Skip to main content

previous disabled Page of 2
and
  1. No Access

    Book and Conference Proceedings

    Model and Data Engineering

    12th International Conference, MEDI 2023, Sousse, Tunisia, November 2–4, 2023, Proceedings

    Mohamed Mosbah, Tahar Kechadi in Lecture Notes in Computer Science (2024)

  2. No Access

    Book and Conference Proceedings

    Advances in Model and Data Engineering in the Digitalization Era

    MEDI 2023 Short and Workshop Papers, Sousse, Tunisia, November 2–4, 2023, Proceedings

    Mohamed Mosbah, Tahar Kechadi in Communications in Computer and Information Science (2024)

  3. No Access

    Chapter and Conference Paper

    OAK4XAI: Model Towards Out-of-Box eXplainable Artificial Intelligence for Digital Agriculture

    Recent machine learning approaches have been effective in Artificial Intelligence (AI) applications. They produce robust results with a high level of accuracy. However, most of these techniques do not provide ...

    Quoc Hung Ngo, Tahar Kechadi, Nhien-An Le-Khac in Artificial Intelligence XXXIX (2022)

  4. No Access

    Chapter and Conference Paper

    A Novel Validation Framework to Assess Segmentation Accuracy of Inertial Sensor Data for Rehabilitation Exercises

    Digital biofeedback systems (DBS) which use inertial measurement units (IMUs) can support patients during home rehabilitation. Models which accurately segment IMU data for rehabilitation exercises are required...

    Louise Brennan, Antonio Bevilacqua in 8th European Medical and Biological Engine… (2021)

  5. No Access

    Chapter and Conference Paper

    Historical Weather Data Recovery and Estimation

    In order to make efficient decisions in agriculture, it is imperative to analyse the weather data collected from various sources. These data are generated by automated weather stations. Unfortunately, weather ...

    Fadoua Rafii, Tahar Kechadi in Innovations in Smart Cities Applications Edition 3 (2020)

  6. No Access

    Chapter and Conference Paper

    OAK: Ontology-Based Knowledge Map Model for Digital Agriculture

    Nowadays, a huge amount of knowledge has been amassed in digital agriculture. This knowledge and know-how information are collected from various sources, hence the question is how to organise this knowledge s...

    Quoc Hung Ngo, Tahar Kechadi, Nhien-An Le-Khac in Future Data and Security Engineering (2020)

  7. Chapter and Conference Paper

    Prediction of Frequent Out-Of-Hours’ Medical Use

    The thesis of this research is that through the mining of Electronic Medical Records containing mixed types of data, and extracting patterns from the processed data, patients can be successfully categorised t...

    Duncan Wallace, Tahar Kechadi in Machine Learning and Knowledge Discovery in Databases (2020)

  8. No Access

    Chapter and Conference Paper

    Predicting Soil pH by Using Nearest Fields

    In precision agriculture (PA), soil sampling and testing operation is prior to planting any new crop. It is an expensive operation since there are many soil characteristics to take into account. This paper giv...

    Quoc Hung Ngo, Nhien-An Le-Khac, Tahar Kechadi in Artificial Intelligence XXXVI (2019)

  9. Chapter and Conference Paper

    Human Activity Recognition with Convolutional Neural Networks

    The problem of automatic identification of physical activities performed by human subjects is referred to as Human Activity Recognition (HAR). There exist several techniques to measure motion characteristics d...

    Antonio Bevilacqua, Kyle MacDonald in Machine Learning and Knowledge Discovery i… (2019)

  10. No Access

    Article

    Scalability-aware mechanism based on workload prediction in ultra-peer networks

    Ultra-peers networks are emergent architectures in large-scale distributed computing environments. Controlling the workload is essential since the system scales up rapidly and accommodates a dynamic change in ...

    Nabila Chergui, Tahar Kechadi, Salim Chikhi in Peer-to-Peer Networking and Applications (2018)

  11. No Access

    Chapter and Conference Paper

    A Forecasting Model for Data Center Bandwidth Utilization

    Bandwidth optimization and its efficient utilization is more challenging in operating data centers. Our model can assist for proper usage of resource utilization and accommodate large scale of bursty data. In ...

    Samar Raza Talpur, Tahar Kechadi in Proceedings of SAI Intelligent Systems Con… (2018)

  12. Chapter and Conference Paper

    Internet of Things Forensics – Challenges and a Case Study

    During this era of the Internet of Things, millions of devices such as automobiles, smoke detectors, watches, glasses and webcams are being connected to the Internet. The number of devices with the ability of ...

    Saad Alabdulsalam, Kevin Schaefer, Tahar Kechadi in Advances in Digital Forensics XIV (2018)

  13. No Access

    Chapter and Conference Paper

    Ontology Based Approach for Precision Agriculture

    In this paper, we propose a framework of knowledge for an agriculture ontology which can be used for the purpose of smart agriculture systems. This ontology not only includes basic concepts in the agricultural...

    Quoc Hung Ngo, Nhien-An Le-Khac in Multi-disciplinary Trends in Artificial In… (2018)

  14. No Access

    Article

    ELM-based spammer detection in social networks

    Online social networks, such as Facebook, Twitter, and Weibo have played an important role in people’s common life. Most existing social network platforms, however, face the challenges of dealing with undesira...

    **anghan Zheng, Xueying Zhang, Yuanlong Yu, Tahar Kechadi in The Journal of Supercomputing (2016)

  15. No Access

    Chapter and Conference Paper

    Digital Evidence Bag Selection for P2P Network Investigation

    The collection and handling of court admissible evidence is a fundamental component of any digital forensic investigation. While the procedures for handling digital evidence take much of their influence from t...

    Mark Scanlon, Tahar Kechadi in Future Information Technology (2014)

  16. Chapter and Conference Paper

    Forensic Analysis of the TomTom Navigation Application

    Exactly where an individual has been is important when attempting to forensically reconstruct an incident. With the advent of portable navigation systems and mobile phones, information about where a person has...

    Nhien-An Le-Khac, Mark Roeloffs, Tahar Kechadi in Advances in Digital Forensics X (2014)

  17. No Access

    Chapter and Conference Paper

    A New Method for Estimation of Missing Data Based on Sampling Methods for Data Mining

    Today we collect large amounts of data and we receive more than we can handle, the accumulated data are often raw and far from being of good quality they contain Missing Values and noise.

    Rima Houari, Ahcéne Bounceur, Tahar Kechadi in Advances in Computational Science, Enginee… (2013)

  18. No Access

    Chapter and Conference Paper

    Peer-to-Peer Botnet Investigation: A Review

    Botnets have become the tool of choice to conduct a number of online attacks, e.g., distributed denial of service (DDoS), malware distribution, email spamming, phishing, advertisement click fraud, brute-force ...

    Mark Scanlon, Tahar Kechadi in Future Information Technology, Application, and Service (2012)

  19. Chapter and Conference Paper

    An Open Framework for Smartphone Evidence Acquisition

    The forensic processes and procedures for performing a bit-for-bit copy of computer memory and media are well established and documented. However, most commercially-available tools for smartphone data acquisit...

    Lamine Aouad, Tahar Kechadi, Justin Trentesaux in Advances in Digital Forensics VIII (2012)

  20. Chapter and Conference Paper

    Key Terms for Service Level Agreements to Support Cloud Forensics

    As cloud adoption grows, the importance of preparing for forensic investigations in cloud environments also grows. A recent survey of digital forensic professionals identified that missing terms and conditions...

    Keyun Ruan, Joshua James, Joe Carthy, Tahar Kechadi in Advances in Digital Forensics VIII (2012)

previous disabled Page of 2