG ,Control and Systems Engineering ,Computer Science::Computer Vision and Pattern Recognition ,Signal Processing ,Discrete cosine transform ,Computer vision ,Computer Vision and Pattern Recognition ,Artificial intelligence ,Electrical and Electronic Engineering ,Quantization (image processing) ,business ,computer ,Software ,Mathematics ,Data compression ,Image compression - Abstract
Image compression consists in reducing information volume representing an image. Elimination of redundancies and non-pertinent information enables memory space minimization and thus faster data transmission. The present work aims to improve the quality of the compressed image while minimizing the time required for compression by using the principle of coherent optics. We present an optical adaptation of the method of JPEG compression technique for binary, gray-level and color images. Illustrative simulations will be given at the end to validate our architecture and to evaluate the performance on different types of images (binary, gray and color). An optical implementation setup is proposed and validated experimentally.
- Published
- 2007
- Full Text
- View/download PDF
21. Facial emotion detection of smartphone games users
- Author
-
Habib Hamam and Nazih Heni
- Subjects
Facial expression ,Interactivity ,Multimedia ,Computer science ,Feature extraction ,Emotion detection ,computer.software_genre ,Face detection ,computer ,Facial recognition system ,Mobile device - Abstract
Since the emergence of smartphones, there is a noticeable shift in our daily lives from desktop use to mobile use while maintaining interactivity, improving the use of these devices. Mobile gaming is an area that can provide a very personalized way to enjoy life for smartphone users. Today, while smart devices have the ability to recognize facial expressions, robust recognition of facial expressions in real time remains a challenge due to difficulties in accurately extracting the most pertinent emotional characteristics. A valuable objective is to define a computerized system facilitating the design and implementation of behavior detection on mobile devices for various applications. Our work aims to detect emotions through the face recognition of a smartphone user in order to synthesize his behavior while playing.
- Published
- 2015
- Full Text
- View/download PDF
22. Web based interactive platform for learning by hearing
- Author
-
Habib Hamam and Omar Cheikhrouhou
- Subjects
Ajax ,HTML5 ,Multimedia ,business.industry ,Interface (Java) ,Computer science ,Animation ,computer.software_genre ,Electronic mail ,Human–computer interaction ,ComputingMilieux_COMPUTERSANDEDUCATION ,Web application ,The Internet ,User interface ,business ,computer ,computer.programming_language - Abstract
Purpose: To implement a user-friendly web based interactive platform to teach subjects requiring voice or audio illustrations such as teaching English or any language, radio animation, music, poetry, Koran recitation or learning by hart, or developing oral communication skills. Method: Several technologies (Php5, Codeigniter, html5, Css3, Jquery, Java, Flex, Ajax,…) are used to implement the web based interactive user-friendly interface for learning by hearing and repeating. The learner may be a naive user in terms of Internet and computer use. He/she needs only to click on a link and to enter as a regular or invited learner. It also may be used by visually impaired people. The teacher conducts the course and gives rights to the learner to talk individually or simultaneously. The platform should be implemented in a modular way so that one can augment it by new modules or by existing tools such as forums. Results: The platform has been conceived for several applications. Particular attention has been given to learning Koran by hart. The teacher pronounces a verse, or a segment of it, once or twice by rigorously respecting the rules of Koran recitation (Tajwid). To help the visually non-impaired learners learn verses by hart, verses are displayed on the screen and then masked progressively until all learners can recite the verses by hart. Discussion: The experiment has been conducted successfully. The platform presents several advantages with respect to VoIP tools which are not dedicated to learning by hearing and repeating.
- Published
- 2012
- Full Text
- View/download PDF
23. An intelligent RFID checkout for stores
- Author
-
Habib Hamam and M. A. Besbes
- Subjects
Invoice ,business.industry ,Computer science ,media_common.quotation_subject ,Intelligent decision support system ,Payment ,Computer security ,computer.software_genre ,Marketing strategy ,Identification (information) ,Radio-frequency identification ,The Internet ,business ,Database transaction ,computer ,media_common - Abstract
In this article, we propose an intelligent RFID (Radio Frequency Identification) checkout to facilitate access and payment, to assist visually impaired people and to improve marketing strategy. To avoid saturated queues which we used to see in conventional stores remote identification of the customer and items is used to purchase the latter. Payment is then performed by to online payment or by ATM or credit cards. In addition, to ensure high performance and smooth operation of this checkout, we thought of seven major criteria namely: • Improving marketing strategy by displaying specific advertisement for each customer depending on the history of his previous purchases. • Vocally assisting vocally the visually impaired people (Vocal Messages: welcome, total, confirmation…) • Checking the validity of products during purchase process to avoid sales of expired unhealthy products • Adding a biometric security level by using fingerprints so that the customer can confirm his identity and validate his purchase. This makes steeling others' identity cards useless. • Enabling the customer performing the transaction faster by automatic online payment and sending electronic invoice to his inbox. • Offering to the owner the possibility to check and supervise the history of transactions via internet. • Saving energy by activating the RFID reader only if a user enters or leaves.
- Published
- 2011
- Full Text
- View/download PDF
24. A view on latest audio steganography techniques
- Author
-
Fatiha Djebbar, Beghdad Ayad, Karim Abed-Meraim, and Habib Hamam
- Subjects
Steganography tools ,Steganography ,Multimedia ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data security ,Data_CODINGANDINFORMATIONTHEORY ,computer.software_genre ,Computer security ,Secure communication ,Robustness (computer science) ,Information hiding ,Audio signal processing ,business ,computer ,Digital audio - Abstract
Steganography has been proposed as a new alternative technique to enforce data security. Lately, novel and versatile audio steganographic methods have been proposed. A perfect audio Steganographic technique aim at embedding data in an imperceptible, robust and secure way and then extracting it by authorized people. Hence, up to date the main challenge in digital audio steganography is to obtain robust high capacity steganographic systems. Leaning towards designing a system that ensures high capacity or robustness and security of embedded data has led to great diversity in the existing steganographic techniques. In this paper, we present a current state of art literature in digital audio steganographic techniques. We explore their potentials and limitations to ensure secure communication. A comparison and an evaluation for the reviewed techniques is also presented in this paper.
- Published
- 2011
- Full Text
- View/download PDF
25. A Policy Based Event Management Middleware for Implementing RFID Applications
- Author
-
Hamid Harroud, Mohammed Boulmalf, Habib Hamam, and M. E. Ajana
- Subjects
Information privacy ,Business rule ,business.industry ,Computer science ,Distributed computing ,computer.software_genre ,Rapid application development ,Middleware (distributed applications) ,Scalability ,Message oriented middleware ,Radio-frequency identification ,business ,Host (network) ,computer ,Computer network - Abstract
Radio Frequency Identification (RFID) has become a popular identification technology in a number of application areas such as supply chain management. A dedicated middleware solution is required to achieve the maximum benefits of RFID technology. The middleware components serve to abstract the communication between the middleware and the different types of sensing devices on one hand, and the middleware and backend applications on the other hand. FlexRFID is a simple and smart RFID middleware which provides device management and monitoring, data processing, filtering, and aggregation, rapid application development, as well as a policy based business rules layer which helps applying rules for accessing and configuring the services provided by the middleware. This layer serves to process some business intelligence rules locally so that the host system is offloaded from those mundane tasks. The paper shows that FlexRFID is a highly scalable and easily deployable middleware in the heterogeneous sites based on different standards and consisting of different hardware. Apart from these, FlexRFID incorporates the mechanisms for supervision, testing, and control of its components, plus handles the security and privacy issues that inhibit the adoption of RFID technology by applying the privacy policies in the business rules layer. FlexRFID middleware is controlling the data flows in and out as well as locally controlling some intelligence.
- Published
- 2009
- Full Text
- View/download PDF
26. Web Site Auditing Using Web Access Log Data
- Author
-
Habib Hamam, Yassine Bouslimani, Nabil Balecel, and Si He
- Subjects
Fuzzy clustering ,Computer science ,Swarm behaviour ,Audit ,computer.software_genre ,Fuzzy logic ,Artificial Fish Swarm Algorithm ,Digital audio broadcasting ,Fuzzy Clustering ,Index (publishing) ,Web page ,Web site auditing ,Data mining ,Cluster analysis ,computer ,Web Access Log - Abstract
This paper applies a method to use the access log data to audit Web sites. It studies website auditing by (1) proposing a new fuzzy clustering algorithm that combines standard fuzzy C-means and the artificial fish swarm algorithm; (2) presenting a new measurement index for similarities between user sessions; and (3) providing an experiment on the execution of this new method. The results are encouraging and show the potential of our fuzzy clustering approach to assist in auditing Web site., The Seventh Annual Communications Networks and Services Research Conference(CNSR'09), Moncton, New Brunswick, May 11-13, 2009
- Published
- 2009
- Full Text
- View/download PDF
27. FlexRFID: A flexible middleware for RFID applications development
- Author
-
M. E. Ajana, Hamid Harroud, Mohammed Boulmalf, and Habib Hamam
- Subjects
Supply chain management ,SIMPLE (military communications protocol) ,business.industry ,Semantics (computer science) ,Computer science ,computer.software_genre ,Development (topology) ,Hardware_GENERAL ,Middleware (distributed applications) ,Embedded system ,Scalability ,Radio-frequency identification ,Wireless ,business ,computer - Abstract
Nowadays, Radio Frequency Identification (RFID) is a popular automatic wireless identification technology, and provides promising benefits in a number of application areas such as supply chain management. Though RFID technology has attracted a significant attention due to the convergence of lower cost and increased hardware capabilities, there still exist major hurdles for the practical realization of its benefits. To achieve the maximum benefits of RFID technology, a dedicated middleware solution is required for managing and monitoring RFID readers or other types of sensing devices, as well as processing dynamically generated high volumes of noisy RFID data. Apart from these, such middleware should possess useful contextual characteristics such as implicit semantics, and support rapid RFID based application development. FlexRFID as reported in this paper is a simple and smart RFID middleware which satisfies the requirements mentioned earlier. The paper shows that FlexRFID is a highly scalable and easily deployable middleware in the heterogeneous sites based on different standards and consisting of different hardware. Apart from these, FlexRFID incorporates the mechanisms for supervision, testing, and control of its components, plus handles the security and privacy issues that inhibit the adoption of RFID technology.
- Published
- 2009
- Full Text
- View/download PDF
28. A highly robust audio hashing system using auditory-based front-end processing
- Author
-
Abderraouf Ben Salem, Jean Caelen, Sid-Ahmed Selouani, and Habib Hamam
- Subjects
Signal processing ,Computer science ,Speech recognition ,Feature extraction ,Hash function ,Filter bank ,computer.software_genre ,Sound recording and reproduction ,medicine.anatomical_structure ,Nonlinear filter ,Robustness (computer science) ,medicine ,Auditory system ,Audio signal processing ,computer - Abstract
In this paper, a robust perceptual audio hashing system is presented. A model of the human auditory system is used to extract robust features from the outputs of a non-linear filter bank that mimics the human basilar membrane. Experiments on various audio excerpts show that this new ear-based front-end processing provides very effective hash values. The proposed audio hashing system performs very satisfactorily in identification and it turned out very resilient to a large variety of severe audio attacks.
- Published
- 2009
- Full Text
- View/download PDF
29. Natural Human-System Interaction Using Intelligent Conversational Agents
- Author
-
Habib Hamam, Sid-Ahmed Selouani, and Yacine Benahmed
- Subjects
Embodied agent ,Interface (Java) ,Computer science ,Human–computer interaction ,Natural (music) ,computer.software_genre ,Human system interaction ,computer ,Natural language - Abstract
In the context of the prodigious growth of network-based information services, messaging and edutainment, we introduce new tools that enable information management through the use of efficient multimodal interaction using natural language and speech processing. These tools allow the system to respond to close-to natural language queries by means of pattern matching. A new approach which gives the system the ability to learn new utterances of natural language queries from the user is presented. This automatic learning process is initiated when the system encounters an unknown command. This alleviates the burden of users learning a fixed grammar. Furthermore, this enables the system to better respond to spontaneous queries. This work investigates how an information system can benefit from the use of conversational agents to drastically decrease the cognition load of the user. For this purpose, Automated Service Agents and Artificial Intelligence Markup Language (AIML) are used to provide naturalness to the dialogs between users and machines.
- Published
- 2009
- Full Text
- View/download PDF
30. A recognition sign language system based on the correlation technique
- Author
-
Habib Hamam, Siwar Rekik, Marwa Elbouz, and Ayman Alfalou
- Subjects
Computer science ,business.industry ,Interface (Java) ,Speech recognition ,Sign language ,computer.software_genre ,Comprehension ,Correlation ,Gesture recognition ,Virtual machining ,Artificial intelligence ,business ,computer ,Character recognition ,Natural language ,Natural language processing - Abstract
In our society based on communication, the barrier between the spoken and gestural languages remains a main problem for the deaf-mute. To make this communication possible, we propose developing an interface with two modules (comprehension and recognition) allowing the recognition and the restitution of the sign language in the form of synthesized words.
- Published
- 2008
- Full Text
- View/download PDF
31. Optical video image compression: a multiplexing method based on the spectral fusion of information
- Author
-
A. Cottour, Ayman Alfalou, and Habib Hamam
- Subjects
Computer science ,Image quality ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Image processing ,computer.file_format ,Image segmentation ,JPEG ,Digital image processing ,Computer vision ,Artificial intelligence ,business ,computer ,Image resolution ,Image compression ,Data compression - Abstract
The increasing performances of computer networks and communication systems lead to a huge increase in exchanges of miscellaneous information, including video images with higher and higher resolution. Yet, in many cases, only some parts of the exchanged information are really useful. Thus, in these cases, information can be compressed before being transmitted and/or stored. This compression enables to reduce the processing and transfer time as well as the storage capacity needed for data. Images are of optical nature. Therefore, it is necessary, to be able to use them in these networks and these communication systems, to convert them into digital files before transmitting, computing or storing them. This conversion can require a long computation time or can lead to a bad image quality because of "pixelization" problems. So, it is worth performing some processing on these images (such as compression) directly at the source, before any conversion, by some optical methods. Moreover, there is another advantage of optical solutions compared to digital ones to carry out some image processing operations: their high potential of parallelism (optical processing applies on the whole image in a very short time !). Indeed, with optical solutions it is not necessary to divide the image in several pieces before processing it, in contrast to JPEG digital compression for instance. Thus, for example, it is possible to compute the 2D Fourier transform of a whole image at the speed of light by merely using a convergent lens. In the present work, our aim is to propose and describe a new multiplexing method for video image compression based on an optical image processing: fusion by spectral segmentation, which enables to carry out a fusion that does not destroy the quality of the decompressed output images. The spectral segmentation operation consists in grouping together, in a single spectrum, one part of the spectrum of several images (the spectrum of an image is the result of the 2D Fourier transform of the image). So, because of its selective nature, spectral segmentation allows to perform an image compression in the Fourier domain. With our technique, this segmentation is carried out after a shift (or translation) of the spectrum frequencies of the different images to be compressed. This spectral shift, done before the segmentation, enables to optimize the use of the space-bandwidth product and, thus, to considerably improve the quality of the compressed video images, in comparison to the results got without this shift.
- Published
- 2008
- Full Text
- View/download PDF
32. Fast Transmission by Mobile Phone of Recognition Sign Language using a Segmented Multidecision Filter Adapted to the Parallel Virtual Machine (PVM)
- Author
-
Habib Hamam, Ayman Alfalou, Marwa Elbouz, Light Scatter Learning (LABISEN-LSL), Laboratoire ISEN (L@BISEN), Institut supérieur de l'électronique et du numérique (ISEN)-YNCREA OUEST (YO)-Institut supérieur de l'électronique et du numérique (ISEN)-YNCREA OUEST (YO), Département de génie mécanique, Faculté d'ingénierie, Université de Moncton, Moncton, Canada, and parent
- Subjects
business.industry ,Computer science ,Process (computing) ,02 engineering and technology ,Filter (signal processing) ,Sign language ,computer.software_genre ,01 natural sciences ,010309 optics ,[SPI]Engineering Sciences [physics] ,020210 optoelectronics & photonics ,Mobile phone ,Virtual machine ,Gesture recognition ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Computer vision ,Artificial intelligence ,Mobile telephony ,business ,computer ,ComputingMilieux_MISCELLANEOUS ,Gesture - Abstract
The objective of our study is to recognize the sign language and re-transcribe it into a written or oral language in order to make mobile communication possible between a deaf-mute and people who don't know the sign language. For that, we used a method of correlation based on a multi-decision segmented filter. The latter has been used for a long time to recognize a target image. However an adaptation of this technique is necessary to take into account particular characteristics of gestures and to be able to send it with a high transmission rate. Moreover, in this application the target image to recognize evolves/moves in real time. Thus to take the right decision, it is necessary to carry out a very large number of correlations therefore slowing down the translation process. To reduce this processing time, we propose, in this article, to implement our system by using the multi-station technique. This technique enables us to distribute the required computing effort on various parallel stations using (PVM) a parallel virtual machine. Our Results show that we succeeded in validating our system, using multidecision filtering and multi-station by using real gesture.
- Published
- 2007
- Full Text
- View/download PDF
33. Using Text-to-Speech Engine to Improve the Accuracy of a Speech-Enabled Interface
- Author
-
Yacine Benahmed, Sid-Ahmed Selouani, Habib Hamam, and Douglas O'Shaughnessy
- Subjects
Audio mining ,Voice activity detection ,business.industry ,Computer science ,Speech recognition ,Speech technology ,Acoustic model ,Speech corpus ,Speech synthesis ,Speaker recognition ,computer.software_genre ,Speech analytics ,Artificial intelligence ,business ,computer ,Natural language processing - Abstract
This paper presents an automatic user profile building and training (AUPB&T) system for speech recognition. This system uses text-to-speech (TTS) voices to improve the language models and the performance of current commercial automatic speech recognition (ASR) engines. The vocabularies of these systems are usually suited for general usage. Users have no easy means of training these engines. They generally shun the proposed training methods that require long and picky training sessions. Our proposed solution is a system that accepts the user documents and favorite Web pages, and feeds them to a (TTS) module in order to improve the accuracy of spoken information retrieval queries. The results show that AUPB&T considerably improves the recognition engine performance of the Microsoft speech recognition system without having to resort to manual training.
- Published
- 2007
- Full Text
- View/download PDF
34. Fully Mobile Telephony Using VoIP Computer Software
- Author
-
Yassine Bouslimani, Habib Hamam, and T. Ross
- Subjects
education.field_of_study ,Engineering ,Voice over IP ,business.industry ,Population ,Mobile computing ,Application software ,computer.software_genre ,Software ,Keypad ,The Internet ,Telephony ,business ,education ,computer ,Computer network - Abstract
Our global objective is to profit from the technology offered by the computer and/or Internet without being constrained by sitting in front of a computer. As an example of application, we present a method to use Voice over IP (VoIP) computer software remotely. This method targets mainly the population with reduced mobility or the population unfamiliar with computers, who may have difficulty using this type of software on the computer itself. This design allows for the use of a telephone keypad and headset with a microphone wirelessly, away from the computer. The system attempts to mimic the same kind of interface provided by telephones, with the same type of keypad, in an effort to maximize convenience, and reduce the amount of difficulty that someone with reduced mobility may have in using the system. We will describe the implementation used, present some results on how well the system works and some possibilities for the future.
- Published
- 2007
- Full Text
- View/download PDF
35. Straightforwardly Extendable Web-Based Simulator of Communication Chains
- Author
-
Habib Hamam
- Subjects
User Friendly ,SIMPLE (military communications protocol) ,Java ,business.industry ,Computer science ,media_common.quotation_subject ,SIGNAL (programming language) ,Debugging ,Embedded system ,Web application ,The Internet ,Point (geometry) ,business ,computer ,Simulation ,computer.programming_language ,media_common - Abstract
A user friendly and straightforwardly extendable Web-based simulator of communication chains is presented. Without any need of license or installation, the simulator can be used for e-learning or e-research through a conventional Internet browser supporting Java plug-ins. Devices and connections can be freely inserted, moved and removed by simple mouse dragging. Merely by moving the mouse on the desired connection point, the corresponding signal is displayed enabling therefore easy debugging and user's assistance. Moreover, the simulator is designed to enable forward extension of the platform by easily adding new generic devices regardless of their degree of complexity.
- Published
- 2006
- Full Text
- View/download PDF
36. Optical JPEG based Color Image Compression Algorithm: Performance Measurement
- Author
-
Habib Hamam, Ayman Al Falou, and Abdulsalam Alkholidi
- Subjects
Lossless compression ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data compression ratio ,Data_CODINGANDINFORMATIONTHEORY ,computer.file_format ,Lossy compression ,JPEG ,Computer Science::Computer Vision and Pattern Recognition ,Computer Science::Multimedia ,Computer vision ,Artificial intelligence ,Quantization (image processing) ,business ,Algorithm ,computer ,Lossless JPEG ,Data compression ,Image compression - Abstract
In this paper we advance an optical JPEG color image compression algorithm and discuss its performance. Statistical metrics such as mean square error (MSE) and peak signal-to-noise ratio (PSNR) are used. These quality criteria quantify the difference between the original and reconstructed image. The time required for compression/decompression using our optical method is one of the considered performance factors. Simulation results are presented to illustrate the effect of the compression ratio on the reconstructed image quality.
- Published
- 2006
- Full Text
- View/download PDF
37. Dynamic interactive e-learning: application to optics and laser surgery
- Author
-
Habib Hamam
- Subjects
Multimedia ,Computer science ,business.industry ,E-learning (theory) ,Learning environment ,Collaborative learning ,Animation ,Space (commercial competition) ,computer.software_genre ,Optics ,E learning ,Index (publishing) ,ComputingMilieux_COMPUTERSANDEDUCATION ,business ,computer - Abstract
One of the most important vehicles for providing dynamic learning is interaction combined to animation. We designed a dynamic e-learning environment for teaching optics. In spite of the fact that the teacher and the learner do not share neither space nor time, dynamic teaching is implemented aiming at reducing passivity, engaging and motivating the learner, empowering him with responsibility for his own learning experience, allowing collaborative learning, popularizing complex aspects in optics, and enabling the learner to easily access and interact with the environment content at his own pace, in his own time and from wherever he might be. Audio-visual tools are used for real-time assistance. The degree of complexity is customized by supervising and interpreting the interactions of the learner so that laypeople can readily follow the course. The course is adapted to people with a modest background in physics such as clinicians, optometrists and ophthalmologists. However, the learning environment is useful for advanced topics in optics as well as for research. Index — E-learning, dynamic teaching, interaction, optics.
- Published
- 2004
- Full Text
- View/download PDF
38. Ad hoc systems backboned by fibres: limitation and solutions
- Author
-
Hsiao-Hwa Chen, Sghaier Guizani, Habib Hamam, and Xiaojiang Du
- Subjects
Delay-tolerant networking ,Vehicular ad hoc network ,Adaptive quality of service multi-hop routing ,Computer Networks and Communications ,Computer science ,Wireless ad hoc network ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Computer security ,computer.software_genre ,Computer Science Applications ,Optimized Link State Routing Protocol ,Control and Systems Engineering ,Dynamic circuit network ,Electrical and Electronic Engineering ,computer - Abstract
An ad hoc network is a set of wireless mobile nodes that communally form a network without specific user administration or configuration. There are several scenarios that do not have an available network infrastructure and could benefit from the creation of an ad hoc network as rescue/emergency operations, law enforcement activities, tactical/military missions, commercial projects, educational classrooms.
- Published
- 2009
- Full Text
- View/download PDF
39. An Interactive Web-Based Tool for Teaching Optics and Vision
- Author
-
Habib Hamam
- Subjects
Geometrical optics ,Multimedia ,business.industry ,Computer science ,Condensed Matter Physics ,computer.software_genre ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,Computer graphics (images) ,ComputingMilieux_COMPUTERSANDEDUCATION ,Web application ,Electrical and Electronic Engineering ,business ,Java applet ,computer ,ComputingMethodologies_COMPUTERGRAPHICS ,Optics and vision - Abstract
A multimedia teaching aid based on animated Java applets can help users visualize the behavior of complex optical systems.
- Published
- 2003
- Full Text
- View/download PDF
40. A Hybrid Artificial Fish Swarm Simulated Annealing Optimization Algorithm for Automatic Identification of Clusters
- Author
-
Habib Hamam, Nabil Belacel, Si He, Yassine Bouslimani, and Alan Chan
- Subjects
0209 industrial biotechnology ,Fuzzy clustering ,Computer science ,Correlation clustering ,Swarm behaviour ,02 engineering and technology ,computer.software_genre ,020901 industrial engineering & automation ,Rate of convergence ,Robustness (computer science) ,Simulated annealing ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science (miscellaneous) ,Canopy clustering algorithm ,020201 artificial intelligence & image processing ,Data mining ,Cluster analysis ,Algorithm ,computer - Abstract
This paper introduces an alternative fuzzy clustering method that does not require fixing the number of clusters a priori and produce reliable clustering results. This newly proposed method empowers the existing Improved Artificial Fish Swarm algorithm (IAFSA) by the simulated annealing (SA) algorithm. The hybrid approach can prevent IAFSA from unexpected vibration and accelerate convergence rate in the late stage of evolution. Computer simulations are performed to compare this new method with well-known fuzzy clustering algorithms using several synthetic and real-life datasets. Our experimental results show that our newly proposed approach outperforms some other well-known existing fuzzy clustering algorithms in terms of both accuracy and robustness.
- Full Text
- View/download PDF
41. Comparative study of digital audio steganography techniques
- Author
-
Beghdad Ayad, Karim Abed Meraim, Fatiha Djebbar, Habib Hamam, Laboratoire Traitement et Communication de l'Information (LTCI), Télécom ParisTech-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), and HAL, TelecomParis
- Subjects
Voice over IP ,Acoustics and Ultrasonics ,Steganography ,Multimedia ,business.industry ,Computer science ,Digital data ,020206 networking & telecommunications ,02 engineering and technology ,Data_CODINGANDINFORMATIONTHEORY ,computer.software_genre ,Robustness (computer science) ,Information hiding ,Secrecy ,0202 electrical engineering, electronic engineering, information engineering ,Systems design ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,computer ,[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing ,ComputingMilieux_MISCELLANEOUS ,Digital audio ,[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing - Abstract
The rapid spread in digital data usage in many real life applications have urged new and effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by implementing steganograhy techniques. Novel and versatile audio steganographic methods have been proposed. The goal of steganographic systems is to obtain secure and robust way to conceal high rate of secret data. We focus in this paper on digital audio steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital audio steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. Another contribution of this paper is the provision of a robustness-based classification of steganographic models depending on their occurrence in the embedding process. A survey of major trends of audio steganography applications is also discussed in this paper.
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.