Skip to main content

and
  1. No Access

    Book

  2. Article

    Open Access

    FireXnet: an explainable AI-based tailored deep learning model for wildfire detection on resource-constrained devices

    Forests cover nearly one-third of the Earth’s land and are some of our most biodiverse ecosystems. Due to climate change, these essential habitats are endangered by increasing wildfires. Wildfires are not just...

    Khubab Ahmad, Muhammad Shahbaz Khan, Fawad Ahmed, Maha Driss, Wadii Boulila in Fire Ecology (2023)

  3. No Access

    Chapter and Conference Paper

    LSTM-Based QoE Evaluation for Web Microservices’ Reputation Scoring

    Sentiment analysis is the task of mining the authors’ opinions about specific entities. It allows organizations to monitor different services in real time and act accordingly. Reputation is what is generally s...

    Maha Driss in Advances in Computational Collective Intelligence (2023)

  4. Article

    Open Access

    A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations

    Medical images possess significant importance in diagnostics when it comes to healthcare systems. These images contain confidential and sensitive information such as patients’ X-rays, ultrasounds, computed tom...

    Fawad Masood, Maha Driss, Wadii Boulila, Jawad Ahmad in Wireless Personal Communications (2022)

  5. Article

    Open Access

    A federated learning framework for cyberattack detection in vehicular sensor networks

    Vehicular Sensor Networks (VSN) introduced a new paradigm for modern transportation systems by improving traffic management and comfort. However, the increasing adoption of smart sensing technologies with the ...

    Maha Driss, Iman Almomani, Zil e Huma, Jawad Ahmad in Complex & Intelligent Systems (2022)

  6. No Access

    Article

    Req-WSComposer: a novel platform for requirements-driven composition of semantic web services

    Service-Oriented Computing (SOC) describes a specific paradigm of computing that utilizes Web services as reusable components in order to develop new software applications. SOC allows distributed applications ...

    Maha Driss, Safa Ben Atitallah in Journal of Ambient Intelligence and Humani… (2022)

  7. No Access

    Chapter and Conference Paper

    An Effective Detection and Classification Approach for DoS Attacks in Wireless Sensor Networks Using Deep Transfer Learning Models and Majority Voting

    The Internet of Things (IoT) has been used in various critical fields, including healthcare, elderly surveillance, autonomous transportation, and energy management. As a result of its emergence, several IoT-ba...

    Safa Ben Atitallah, Maha Driss in Advances in Computational Collective Intel… (2022)

  8. No Access

    Chapter and Conference Paper

    Automatic Saudi Arabian License Plate Detection and Recognition Using Deep Convolutional Neural Networks

    Automatic License Plate (LP) detection and recognition algorithms have become a necessity for intelligent transportation systems due to their efficiency in multiple applications such as parking control and tra...

    Maha Driss, Iman Almomani, Rahaf Al-Suhaimi in Advances on Intelligent Informatics and Co… (2022)

  9. No Access

    Chapter and Conference Paper

    Towards Optimizing Malware Detection: An Approach Based on Generative Adversarial Networks and Transformers

    Nowadays, cybercriminals are carrying out many forms of cyberattacks. Malware attacks, in particular, have emerged as one of the most challenging concerns in the cybersecurity area, as well as a key weapon use...

    Ayyub Alzahem, Wadii Boulila, Maha Driss in Computational Collective Intelligence (2022)

  10. No Access

    Chapter and Conference Paper

    Weight Initialization Techniques for Deep Learning Algorithms in Remote Sensing: Recent Trends and Future Perspectives

    During the last decade, several research works have focused on providing novel deep learning methods in many application fields. However, few of them have investigated the weight initialization process for dee...

    Wadii Boulila, Maha Driss, Eman Alshanqiti in Advances on Smart and Soft Computing (2022)

  11. No Access

    Chapter and Conference Paper

    Voting Classifier-Based Intrusion Detection for IoT Networks

    Internet of Things (IoT) is transforming human lives by paving the way for the management of physical devices on the edge. These interconnected IoT objects share data for remote accessibility and can be vulner...

    Muhammad Almas Khan, Muazzam A. Khan Khattk in Advances on Smart and Soft Computing (2022)

  12. No Access

    Article

    WS-ADVISING: a Reusable and reconfigurable microservices‐based platform for effective academic advising

    Academic advising is essential for students’ success at the university level. This paper proposes a reusable and reconfigurable microservices-based platform called WS-ADVISING as a means of supporting effectiv...

    Maha Driss in Journal of Ambient Intelligence and Humanized Computing (2022)

  13. No Access

    Article

    Association between HER2 and IL-6 genes polymorphisms and clinicopathological characteristics of breast cancer: significant role of genetic variability in specific breast cancer subtype

    Clinical implications of single nucleotide polymorphisms (SNPs) in breast cancer have been explored to determine the impact of SNP in modulating the pathogenesis of breast cancer. This study aimed to evaluate ...

    Om Elez Bouhniz, Sonia Zaied, Lamia Naija in Clinical and Experimental Medicine (2020)

  14. No Access

    Article

    Prognostic factors of ALK-negative anaplastic large-cell lymphoma: a single-institution experience

    Raoudha Doghri, Linda Bel HadjKacem, Yoldez Houcine, Lamia Charfi in Annals of Hematology (2018)

  15. Article

    The role of the Notch pathway in healthy and osteoarthritic articular cartilage: from experimental models to ex vivo studies

    Osteoarthritis is the most prevalent form of arthritis in the world. With the progressive ageing of the population, it is becoming a major public health problem. The involvement of certain signaling pathways, ...

    Nadia Sassi, Lilia Laadhar, Maha Driss in Arthritis Research & Therapy (2011)

  16. No Access

    Chapter

    Analytical Quality Assurance

    As we described in Chapter 1, Services are often provisioned within short-term, volatile and highly dynamic (business) processes. These processes are designed in an abstract manner and when instantiated can in...

    Andreas Metzger, Salima Benbernou in Service Research Challenges and Solutions … (2010)

  17. Chapter and Conference Paper

    A Requirement-Centric Approach to Web Service Modeling, Discovery, and Selection

    Service-Oriented Computing (SOC) has gained considerable popularity for implementing Service-Based Applications (SBAs) in a flexible and effective manner. The basic idea of SOC is to understand users’ requirem...

    Maha Driss, Naouel Moha, Yassine Jamoussi, Jean-Marc Jézéquel in Service-Oriented Computing (2010)

  18. No Access

    Article

    Cotyledonoid dissecting leiomyoma of the uterus associated with endosal**iosis

    Cotyledonoid dissecting leiomyoma (CDL) may create a diagnostic challenge. A 47-year-old woman underwent laparotomy for a large pelvic mass associated to vaginal bleeding. During operation, a bulky deep red ma...

    Maha Driss, Fethi Zhioua, Raoudha Doghri in Archives of Gynecology and Obstetrics (2009)

  19. No Access

    Article

    Lymphoepithelioma-like carcinoma of the submandibular salivary gland associated with Epstein–Barr virus in a North African woman

    Karima Mrad, Ehsen Ben Brahim, Maha Driss, Imene Abbes, Mounir Marakchi in Virchows Archiv (2004)