Search Results - "2021 3rd IEEE Middle East and North Africa COMMunications Conference (MENACOMM)"

Refine Results
  1. 1

    Attack-Specific Feature Selection for Anomaly Detection in Software-Defined Networks by Abbas, Nadine, Nasser, Youssef, Shehab, Maryam, Sharafeddine, Sanaa

    “…Due to the rapid advancement of technologies including the tremendous growth of multimedia content, cloud computing and mobile usage, conventional networks are…”
    Get full text
    Conference Proceeding
  2. 2

    Traffic Scene Semantic Segmentation by Using Several Deep Convolutional Neural Networks by Kherraki, Amine, Maqbool, Muaz, El Ouazzani, Rajae

    “…Nowadays, Intelligent Transportation System (ITS) has become one of the most popular subjects of scientific research. ITS provides innovative services to…”
    Get full text
    Conference Proceeding
  3. 3

    A Novel Classification of Machine Learning Applications in Healthcare by Thamara, Abeer, Elsersy, Mohamed, Sherif, Ahmed, Hassan, Hossam, Abdelsalam, Omar, Almotairi, Khaled H.

    “…In recent years, machine learning has become widely used in various applications and research. It plays a crucial role in numerous fields such as medical…”
    Get full text
    Conference Proceeding
  4. 4

    Abnormal Network Traffic Detection using Deep Learning Models in IoT environment by Choukri, Wijdane, Lamaazi, Hanane, Benamar, Nabil

    “…As an emergent technology, the internet of things (IoT) aims to create an interconnected world of smart devices autonomously communicating via the internet…”
    Get full text
    Conference Proceeding
  5. 5

    Developing Date Palm Tree Inventory from Satellite Remote Sensed Imagery using Deep Learning by Alburshaid, E.A., Mangoud, M.A.

    “…A deep learning technique was used to recognize, count, and categorize date palm trees in the Kingdom of Bahrain. The MRCNN model of convolutional neural…”
    Get full text
    Conference Proceeding
  6. 6

    Privacy-Aware and Hardware Acceleration-Based Authentication Scheme for Internet of Drones by Henson, Tom Earl, Dawoud, Amer, Sherif, Ahmed

    “…Drones are becoming more influential and inter-connected in today's world. Internet of drones (IoD) is an architecture created over an area in which drones can…”
    Get full text
    Conference Proceeding
  7. 7

    A Markov Decision Process Model for a Reinforcement Learning-based Autonomous Pedestrian Crossing Protocol by El Hamdani, Sara, Loudari, Salaheddine, Novotny, Stanislav, Bouchner, Petr, Benamar, Nabil

    “…Autonomous Traffic Management (ATM) systems empowered with Machine Learning (ML) technics are a promising solution for eliminating traffic light and decreasing…”
    Get full text
    Conference Proceeding
  8. 8

    Effect of Unequal Clustering Algorithms in WirelessHART networks by Alharbi, Nouf, Mackenzie, Lewis, Pezaros, Dimitrios

    “…The use of Graph Routing in Wireless Highway Addressable Remote Transducer (WirelessHART) networks offers the benefit of increased reliability of…”
    Get full text
    Conference Proceeding
  9. 9

    Video Features with Impact on User Quality of Experience by Abbas, Nadine, Taleb, Sirine, Hajj, Hazem

    “…One of the major challenges in wireless networks is to quantify and evaluate the user quality of experience (QoE). Hence, network operators are continuously…”
    Get full text
    Conference Proceeding
  10. 10

    Privacy-Preserving Biometric-based Authentication Scheme for Electric Vehicles Charging System by Hataba, Muhammad, Sherif, Ahmed, Elsersy, Mohamed, Nabil, Mahmoud, Mahmoud, Mohamed, Almotairi, Khaled H.

    “…Nowadays, with the continuous increase in oil prices and the worldwide shift towards clean energy, all-electric vehicles are booming. Thence, these vehicles…”
    Get full text
    Conference Proceeding
  11. 11
  12. 12

    Logic-Based Neural Network for Image Compression Applications by Doughan, Ziad, Kassem, Rola, El-Hajj, Ahmad M., Haidar, Ali M.

    “…This paper presents a new lossy image compression technique using Logic-based Weightless Neural Networks, which underwrite two novel network architectures. The…”
    Get full text
    Conference Proceeding
  13. 13

    Identifying Information Superspreaders of COVID-19 from Arabic Tweets by Alqurashi, Sarah, Alashaikh, Abdulaziz, Nabil, Mahmoud, Alanazi, Eisa, Sherif, Ahmed, Alsmary, Waleed

    “…Since the first confirmed case of COVID-19, in-formation was spreading in large amounts over social media platforms. Information spreading about the COVID-19…”
    Get full text
    Conference Proceeding
  14. 14

    Anomaly Based IDS Via Customised CUSUM Algorithm for Industrial Communication Systems by Ali, Ashraf, Ware, Andrew

    “…Industrial communication and applications have become more connected to the internet due to the enhancement of new 5G based technologies such as the Internet…”
    Get full text
    Conference Proceeding
  15. 15

    Characterizing and Detecting Similar Twitter Users by Choumane, Ali, Yassin, Fatima

    “…The vast emerging and growth of Twitter raises the need to identify similar users. This may benefit in a variety of applications such as social…”
    Get full text
    Conference Proceeding
  16. 16

    Segmentation Fault: A Cheap Defense Against Adversarial Machine Learning by Bared, Doha Al, Nassar, Mohamed

    “…Recently published attacks against deep neural networks (DNNs) have stressed the importance of methodologies and tools to assess the security risks of using…”
    Get full text
    Conference Proceeding
  17. 17

    Detecting Heart Failure from Chest X-Ray Images Using Deep Learning Algorithms by El Omary, Sara, Lahrache, Souad, El Ouazzani, Rajae

    “…Compared to other diseases, cardiovascular dis- eases are one of the most common causes of death. Actually, new advances in Deep Learning are providing…”
    Get full text
    Conference Proceeding
  18. 18

    A Multivariate Data Reduction Approach for Wireless Sensor Networks by Atoui, Ibrahim, Makhoul, Abdallah, Couturier, Raphael, Demerjian, Jacques

    “…Efficient data reduction methods are needed to minimize the power consumption in multivariate Wireless Sensor Network (WSN). In this paper, we proposed a…”
    Get full text
    Conference Proceeding
  19. 19

    3D Self-Positioning Algorithm based on joint DDoA-ToA by Le, Hoang. M., Slock, Dirk, Rossi, Jean-Pierre

    “…Thanks to the recent development of antenna design, localization based on the Direction of Arrival (DoA) of the incident signals is becoming more and more…”
    Get full text
    Conference Proceeding
  20. 20

    IoT Nodes Behavior Analysis Under Constrained Environment Using RPL Protocol by Ibrahimy, Saloua, Lamaazi, Hanane, Benamar, Nabil

    “…Routing protocol for low power and lossy network (RPL) has been particularly designed to ensure effective communication between constrained devices that are…”
    Get full text
    Conference Proceeding