Skip to main content

and
  1. No Access

    Article

    Video watermarking technique using motion vectors to video authentication

    With the increase in the number of communication networks and digital multimedia technologies, ensuring the confidentiality of information has become increasingly important. Digital watermarking and scrambling...

    Salah Dhahri, Tarek Moulahi in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Effects of dataset attacks on machine learning models in e-health

    E-health is a modern technology produced with the evolution and amalgamation of modern technologies such as the Internet of things (IoT) and machine learning (ML). The exploitation of efficient and suitable ML...

    Tarek Moulahi, Salim El Khediri, Durre Nayab in Annals of Telecommunications (2023)

  3. No Access

    Chapter and Conference Paper

    Reliable Framework for Digital Forensics in Medical Internet of Things

    Medical Internet of Things (MIoT) involves the use of connected devices and sensors. These devices can include wearable health monitors, smart medical devices, implantable sensors, and remote monitoring system...

    Ines Rahmany, Rihab Saidi, Tarek Moulahi in Advances in Computational Collective Intel… (2023)

  4. No Access

    Article

    Study on QoS Management for Video Streaming in Vehicular Ad Hoc Network (VANET)

    Vehicular Ad Hoc Network (VANET) is a particular type of MANET providing various wireless communications such as infrastructure communications and inter-vehicle communications. Recently, VANET networks are att...

    Bechir Alaya, Rehanullah Khan, Tarek Moulahi in Wireless Personal Communications (2021)

  5. No Access

    Article

    QoS evaluation model based on intelligent fuzzy system for vehicular ad hoc networks

    Supporting the Quality of Service (QoS) for broadcasting techniques in Vehicular Ad hoc NETetworks (VANETs) is a primordial concern. Qualitatively, QoS is an aspect reflecting the network performance, but quan...

    Abir Mchergui, Tarek Moulahi, Salem Nasri in Computing (2020)

  6. No Access

    Article

    Enhancing VANETs Broadcasting Performance with Mobility Prediction for Smart Road

    In the last decade, daily lifestyles have been invaded by mobile networks which added a huge exchange of information. This exchange among vehicular nodes as a novel paradigm in smart cities, rapidly became one...

    Abir Mchergui, Tarek Moulahi, Mohamed Tahar Ben Othman in Wireless Personal Communications (2020)

  7. No Access

    Article

    Construction of a stable vehicular ad hoc network based on hybrid genetic algorithm

    In vehicular ad hoc networks, the vehicle speed can exceed 120 kmph. Therefore, any node can enter or leave the network within a very short time. This mobility adversely affects the network connectivity and de...

    Rejab Hajlaoui, Eesa Alsolami, Tarek Moulahi, Hervé Guyennet in Telecommunication Systems (2019)

  8. Chapter and Conference Paper

    A Scatter Search Based Heuristic for Reliable Clustering in Vehicular Ad Hoc Networks

    Achieving a safe, comfort and autonomous driving in vehicular ad hoc networks (VANET) is the great interest of a large number of researchers and car manufacturers. Despite the variety of the proposed approach...

    Rejab Hajlaoui, Tarek Moulahi in Artificial Intelligence Applications and I… (2018)

  9. No Access

    Article

    A survey and comparative study of QoS aware broadcasting techniques in VANET

    Vehicular ad hoc networks are a special type of MANET providing vehicle to vehicle and vehicle to roadside wireless communications. Vehicular ad-hoc network (VANET) have been designed in order to assist driver...

    Abir Mchergui, Tarek Moulahi, Bechir Alaya, Salem Nasri in Telecommunication Systems (2017)

  10. No Access

    Article

    Securing data exchange in wireless multimedia sensor networks: perspectives and challenges

    The emerging use of Wireless Multimedia Sensor Networks (WMSNs) and communication facilities have increased the need for network security measures to protect different types of multimedia data either real time...

    Musab Ghadi, Lamri Laouamer, Tarek Moulahi in Multimedia Tools and Applications (2016)