Mohamed Amnai - Academia.edu (original) (raw)
Papers by Mohamed Amnai
The Journal of Supercomputing
International Journal of Electrical and Computer Engineering (IJECE)
Developing countries are faced with social and economic challenges, including the emergence and p... more Developing countries are faced with social and economic challenges, including the emergence and proliferation of slums. Slum detection and localization methods typically rely on regular topographic surveys or on visual identification of high-resolution spatial satellite images, as well as socio-environmental surveys from land surveys and general population censuses. Yet, they consume so much time and effort. To overcome these problems, this paper exploits well-known seven pretrained models using transfer learning approaches such as MobileNets, InceptionV3, NASNetMobile, Xception, VGG16, EfficientNet, and ResNet50, consecutively, on a smaller dataset of medium-resolution satellite imagery. The accuracies obtained from these experiments, respectively, demonstrate that the top three pretrained models achieve 98.78%, 97.9%, and 97.56%. Besides, MobileNets have the smallest memory sizes of 9.1 Mo and the shortest latency of 17.01 s, which can be implemented as needed. The results show th...
2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS)
2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS)
2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS)
2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)
Consumers are increasingly adopting multiple smart "things" connected v... more Consumers are increasingly adopting multiple smart "things" connected via the Internet, such as home appliances, vehicles, and mobile medical equipment, due to the rapid growth of the Internet of Things (IoT). Many of these connections are made possible by IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), a distance vector routing protocol used in IoT networks to build a route to send packets. The diverse nature, as well as the limitations and constraints (Low energy, memory, and storage) of these objects, drive the development of techniques to ensure their safety from malicious attacks. As a result, various approaches to protect the IoT have been designed and developed, however due to the limitations of these methods, they are still insufficient. In this paper an Intrusion Detection System (IDS), based on trust mechanism, was proposed for detecting topology attacks in this sort of environment. The number of identified nodes, energy consumption, memory utilization and the detection time and rate of the IDS were all taken into consideration when evaluating it. We chose Cooja software as the simulator to accomplish this.
International Journal of Advanced Computer Science and Applications
Cloud computing provides on-demand access to a diverse set of remote IT services. It offers a num... more Cloud computing provides on-demand access to a diverse set of remote IT services. It offers a number of advantages over traditional computing methods. These advantages include pay-as-you-go pricing, increased agility and on-demand scalability. It also reduces costs due to increased efficiency and better business continuity. The most significant barrier preventing many businesses from moving to the cloud is the security of crucial data maintained by the cloud provider. The cloud server must have complete access to the data to respond to a client request. That implies the decryption key must be sent to the cloud by the client, which may compromise the confidentiality of data stored in the cloud. One way to allow the cloud to use encrypted data without knowing or decrypting it is homomorphic encryption. In this paper, we focus on improving the Paillier cryptosystem, first by using two protocols that allow the cloud to perform the multiplication of encrypted data and then comparing the two protocols in terms of key size and time.
Lecture notes on data engineering and communications technologies, Oct 14, 2022
International Journal of Interactive Mobile Technologies (iJIM)
The appearance of Edge Computing with the possibility to bring powerful computation servers near ... more The appearance of Edge Computing with the possibility to bring powerful computation servers near the mobile device is a major stepping stone towards better user experience and resource consumption optimization. Due to the Internet of Things invasion that led to the constant demand for communication and computation resources, many issues were imposed in order to deliver a seamless service within an optimized cost of time and energy, since most of the applications nowadays require real response time and rely on a limited battery resource. Therefore, Mobile Edge Computing is the new reliable paradigm in terms of communication and computation consumption by the mobile devices. Mobile Edge Computing rely on computation offloading to surpass cloud-based technologies issues and break the limitations of mobile devices such as computing, storage and battery resources. However, computation offloading is not always the optimal choice to adopt, which makes the offloading decision a crucial part...
International Journal of Electrical and Computer Engineering (IJECE)
The purpose of data integration is to integrate the multiple sources of heterogeneous data availa... more The purpose of data integration is to integrate the multiple sources of heterogeneous data available on the internet, such as text, image, and video. After this stage, the data becomes large. Therefore, it is necessary to analyze the data that can be used for the efficient execution of the query. However, we have problems with solving entities, so it is necessary to use different techniques to analyze and verify the data quality in order to obtain good data management. Then, when we have a single database, we call this mechanism deduplication. To solve the problems above, we propose in this article a method to calculate the similarity between the potential duplicate data. This solution is based on graphics technology to narrow the search field for similar features. Then, a composite mechanism is used to locate the most similar records in our database to improve the quality of the data to make good decisions from heterogeneous sources.
Lecture notes on data engineering and communications technologies, 2022
Journal of Computer and Communications
The data warehouse is the most widely used database structure in many decision support systems ar... more The data warehouse is the most widely used database structure in many decision support systems around the world. This is the reason why a lot of research has been conducted in the literature over the last two decades on their design, refreshment and optimization. The manipulation of hypercubes (cubes) of data is a frequently used operation in the design of multidimensional data warehouses, due to their better adaptation to OLAP (On-Line Analytical Processing). However, the updating of these hypercubes is a very complicated process due mainly to the mass and complexity of the data presented. The purpose of this paper is to present the state of the art of works based on multidimensional modeling using the hypercube as a unit of presentation of data stores. It starts with the base of this process which is the choice of the views (cubes) forming our data warehouse base. The objective of this work is to describe the state of the art of research works dealing with the selection of materialized views in decision support systems.
International Journal of Electrical and Computer Engineering (IJECE)
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep ... more Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraints MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analysed and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposed achieves better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
Understanding human data has been the focus of philosophers and scientists. Social media platform... more Understanding human data has been the focus of philosophers and scientists. Social media platforms encourage people to be creative and share their personal information. By analyzing data, we will be able to identify people's personalities and information that is also important to specific profils. The aim of this paper is to propose an approach that predicts the next word during writing a sentence based on the user's personality. To achieve this goal, our approach is illustrated by two points: (1) An approximate extraction of the Big Five model for a specific user from his tweets. (2) Predicting the next word while a user is writing a new tweet depends on his personality using the Markov Chain Model. On the basis of these two notions, our approach makes writing posts easier by predicting and suggesting next words based on the user's personality. Experience represents the ease of predicting the next word during the writing of a new post related to individual potential.
Journal of ICT Standardization
Because of the numerous applications domains in which social media networks can be used, the huge... more Because of the numerous applications domains in which social media networks can be used, the huge volume of data and information uploaded by them is gaining significant interest. Publishing allows consumers to express their thoughts on products and services. Some feedbacks could also influence other users on those things. Therefore, extracting and identifying influencers from social media networks, also profiling their product perceptions and preferences, is critical for marketers to use efficient viral marketing and recommendation strategies. Our major goal in this research is to find the best machine learning model for characterizing influencers on social media networks. However, to achieve this objective, our strategy revolves around applying the PageRank algorithm to profile influential nodes throughout the social media network graph. The results of our experiment showed that the correlation is always different when adding a new parameter to machine learning models, also to dete...
Advances in Information, Communication and Cybersecurity
Advances in Intelligent Systems and Computing, 2019
A routing protocol, in Mobile ad hoc networks (MANETs) use global information about the network t... more A routing protocol, in Mobile ad hoc networks (MANETs) use global information about the network topology and communication links to handle the data exchange between communication nodes. Several architectures and protocols have been defined to optimize transmission data between nodes. OLSR (Optimized Link State Routing) was proposed owing to Multipoint Relays (MPRs) that reduce the number of redundant retransmissions while diffusing a broadcast message in the network. In this paper we propose a new efficient mechanism, named F-QMPR-OLSR to select MPRs in OLSR protocol, which use two methods. The first use fuzzy systems based three quality of service (QoS) metrics as inputs: Buffer Availability, Stability and SINR (Signal to Interference plus Noise Ratio) and return as output the high efficient selection of MPRs. The second is to adjust the value of a node’s willingness parameter to best perform and improve network lifetime, and therefore it can improve the network transmission capacity. Implementation and simulation experiments with Network Simulator NS2 are presented in order to validate our contribution. The results show that F-QMPR-OLSR achieves a significant improvement of data packets exchange quality in term of QoS.
International Journal of Interactive Mobile Technologies (iJIM), 2021
Mobile ad hoc network (MANET) is among the networks which do not require any infrastructure to pu... more Mobile ad hoc network (MANET) is among the networks which do not require any infrastructure to put nodes in communication. Due to its own nature, it is used by several applications. Even though it's a network that is extremely challenging and mostly when TCP is applied. In this paper, we have proposed a new improvement in the TCP algorithm that employed fuzzy logic to predict packet loss and avoid congestion. Specifically, we have used tree metrics such as stability, energy, and signal strength to use in fuzzy logic systems. To accomplish our approach, we have established some modifications based on a cross-layer. The results of the relevant simulation performed by NS3 demonstrated that our approach globally improves the performance of TCP in MANET. Precisely reduce the packet overhead and energy consumption also enhance throughput.
Advances in Intelligent Systems and Computing, 2021
The Journal of Supercomputing
International Journal of Electrical and Computer Engineering (IJECE)
Developing countries are faced with social and economic challenges, including the emergence and p... more Developing countries are faced with social and economic challenges, including the emergence and proliferation of slums. Slum detection and localization methods typically rely on regular topographic surveys or on visual identification of high-resolution spatial satellite images, as well as socio-environmental surveys from land surveys and general population censuses. Yet, they consume so much time and effort. To overcome these problems, this paper exploits well-known seven pretrained models using transfer learning approaches such as MobileNets, InceptionV3, NASNetMobile, Xception, VGG16, EfficientNet, and ResNet50, consecutively, on a smaller dataset of medium-resolution satellite imagery. The accuracies obtained from these experiments, respectively, demonstrate that the top three pretrained models achieve 98.78%, 97.9%, and 97.56%. Besides, MobileNets have the smallest memory sizes of 9.1 Mo and the shortest latency of 17.01 s, which can be implemented as needed. The results show th...
2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS)
2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS)
2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS)
2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)
Consumers are increasingly adopting multiple smart "things" connected v... more Consumers are increasingly adopting multiple smart "things" connected via the Internet, such as home appliances, vehicles, and mobile medical equipment, due to the rapid growth of the Internet of Things (IoT). Many of these connections are made possible by IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), a distance vector routing protocol used in IoT networks to build a route to send packets. The diverse nature, as well as the limitations and constraints (Low energy, memory, and storage) of these objects, drive the development of techniques to ensure their safety from malicious attacks. As a result, various approaches to protect the IoT have been designed and developed, however due to the limitations of these methods, they are still insufficient. In this paper an Intrusion Detection System (IDS), based on trust mechanism, was proposed for detecting topology attacks in this sort of environment. The number of identified nodes, energy consumption, memory utilization and the detection time and rate of the IDS were all taken into consideration when evaluating it. We chose Cooja software as the simulator to accomplish this.
International Journal of Advanced Computer Science and Applications
Cloud computing provides on-demand access to a diverse set of remote IT services. It offers a num... more Cloud computing provides on-demand access to a diverse set of remote IT services. It offers a number of advantages over traditional computing methods. These advantages include pay-as-you-go pricing, increased agility and on-demand scalability. It also reduces costs due to increased efficiency and better business continuity. The most significant barrier preventing many businesses from moving to the cloud is the security of crucial data maintained by the cloud provider. The cloud server must have complete access to the data to respond to a client request. That implies the decryption key must be sent to the cloud by the client, which may compromise the confidentiality of data stored in the cloud. One way to allow the cloud to use encrypted data without knowing or decrypting it is homomorphic encryption. In this paper, we focus on improving the Paillier cryptosystem, first by using two protocols that allow the cloud to perform the multiplication of encrypted data and then comparing the two protocols in terms of key size and time.
Lecture notes on data engineering and communications technologies, Oct 14, 2022
International Journal of Interactive Mobile Technologies (iJIM)
The appearance of Edge Computing with the possibility to bring powerful computation servers near ... more The appearance of Edge Computing with the possibility to bring powerful computation servers near the mobile device is a major stepping stone towards better user experience and resource consumption optimization. Due to the Internet of Things invasion that led to the constant demand for communication and computation resources, many issues were imposed in order to deliver a seamless service within an optimized cost of time and energy, since most of the applications nowadays require real response time and rely on a limited battery resource. Therefore, Mobile Edge Computing is the new reliable paradigm in terms of communication and computation consumption by the mobile devices. Mobile Edge Computing rely on computation offloading to surpass cloud-based technologies issues and break the limitations of mobile devices such as computing, storage and battery resources. However, computation offloading is not always the optimal choice to adopt, which makes the offloading decision a crucial part...
International Journal of Electrical and Computer Engineering (IJECE)
The purpose of data integration is to integrate the multiple sources of heterogeneous data availa... more The purpose of data integration is to integrate the multiple sources of heterogeneous data available on the internet, such as text, image, and video. After this stage, the data becomes large. Therefore, it is necessary to analyze the data that can be used for the efficient execution of the query. However, we have problems with solving entities, so it is necessary to use different techniques to analyze and verify the data quality in order to obtain good data management. Then, when we have a single database, we call this mechanism deduplication. To solve the problems above, we propose in this article a method to calculate the similarity between the potential duplicate data. This solution is based on graphics technology to narrow the search field for similar features. Then, a composite mechanism is used to locate the most similar records in our database to improve the quality of the data to make good decisions from heterogeneous sources.
Lecture notes on data engineering and communications technologies, 2022
Journal of Computer and Communications
The data warehouse is the most widely used database structure in many decision support systems ar... more The data warehouse is the most widely used database structure in many decision support systems around the world. This is the reason why a lot of research has been conducted in the literature over the last two decades on their design, refreshment and optimization. The manipulation of hypercubes (cubes) of data is a frequently used operation in the design of multidimensional data warehouses, due to their better adaptation to OLAP (On-Line Analytical Processing). However, the updating of these hypercubes is a very complicated process due mainly to the mass and complexity of the data presented. The purpose of this paper is to present the state of the art of works based on multidimensional modeling using the hypercube as a unit of presentation of data stores. It starts with the base of this process which is the choice of the views (cubes) forming our data warehouse base. The objective of this work is to describe the state of the art of research works dealing with the selection of materialized views in decision support systems.
International Journal of Electrical and Computer Engineering (IJECE)
Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep ... more Due to rapid growth of multimedia traffic used over the mobile ad-hoc networks (MANETs), to keep up with the progress of this constraints MANETs protocols becoming increasingly concerned with the quality of service. In view of the random mobility nodes in MANET, TCP becomes more unreliability in case of higher energy consumption and packet loss. In this paper we proposed a new optimization approach to enhance decision making of TCP based on some changes of IEEE 802.11 MAC uses cross layer approach. The aim is to minimize the impact of retransmissions of packet lost and energy consumption in order to analysed and chose the appropriate routing protocol for TCP that can be enhance QoS MANET. Our simulation results based QoS study using NS3 show that, our proposed achieves better performance of TCP in MANETs significantly, and also improved the throughput, energy consumption and facilitates the traffic transmission over routing protocol.
Understanding human data has been the focus of philosophers and scientists. Social media platform... more Understanding human data has been the focus of philosophers and scientists. Social media platforms encourage people to be creative and share their personal information. By analyzing data, we will be able to identify people's personalities and information that is also important to specific profils. The aim of this paper is to propose an approach that predicts the next word during writing a sentence based on the user's personality. To achieve this goal, our approach is illustrated by two points: (1) An approximate extraction of the Big Five model for a specific user from his tweets. (2) Predicting the next word while a user is writing a new tweet depends on his personality using the Markov Chain Model. On the basis of these two notions, our approach makes writing posts easier by predicting and suggesting next words based on the user's personality. Experience represents the ease of predicting the next word during the writing of a new post related to individual potential.
Journal of ICT Standardization
Because of the numerous applications domains in which social media networks can be used, the huge... more Because of the numerous applications domains in which social media networks can be used, the huge volume of data and information uploaded by them is gaining significant interest. Publishing allows consumers to express their thoughts on products and services. Some feedbacks could also influence other users on those things. Therefore, extracting and identifying influencers from social media networks, also profiling their product perceptions and preferences, is critical for marketers to use efficient viral marketing and recommendation strategies. Our major goal in this research is to find the best machine learning model for characterizing influencers on social media networks. However, to achieve this objective, our strategy revolves around applying the PageRank algorithm to profile influential nodes throughout the social media network graph. The results of our experiment showed that the correlation is always different when adding a new parameter to machine learning models, also to dete...
Advances in Information, Communication and Cybersecurity
Advances in Intelligent Systems and Computing, 2019
A routing protocol, in Mobile ad hoc networks (MANETs) use global information about the network t... more A routing protocol, in Mobile ad hoc networks (MANETs) use global information about the network topology and communication links to handle the data exchange between communication nodes. Several architectures and protocols have been defined to optimize transmission data between nodes. OLSR (Optimized Link State Routing) was proposed owing to Multipoint Relays (MPRs) that reduce the number of redundant retransmissions while diffusing a broadcast message in the network. In this paper we propose a new efficient mechanism, named F-QMPR-OLSR to select MPRs in OLSR protocol, which use two methods. The first use fuzzy systems based three quality of service (QoS) metrics as inputs: Buffer Availability, Stability and SINR (Signal to Interference plus Noise Ratio) and return as output the high efficient selection of MPRs. The second is to adjust the value of a node’s willingness parameter to best perform and improve network lifetime, and therefore it can improve the network transmission capacity. Implementation and simulation experiments with Network Simulator NS2 are presented in order to validate our contribution. The results show that F-QMPR-OLSR achieves a significant improvement of data packets exchange quality in term of QoS.
International Journal of Interactive Mobile Technologies (iJIM), 2021
Mobile ad hoc network (MANET) is among the networks which do not require any infrastructure to pu... more Mobile ad hoc network (MANET) is among the networks which do not require any infrastructure to put nodes in communication. Due to its own nature, it is used by several applications. Even though it's a network that is extremely challenging and mostly when TCP is applied. In this paper, we have proposed a new improvement in the TCP algorithm that employed fuzzy logic to predict packet loss and avoid congestion. Specifically, we have used tree metrics such as stability, energy, and signal strength to use in fuzzy logic systems. To accomplish our approach, we have established some modifications based on a cross-layer. The results of the relevant simulation performed by NS3 demonstrated that our approach globally improves the performance of TCP in MANET. Precisely reduce the packet overhead and energy consumption also enhance throughput.
Advances in Intelligent Systems and Computing, 2021