Search Results - "Korbaa, Ouajdi"
-
1
A Metaheuristic Perspective on Extracting Numeric Association Rules: Current Works, Applications, and Recommendations
Published in Archives of computational methods in engineering (2024)“…In the vast field of data mining, the increasing significance of Numerical Association Rule Mining (NARM) lies in its capacity to unearth recurrent patterns…”
Get full text
Journal Article -
2
A memetic algorithm for the inventory routing problem
Published in Journal of heuristics (01-06-2022)“…In this article, we study an Inventory Routing Problem with deterministic customer demand in a two-tier supply chain. The supply chain network consists of a…”
Get full text
Journal Article -
3
On the use of text augmentation for stance and fake news detection
Published in Journal of information and telecommunication (Print) (03-07-2023)“…Data Augmentation (DA) aims at synthesizing new training instances by applying transformations to available ones. DA has several well-known benefits such as:…”
Get full text
Journal Article -
4
Risk-aware business process management using multi-view modeling: method and tool
Published in Requirements engineering (01-09-2021)“…Risk-aware Business Process Management (R-BPM) has been addressed in research since more than a decade. However, the integration of the two independent…”
Get full text
Journal Article -
5
Distributed deep learning approach for intrusion detection system in industrial control systems based on big data technique and transfer learning
Published in Journal of information and telecommunication (Print) (02-10-2023)“…Industry 4.0 refers to a new generation of connected and intelligent factories that is driven by the emergence of new technologies such as artificial…”
Get full text
Journal Article -
6
Spatial Spectral Schroedinger Eigenmaps Approach Based on Spectral Angle Distance for Hyperspectral Imagery Classification
Published in Journal of the Indian Society of Remote Sensing (01-11-2021)“…The Fast Spatial Spectral Schroedinger Eigenmaps (Fast SSSE) is a recent graph-based approach. It appears as a promising dimension reduction technique for…”
Get full text
Journal Article -
7
Correction to: Risk‑aware business process management using multi‑view modeling: method and tool
Published in Requirements engineering (01-12-2021)“…A correction to this paper has been published: https://doi.org/10.1007/s00766-021-00356-2…”
Get full text
Journal Article -
8
New online kernel method with the Tabu search algorithm for process monitoring
Published in Transactions of the Institute of Measurement and Control (01-06-2019)“…Process monitoring is an integral part of chemical process, required higher product quality and safety operation. Therefore, the objective of this paper is to…”
Get full text
Journal Article -
9
Heuristic algorithms for scheduling intrees on m machines with non-availability constraints
Published in Operational research (01-03-2021)“…Many real-world scheduling problems are solved to obtain optimal solutions in terms of processing time, cost, and quality as optimization objectives. Parallel…”
Get full text
Journal Article -
10
Formal Approach of FMS Cyclic Scheduling
Published in IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews (01-01-2007)“…This correspondence is related to the determination of both control and scheduling of flexible manufacturing systems under cyclic command. Different approaches…”
Get full text
Journal Article -
11
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey
Published in Computer science review (01-08-2023)“…The main objective of feature selection is to improve learning performance by selecting concise and informative feature subsets, which presents a challenging…”
Get full text
Journal Article -
12
Efficient e-mail spam filtering approach combining Logistic Regression model and Orthogonal Atomic Orbital Search algorithm
Published in Applied soft computing (01-09-2023)“…Phishing emails called spam have created a need for reliable and intelligent spam filters. Machine-learning techniques are effective, but current methods such…”
Get full text
Journal Article -
13
-
14
A multi-objective Chaos Game Optimization algorithm based on decomposition and random learning mechanisms for numerical optimization
Published in Applied soft computing (01-09-2023)“…Chaos Game Optimization (CGO) is a heuristic optimization approach that estimates global optima for optimization problems using operators based on chaos…”
Get full text
Journal Article -
15
Intrusion detection in cyber-physical system using rsa blockchain technology
Published in Multimedia tools and applications (01-05-2024)“…Connected cyber and physical elements exchange information through feedback in a cyber-physical system (CPS). Since CPS oversees the infrastructure, it is an…”
Get full text
Journal Article -
16
Intrusion detection based on ensemble learning for big data classification
Published in Cluster computing (01-06-2024)“…The escalating frequency and sophistication of cyber threats pose significant challenges to traditional intrusion detection methods. Signature-based misuse…”
Get full text
Journal Article -
17
Chaotic lightning search algorithm
Published in Soft computing (Berlin, Germany) (01-02-2021)“…Metaheuristics have proven their efficiency in treating complex optimization problems. Generally, they produce good results quite close to optimal despite some…”
Get full text
Journal Article -
18
Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
Published in Cluster computing (01-04-2024)“…Intrusion detection in industrial control systems (ICS) is crucial for maintaining secu rity in modern industries. However, the rapid growth of data generated…”
Get full text
Journal Article -
19
A deep learning-based intrusion detection approach for mobile Ad-hoc network
Published in Soft computing (Berlin, Germany) (01-07-2023)“…The goal of the paper is to present a Stacked autoencoder approach for enhancing Intrusion Detection Systems (IDSs) in Mobile Ad-Hoc Networks (MANETs). The…”
Get full text
Journal Article -
20
Gene selection for high dimensional biological datasets using hybrid island binary artificial bee colony with chaos game optimization
Published in The Artificial intelligence review (13-02-2024)“…Microarray technology, as applied to the fields of bioinformatics, biotechnology, and bioengineering, has made remarkable progress in both the treatment and…”
Get full text
Journal Article