Skip to main content

previous disabled Page of 53
and
  1. No Access

    Article

    Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web measurements. Most such measurements however are limited to t...

    Zubair Ahmad, Stefano Calzavara in International Journal of Information Secur… (2024)

  2. No Access

    Article

    Recognizing text lines in handwritten archival document images using octave convolutional and attention recurrent neural networks

    Over the past several years, many archivists and historians have pointed out growing needs closely related to robust and efficient offline handwritten text recognition systems able to assist them in transcribi...

    Olfa Mechi, Maroua Mehri, Rolf Ingold in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Vision transformer based convolutional neural network for breast cancer histopathological images classification

    Breast cancer (BC) is a widespread and lethal cancer affecting women world- wide. Early diagnosis plays a pivotal role in ensuring survival, as late detection can result in a fatal outcome. Convolutional neura...

    Mouhamed Laid ABIMOULOUD, Khaled BENSID in Multimedia Tools and Applications (2024)

  4. No Access

    Article

    MP3 Audio watermarking using calibrated side information features for tamper detection and localization

    Audio contents are frequently stocked up and transmitted in compressed formats. Among the many existing audio compression schemes, MPEG-1 Audio Layer III (MP3) is very popular and still widely spread. Therefor...

    Salma Masmoudi, Maha Charfeddine, Chokri Ben Amar in Multimedia Tools and Applications (2024)

  5. No Access

    Article

    Assessing topic-based users credibility in twitter

    Online Social Networks (OSN) have become an inevitable source of information. Every user in OSNs can share true or false information regardless of their knowledge. False information can cause damage to people,...

    Amna Meddeb, Lotfi Ben Romdhane in Multimedia Tools and Applications (2024)

  6. Article

    Open Access

    Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems

    The recent widespread of AI-powered real-time applications necessitates the use of edge computing for inference task offloading. Power constrained edge devices are required to balance between processing infere...

    Abdelkarim Ben Sada, Amar Khelloufi, Abdenacer Naouri, Huansheng Ning in Cluster Computing (2024)

  7. Article

    Correction: Improved clustering-based hybrid recommendation system to offer personalized cloud services

    Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor in Cluster Computing (2024)

  8. No Access

    Article

    A Real-time Multimodal Intelligent Tutoring Emotion Recognition System (MITERS)

    Emotion recognition can be used in a wide range of applications. We are interested in the E-learning system because of the several benefits of learning anywhere and anytime. Despite important advances, student...

    Nouha Khediri, Mohamed Ben Ammar, Monji Kherallah in Multimedia Tools and Applications (2024)

  9. No Access

    Article

    Improved clustering-based hybrid recommendation system to offer personalized cloud services

    The ever-increasing number of cloud services has led to the service’s identification problem. It has become difficult to provide users with cloud services that meet their functional and non-functional requirem...

    Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor in Cluster Computing (2024)

  10. No Access

    Article

    Monitoring and analyzing as a service (MAaaS) through cloud edge based on intelligent transportation applications

    Recent advances in smart connected vehicles and intelligent transportation systems are based on the collection and processing of massive amounts of sensor data. There are various internal sensors integrated in...

    Olfa Souki, Raoudha Ben Djemaa, Ikram Amous, Florence Sedes in Cluster Computing (2024)

  11. No Access

    Article

    A Genetic Algorithm-based approach for placement in the fog of latency-sensitive multiplayer game servers

    First-Person Shooter (FPS) games are among the most popular latency-sensitive multiplayer online games. A separate game server manages each multiplayer group hosted appropriately to meet the given Quality of Serv...

    Amira-Rayane Benamer, Nejib Ben Hadj-Alouane, Khaled Boussetta in Cluster Computing (2024)

  12. No Access

    Article

    A blockchain-based security system with light cryptography for user authentication security

    Nowadays, the Internet of Things (IoT) enables the creation of a wide range of new services, including smart cities, agriculture, energy, technology, healthcare, and other security concerns. Safety concerns cu...

    Imen Hagui, Amina Msolli, Noura ben Henda in Multimedia Tools and Applications (2024)

  13. No Access

    Article

    Doc-Attentive-GAN: attentive GAN for historical document denoising

    Image denoising attempts to restore images that have been degraded. Historical document denoising is specially challenging because there is considerable background noise or variation in contrast and illuminati...

    Hala Neji, Mohamed Ben Halima, Javier Nogueras-Iso in Multimedia Tools and Applications (2024)

  14. Article

    Open Access

    Performance prediction in online academic course: a deep learning approach with time series imaging

    With the COVID-19 outbreak, schools and universities have massively adopted online learning to ensure the continuation of the learning process. However, in such setting, instructors lack efficient mechanisms t...

    Ahmed Ben Said, Abdel-Salam G. Abdel-Salam in Multimedia Tools and Applications (2024)

  15. No Access

    Article

    Assessment of data augmentation, dropout with L2 Regularization and differential privacy against membership inference attacks

    Machine learning (ML) has revolutionized various industries, but concerns about privacy and security have emerged as significant challenges. Membership inference attacks (MIAs) pose a serious threat by attempt...

    Sana Ben Hamida, Hichem Mrabet, Faten Chaieb in Multimedia Tools and Applications (2024)

  16. No Access

    Article

    Inter prediction multiple reference frames impact on H266-VVC encoder

    This paper presents Inter prediction Multiple Reference Frames Impact on H266-versitele video coding (VVC) encoder. Video compression plays a crucial role in storing and transmitting video content. Recent deve...

    Rana Jassem, Taheni Damak, Mohamed Ali Ben Ayed in Multimedia Tools and Applications (2024)

  17. No Access

    Article

    A novel IoT-based deep neural network for COVID-19 detection using a soft-attention mechanism

    Learning models from COVID-19 data are conducive to understand this disease. However, the scarcity of labeled data presents certain challenges. Previous works have exploited existing deep neural network models...

    Zeineb Fki, Boudour Ammar, Rahma Fourati, Hela Fendri in Multimedia Tools and Applications (2024)

  18. Article

    Open Access

    Efficient fog node placement using nature-inspired metaheuristic for IoT applications

    Managing the explosion of data from the edge to the cloud requires intelligent supervision, such as fog node deployments, which is an essential task to assess network operability. To ensure network operability...

    Abdenacer Naouri, Nabil Abdelkader Nouri, Amar Khelloufi in Cluster Computing (2024)

  19. No Access

    Article

    Exploring the integration of blockchain technology, physical unclonable function, and machine learning for authentication in cyber-physical systems

    In this rapidly advancing era, technology has been progressing extensively and swiftly. As a result, the emergence of numerous Cyber-Physical Systems (CPS) has become imperative to meet the technological deman...

    Hind A. Al-Ghuraybi, Mohammed A. AlZain, Ben Soh in Multimedia Tools and Applications (2024)

  20. No Access

    Article

    Ensuring authentication in Medical Cyber-Physical Systems: A comprehensive literature review of blockchain technology integration with machine learning

    Medical Cyber-Physical Systems (MCPS) are increasingly prevalent in an era of rapid technological advancement. They hold significant importance for patients and healthcare professionals, as they leverage cyber...

    Hind A. Al-Ghuraybi, Mohammed A. AlZain, Ben Soh in Multimedia Tools and Applications (2024)

previous disabled Page of 53