Skip to main content

previous disabled Page of 44
and
  1. No Access

    Article

    Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web measurements. Most such measurements however are limited to t...

    Zubair Ahmad, Stefano Calzavara in International Journal of Information Secur… (2024)

  2. No Access

    Article

    Recognizing text lines in handwritten archival document images using octave convolutional and attention recurrent neural networks

    Over the past several years, many archivists and historians have pointed out growing needs closely related to robust and efficient offline handwritten text recognition systems able to assist them in transcribi...

    Olfa Mechi, Maroua Mehri, Rolf Ingold in Multimedia Tools and Applications (2024)

  3. Article

    Open Access

    Towards a generic agent-based vector-host model: effects of carrying capacity and host mobility

    The aim of our work is to develop a generic conceptual agent-based model to formalize the interaction of vector and host given climate change. The model consists in creating a hypothetical example of a vector-...

    Cyrine Chenaoui, Nicolas Marilleau, Slimane Ben Miled in Applied Network Science (2024)

  4. No Access

    Article

    Pruning Deep Neural Networks for Green Energy-Efficient Models: A Survey

    Over the past few years, larger and deeper neural network models, particularly convolutional neural networks (CNNs), have consistently advanced state-of-the-art performance across various disciplines. Yet, the...

    Jihene Tmamna, Emna Ben Ayed, Rahma Fourati, Mandar Gogate in Cognitive Computation (2024)

  5. Article

    Open Access

    Journal self-citations trends in sport sciences: an analysis of disciplinary journals from 2013 to 2022

    This study reports on the yearly rate of journal self-citation (JSC) in sport sciences, how it changes over time, and its association with journal impact factor (JIF). Citations made by all 87 journals in “spo...

    Hunter Bennett, Ben Singh, Flynn Slattery in Scientometrics (2024)

  6. No Access

    Article

    Vision transformer based convolutional neural network for breast cancer histopathological images classification

    Breast cancer (BC) is a widespread and lethal cancer affecting women world- wide. Early diagnosis plays a pivotal role in ensuring survival, as late detection can result in a fatal outcome. Convolutional neura...

    Mouhamed Laid ABIMOULOUD, Khaled BENSID in Multimedia Tools and Applications (2024)

  7. No Access

    Article

    Unmasking GAN-Generated Faces with Optimal Deep Learning and Cognitive Computing-Based Cutting-Edge Detection System

    The emergence of deep learning (DL) has improved the excellence of generated media. However, with the enlarged level of photorealism, synthetic media is becoming very similar to tangible media, increasing seve...

    Rana Alabdan, Jamal Alsamri, Siwar Ben Haj Hassine in Cognitive Computation (2024)

  8. Article

    Retraction Note: Noise-estimation-based anisotropic diffusion approach for retinal blood vessel segmentation

    Mariem Ben Abdallah, Ahmad Taher Azar, Hichem Guedri in Neural Computing and Applications (2024)

  9. Article

    Correction: Machine learning models for modeling the biosorption of Fe(III) ions by activated carbon from olive stone

    Ayman Massaoudi, Fraj Echouchene, Mossaad Ben Ayed in Neural Computing and Applications (2024)

  10. No Access

    Article

    Automatic and manual prediction of epileptic seizures based on ECG

    This study presents a new attempt to quantify and predict changes in the ECG signal in the pre-ictal period. In the proposed approach, threshold techniques were applied to the standard deviation of two heart r...

    Manef Ben Mbarek, Ines Assali, Salah Hamdi in Signal, Image and Video Processing (2024)

  11. No Access

    Article

    Machine learning models for modeling the biosorption of Fe(III) ions by activated carbon from olive stone

    Using experimental results related to the biosorption of Fe(III) by activated carbon derived from olive pit waste, we developed and evaluated four artificial neural network (ANN) models in this study, namely M...

    Ayman Massaoudi, Fraj Echouchene, Mossaad Ben Ayed in Neural Computing and Applications (2024)

  12. No Access

    Article

    Traffic flow management by detecting and estimating vehicles density based on object detection model

    The huge growth in the number of vehicles is causing serious traffic management problems. Existing roads must handle traffic more than expected which presents serious challenges including congestion and safety...

    Yahia Said, Yahya Alassaf, Yazan Alsariera in Neural Computing and Applications (2024)

  13. No Access

    Article

    MP3 Audio watermarking using calibrated side information features for tamper detection and localization

    Audio contents are frequently stocked up and transmitted in compressed formats. Among the many existing audio compression schemes, MPEG-1 Audio Layer III (MP3) is very popular and still widely spread. Therefor...

    Salma Masmoudi, Maha Charfeddine, Chokri Ben Amar in Multimedia Tools and Applications (2024)

  14. No Access

    Article

    Assessing topic-based users credibility in twitter

    Online Social Networks (OSN) have become an inevitable source of information. Every user in OSNs can share true or false information regardless of their knowledge. False information can cause damage to people,...

    Amna Meddeb, Lotfi Ben Romdhane in Multimedia Tools and Applications (2024)

  15. No Access

    Article

    Twit-CoFiD: a hybrid recommender system based on tweet sentiment analysis

    Internet users are overwhelmed by the vast number of services and products to choose from. This data deluge has led to the need for recommender systems. Simultaneously, the explosion of interactions on social ...

    Jihene Latrech, Zahra Kodia, Nadia Ben Azzouna in Social Network Analysis and Mining (2024)

  16. No Access

    Article

    Multi-head multi-order graph attention networks

    The Graph Attention Network (GAT) is a type of graph neural network (GNN) that uses attention mechanisms to weigh the importance of nodes’ neighbors, demonstrating flexibility and power in representation learn...

    Jie Ben, Qiguo Sun, Keyu Liu, **bei Yang, Fengjun Zhang in Applied Intelligence (2024)

  17. No Access

    Article

    A formal model-based approach to design failure-aware Internet of Things architectures

    The Internet of Things (IoT) is expanding its application domains and deployments due to its rapid development. Within such architectures, ensuring reliability and fault tolerance becomes a critical considerat...

    Imene Ben Hafaiedh, Amani Elaoud in Journal of Reliable Intelligent Environmen… (2024)

  18. Article

    Open Access

    Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems

    The recent widespread of AI-powered real-time applications necessitates the use of edge computing for inference task offloading. Power constrained edge devices are required to balance between processing infere...

    Abdelkarim Ben Sada, Amar Khelloufi, Abdenacer Naouri, Huansheng Ning in Cluster Computing (2024)

  19. No Access

    Article

    A review on kinship verification from facial information

    Kinship verification is a challenging computer vision task that aims to mainly answer the question: “Are these two persons blood relatives?”. It is an important area of research with many applications, includi...

    Mohamed Charfeddine Mzoughi, Najib Ben Aoun, Sami Naouali in The Visual Computer (2024)

  20. Article

    Correction: Improved clustering-based hybrid recommendation system to offer personalized cloud services

    Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor in Cluster Computing (2024)

previous disabled Page of 44