Skip to main content

Page of 44
and
  1. Article

    Open Access

    Artificial intelligence in support of the circular economy: ethical considerations and a path forward

    The world’s current model for economic development is unsustainable. It encourages high levels of resource extraction, consumption, and waste that undermine positive environmental outcomes. Transitioning to a ...

    Huw Roberts, Joyce Zhang, Ben Bariach, Josh Cowls, Ben Gilburt in AI & SOCIETY (2024)

  2. No Access

    Article

    CNN-based ternary tree partition approach for VVC intra-QTMT coding

    In July 2020, the Joint Video Experts Team has published the versatile video coding (VVC) standard. The VVC encoder enhances the coding efficiency compared with his predecessor high-efficiency video coding enc...

    Fatma Belghith, Bouthaina Abdallah, Sonda Ben Jdidia in Signal, Image and Video Processing (2024)

  3. No Access

    Article

    A Real-time Multimodal Intelligent Tutoring Emotion Recognition System (MITERS)

    Emotion recognition can be used in a wide range of applications. We are interested in the E-learning system because of the several benefits of learning anywhere and anytime. Despite important advances, student...

    Nouha Khediri, Mohamed Ben Ammar, Monji Kherallah in Multimedia Tools and Applications (2024)

  4. No Access

    Article

    Improved clustering-based hybrid recommendation system to offer personalized cloud services

    The ever-increasing number of cloud services has led to the service’s identification problem. It has become difficult to provide users with cloud services that meet their functional and non-functional requirem...

    Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor in Cluster Computing (2024)

  5. No Access

    Article

    Data as the next challenge in atomistic machine learning

    As machine learning models are becoming mainstream tools for molecular and materials research, there is an urgent need to improve the nature, quality, and accessibility of atomistic data. In turn, there are op...

    Chiheb Ben Mahmoud, John L. A. Gardner, Volker L. Deringer in Nature Computational Science (2024)

  6. No Access

    Article

    Monitoring and analyzing as a service (MAaaS) through cloud edge based on intelligent transportation applications

    Recent advances in smart connected vehicles and intelligent transportation systems are based on the collection and processing of massive amounts of sensor data. There are various internal sensors integrated in...

    Olfa Souki, Raoudha Ben Djemaa, Ikram Amous, Florence Sedes in Cluster Computing (2024)

  7. Article

    Open Access

    Bringing the field into the lab: a novel virtual reality outdoor march simulator for evaluating cognitive and physical performance

    Soldiers, athletes, and rescue personnel must often maintain cognitive focus while performing intense, prolonged, and physically demanding activities. The simultaneous activation of cognitive and physical func...

    Shani Kimel Naor, Itay Ketko, Ran Yanovich, Amihai Gottlieb, Yotam Bahat in Virtual Reality (2024)

  8. No Access

    Article

    BTS-ADCNN: brain tumor segmentation based on rapid anisotropic diffusion function combined with convolutional neural network using MR images

    Brain cancer is a fatal and debilitating condition that has a profoundly negative impact on patients' lives. Therefore, early diagnosis of brain tumors enhances the effectiveness of treatment and raises patien...

    Zouhair Mbarki, Amine Ben Slama, Yessine Amri in The Journal of Supercomputing (2024)

  9. Article

    Open Access

    The analysis of diversification properties of stablecoins through the Shannon entropy measure

    The common goal for investors is to minimise the risk and maximise the returns on their investments. This is often achieved through diversification, where investors spread their investments across various asse...

    Mohavia Ben Amid Sinon, Jules Clement Mba in Knowledge and Information Systems (2024)

  10. No Access

    Article

    On the impact of multi-dimensional local differential privacy on fairness

    Automated decision systems are increasingly used to make consequential decisions in people’s lives. Due to the sensitivity of the manipulated data and the resulting decisions, several ethical concerns need to ...

    Karima Makhlouf, Héber H. Arcolezi, Sami Zhioua in Data Mining and Knowledge Discovery (2024)

  11. No Access

    Article

    A Genetic Algorithm-based approach for placement in the fog of latency-sensitive multiplayer game servers

    First-Person Shooter (FPS) games are among the most popular latency-sensitive multiplayer online games. A separate game server manages each multiplayer group hosted appropriately to meet the given Quality of Serv...

    Amira-Rayane Benamer, Nejib Ben Hadj-Alouane, Khaled Boussetta in Cluster Computing (2024)

  12. No Access

    Article

    A comprehensive view of community detection approaches in multilayer social networks

    Multilayer social networks are the main representative form for today’s social networks. In fact, the multiplicity of relations, the huge amount of data and the dynamic nature of nowadays social networks impos...

    Imen Hamed, Wala Rebhi, Narjes Bellamine Ben Saoud in Social Network Analysis and Mining (2024)

  13. No Access

    Article

    FPGA-based implementation of the VVC low-frequency non-separable transform

    The Versatile Video Coding (VVC) standard, released in July 2020, brings better coding performance than the High-Efficiency Video Coding (HEVC) thanks to the introduction of new coding tools. The transform mod...

    Fatma Belghith, Sonda Ben Jdidia in Journal of Real-Time Image Processing (2024)

  14. No Access

    Article

    Advancing spatial map** for satellite image road segmentation with multi-head attention

    Remote sensing imaging is an interesting field, particularly in road areas. Road segmentation has become crucial in several areas, such as transportation network optimization, urban planning, and image analysi...

    Khawla Ben Salah, Mohamed Othmani, Jihen Fourati, Monji Kherallah in The Visual Computer (2024)

  15. No Access

    Article

    Trustworthy decentralization based on blockchain tools for social network architectures

    The rise of decentralized social networks (DSNs) necessitates robust trust models to ensure secure and reliable interactions in an increasingly dynamic online environment. While blockchain technology has revo...

    Fatma Mlika, Wafa Karoui, Lotfi Ben Romdhane in Social Network Analysis and Mining (2024)

  16. No Access

    Article

    Dynamic sensor fault detection approach using data-driven techniques

    Sensor fault detection is an important phase for process surveillance. Indeed, successful execution of process tasks depends on the state of the available data. In industrial applications, systems have an unce...

    Imen Hamrouni, Khaoula Ben Abdellafou, Majed Aborokbah in Neural Computing and Applications (2024)

  17. No Access

    Article

    A blockchain-based security system with light cryptography for user authentication security

    Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology, healthcare, and other security concerns. Safety concerns cu...

    Imen Hagui, Amina Msolli, Noura ben Henda in Multimedia Tools and Applications (2024)

  18. No Access

    Article

    Doc-Attentive-GAN: attentive GAN for historical document denoising

    Image denoising attempts to restore images that have been degraded. Historical document denoising is specially challenging because there is considerable background noise or variation in contrast and illuminati...

    Hala Neji, Mohamed Ben Halima, Javier Nogueras-Iso in Multimedia Tools and Applications (2024)

  19. Article

    Open Access

    Performance prediction in online academic course: a deep learning approach with time series imaging

    With the COVID-19 outbreak, schools and universities have massively adopted online learning to ensure the continuation of the learning process. However, in such setting, instructors lack efficient mechanisms t...

    Ahmed Ben Said, Abdel-Salam G. Abdel-Salam in Multimedia Tools and Applications (2024)

  20. No Access

    Article

    Assessment of data augmentation, dropout with L2 Regularization and differential privacy against membership inference attacks

    Machine learning (ML) has revolutionized various industries, but concerns about privacy and security have emerged as significant challenges. Membership inference attacks (MIAs) pose a serious threat by attempt...

    Sana Ben Hamida, Hichem Mrabet, Faten Chaieb in Multimedia Tools and Applications (2024)

Page of 44