Hamza Gharsellaoui | Université de Carthage (original) (raw)
Uploads
Papers by Hamza Gharsellaoui
Computers in Human Behavior, 2021
IEEE Conference Proceedings, 2016
IEEE Conference Proceedings, 2016
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Apr 24, 2017
IFAC-PapersOnLine, 2016
This paper work deals with the study of interest in the fields of Steganography and Steganalysis ... more This paper work deals with the study of interest in the fields of Steganography and Steganalysis with the image, audio or video stego media against the corresponding cover media (without the hidden information) and understand the process of embedding the information and its detection. Indeed, steganography involves hiding information in a cover media to obtain the stego media, in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of audio and image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.
IGI Global eBooks, 2021
Thisjournalarticledealswiththemostimportantexistingproblemsofsecurityandprivacyofthe CloudComputi... more Thisjournalarticledealswiththemostimportantexistingproblemsofsecurityandprivacyofthe CloudComputing(CC),InternetofThings(IoT)andCloudofThings(CoT)conceptsespecially confidentiality issues. With the evolution of ubiquitous computing, everything is connected everywhere,thereforetheseconceptshavebeenwidelystudiedintheliterature.However,duetothe systemscomplexityandthedifficultytocontroleachaccessattempt,intrusionsandvulnerabilities willbemorerecurrent.Totacklethisissue,researchershavebeenfocusedonvariousapproaches enforcing security and privacy. In the present article, risk factors and solutions regarding these technologiesarereviewedthencurrentandfuturetrendsarediscussed.
IEEE Conference Proceedings, 2016
IEEE Conference Proceedings, 2016
Ubiquitous Computing Systems, Oct 9, 2016
This paper deals with the problem of reconfiguration of Internet of Things (IoT) and Cloud Comput... more This paper deals with the problem of reconfiguration of Internet of Things (IoT) and Cloud Computing (CC) applications which have been widely studied recently. They are composed of a set of interconnected software components running on realtime on remote virtual machines. Virtualization is one of the building blocks for cloud computing and provides the mechanisms to implement the dynamic allocation of resources. Once cloud applications are deployed, they need to be reconfigured in order to react to any disturbance created by the removal or modification of virtual machines or components that make up these machines. In this paper, the original approach proposed for handling these reconfiguration scenarios must preserve the application consistency, feasibility, computing time, low power consumption and respect important architectural invariant related to real-time properties and to software dependencies. Finally, the challenges, advantages of the proposed cloud architecture and future works for the application and implementation are discussed.
International Journal of Advanced Pervasive and Ubiquitous Computing, 2018
In nowadays, robotics database management systems are increasing. These systems ensure good stora... more In nowadays, robotics database management systems are increasing. These systems ensure good storage of data and with big data analytic, a new approach demands new structures and methods for collecting, recording, and analyzing enterprise data. This paper work deals with the NoSQL databases which are the secret of the continual progression data that new data management solutions have been emerged. They crossed several areas as personalization, profile management, big data in real-time, content management, catalogue, view of customers, mobile applications, internet of things, digital communication and fraud detection. Machine learning, for example, thrives on more data, so smart machines can learn more and faster, the Robotics are our use of case to focus on our Test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of Robotics we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.
Since scientific research and industrial applications are becoming ever-increasingly demanding in... more Since scientific research and industrial applications are becoming ever-increasingly demanding in computing resources, Cloud Computing infrastructures are attracting a widespread interest thanks to their promising hallmarks such as scalability, high-performance, reliability and the pay-per-use strategy. The execution of these high-performant applications on such kind of computing environments in respect of optimizing many conflicting objectives brings us to a challenging issue commonly known as the Multi-objective workflows scheduling on large scale distributed systems. Bearing this in mind, we outline in the present paper our proposed approach called Genetically-modified Multi-objective Particle Swarm Optimization (GMPSO) for scheduling application workflows on hybrid Clouds in the context of high-performance computing in attempt to optimize Makespan and Cost. To achieve this, we have designed our proper encoding as well as a set of particular operators. Conducted simulations lead ...
2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
International Journal of Advanced Pervasive and Ubiquitous Computing, 2019
In the face of the rapid growth of data, the authors note the birth of new computer systems leadi... more In the face of the rapid growth of data, the authors note the birth of new computer systems leading the management of databases. To ensure reliable handling of data which is bulky and heterogeneous, new systems of basic management data are differentiated from traditional ones by their linear scalability to store and manage data in parallel. Those systems are called NoSQL DB. Robotics database management systems are increasing. These systems ensure good storage of data and with big data analytics, a new approach demands new structures and methods for collecting, recording, and analyzing enterprise data. This journal article deals with the NoSQL DB which are the secret of the continual progression data that new data management solutions have emerged. The implementation of NoSQL for Robotics wrestles all data they acquire into a usable form because with the ordinary type of Robotics, people are facing big limits to find the best decision in real-time. The authors' proposed approach...
The paper deals with the real-time scheduling of reconfigurable embedded multiprocessor systems w... more The paper deals with the real-time scheduling of reconfigurable embedded multiprocessor systems which can change their behaviors at run-time by adding, removing, or also updating OS tasks according to external events or also user requirements. We propose a new approach to check the system’s feasibility of the tasks that we assume periodic while minimizing their response times. An agent-based architecture is proposed to provide run-time technical solutions for users in order to reach again the system’s feasibility after any reconfiguration scenario. The effectiveness and the performance of the designed approach is evaluated through simulation
Proceedings of the 8th International Joint Conference on Software Technologies, 2013
The paper deals with the functional safety of distributed control systems following the component... more The paper deals with the functional safety of distributed control systems following the component-based approach. A control component is classically defined as a software unit allowing the control of a physical process. When a fault occurs in the plant, the system should be reconfigured dynamically to be adapted by adding-removing or updating software components for the safety of the controlled physical processes. An agent-based architecture is proposed therefore to control the plant's evolution before applying any possible reconfiguration scenario of the system. When the system is distributed on networked controllers, we propose a control agent for each device but we need also a coordination agent to allow safety distributed reconfigurations. The unique coordinator uses well-defined matrices and a protocol for this coordination. We model the whole architecture by using ordinary Petri nets and apply SESA for the verification of CTL properties of the system. The paper's contribution is applied to two benchmark production systems at Martin Luther University in Germany.
IFAC-PapersOnLine, 2016
Abstract This paper deals with the real-time scheduling of embedded systems based on the neural n... more Abstract This paper deals with the real-time scheduling of embedded systems based on the neural networks with low power consumption optimization. Indeed, while most embedded systems are designed for real-time applications, they suffer from resource constraints and energy consumption. Many techniques have been proposed for real-time task scheduling to reduce energy consumption. A combination of Dynamic Voltage Scaling (DVS) and feedback scheduling can be used to scale dynamically the frequency by adjusting the operating voltage, and improve the run-time reliability of embedded systems. We present in this paper a novel hybrid contribution that handles real-time scheduling of embedded systems and low power consumption based on the combination of DVS and Neural Feedback Scheduling NFS with the priority-energy earliest-deadline-first (PEDF) algorithm.
Computers in Human Behavior, 2021
IEEE Conference Proceedings, 2016
IEEE Conference Proceedings, 2016
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Apr 24, 2017
IFAC-PapersOnLine, 2016
This paper work deals with the study of interest in the fields of Steganography and Steganalysis ... more This paper work deals with the study of interest in the fields of Steganography and Steganalysis with the image, audio or video stego media against the corresponding cover media (without the hidden information) and understand the process of embedding the information and its detection. Indeed, steganography involves hiding information in a cover media to obtain the stego media, in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of audio and image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.
IGI Global eBooks, 2021
Thisjournalarticledealswiththemostimportantexistingproblemsofsecurityandprivacyofthe CloudComputi... more Thisjournalarticledealswiththemostimportantexistingproblemsofsecurityandprivacyofthe CloudComputing(CC),InternetofThings(IoT)andCloudofThings(CoT)conceptsespecially confidentiality issues. With the evolution of ubiquitous computing, everything is connected everywhere,thereforetheseconceptshavebeenwidelystudiedintheliterature.However,duetothe systemscomplexityandthedifficultytocontroleachaccessattempt,intrusionsandvulnerabilities willbemorerecurrent.Totacklethisissue,researchershavebeenfocusedonvariousapproaches enforcing security and privacy. In the present article, risk factors and solutions regarding these technologiesarereviewedthencurrentandfuturetrendsarediscussed.
IEEE Conference Proceedings, 2016
IEEE Conference Proceedings, 2016
Ubiquitous Computing Systems, Oct 9, 2016
This paper deals with the problem of reconfiguration of Internet of Things (IoT) and Cloud Comput... more This paper deals with the problem of reconfiguration of Internet of Things (IoT) and Cloud Computing (CC) applications which have been widely studied recently. They are composed of a set of interconnected software components running on realtime on remote virtual machines. Virtualization is one of the building blocks for cloud computing and provides the mechanisms to implement the dynamic allocation of resources. Once cloud applications are deployed, they need to be reconfigured in order to react to any disturbance created by the removal or modification of virtual machines or components that make up these machines. In this paper, the original approach proposed for handling these reconfiguration scenarios must preserve the application consistency, feasibility, computing time, low power consumption and respect important architectural invariant related to real-time properties and to software dependencies. Finally, the challenges, advantages of the proposed cloud architecture and future works for the application and implementation are discussed.
International Journal of Advanced Pervasive and Ubiquitous Computing, 2018
In nowadays, robotics database management systems are increasing. These systems ensure good stora... more In nowadays, robotics database management systems are increasing. These systems ensure good storage of data and with big data analytic, a new approach demands new structures and methods for collecting, recording, and analyzing enterprise data. This paper work deals with the NoSQL databases which are the secret of the continual progression data that new data management solutions have been emerged. They crossed several areas as personalization, profile management, big data in real-time, content management, catalogue, view of customers, mobile applications, internet of things, digital communication and fraud detection. Machine learning, for example, thrives on more data, so smart machines can learn more and faster, the Robotics are our use of case to focus on our Test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of Robotics we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.
Since scientific research and industrial applications are becoming ever-increasingly demanding in... more Since scientific research and industrial applications are becoming ever-increasingly demanding in computing resources, Cloud Computing infrastructures are attracting a widespread interest thanks to their promising hallmarks such as scalability, high-performance, reliability and the pay-per-use strategy. The execution of these high-performant applications on such kind of computing environments in respect of optimizing many conflicting objectives brings us to a challenging issue commonly known as the Multi-objective workflows scheduling on large scale distributed systems. Bearing this in mind, we outline in the present paper our proposed approach called Genetically-modified Multi-objective Particle Swarm Optimization (GMPSO) for scheduling application workflows on hybrid Clouds in the context of high-performance computing in attempt to optimize Makespan and Cost. To achieve this, we have designed our proper encoding as well as a set of particular operators. Conducted simulations lead ...
2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
International Journal of Advanced Pervasive and Ubiquitous Computing, 2019
In the face of the rapid growth of data, the authors note the birth of new computer systems leadi... more In the face of the rapid growth of data, the authors note the birth of new computer systems leading the management of databases. To ensure reliable handling of data which is bulky and heterogeneous, new systems of basic management data are differentiated from traditional ones by their linear scalability to store and manage data in parallel. Those systems are called NoSQL DB. Robotics database management systems are increasing. These systems ensure good storage of data and with big data analytics, a new approach demands new structures and methods for collecting, recording, and analyzing enterprise data. This journal article deals with the NoSQL DB which are the secret of the continual progression data that new data management solutions have emerged. The implementation of NoSQL for Robotics wrestles all data they acquire into a usable form because with the ordinary type of Robotics, people are facing big limits to find the best decision in real-time. The authors' proposed approach...
The paper deals with the real-time scheduling of reconfigurable embedded multiprocessor systems w... more The paper deals with the real-time scheduling of reconfigurable embedded multiprocessor systems which can change their behaviors at run-time by adding, removing, or also updating OS tasks according to external events or also user requirements. We propose a new approach to check the system’s feasibility of the tasks that we assume periodic while minimizing their response times. An agent-based architecture is proposed to provide run-time technical solutions for users in order to reach again the system’s feasibility after any reconfiguration scenario. The effectiveness and the performance of the designed approach is evaluated through simulation
Proceedings of the 8th International Joint Conference on Software Technologies, 2013
The paper deals with the functional safety of distributed control systems following the component... more The paper deals with the functional safety of distributed control systems following the component-based approach. A control component is classically defined as a software unit allowing the control of a physical process. When a fault occurs in the plant, the system should be reconfigured dynamically to be adapted by adding-removing or updating software components for the safety of the controlled physical processes. An agent-based architecture is proposed therefore to control the plant's evolution before applying any possible reconfiguration scenario of the system. When the system is distributed on networked controllers, we propose a control agent for each device but we need also a coordination agent to allow safety distributed reconfigurations. The unique coordinator uses well-defined matrices and a protocol for this coordination. We model the whole architecture by using ordinary Petri nets and apply SESA for the verification of CTL properties of the system. The paper's contribution is applied to two benchmark production systems at Martin Luther University in Germany.
IFAC-PapersOnLine, 2016
Abstract This paper deals with the real-time scheduling of embedded systems based on the neural n... more Abstract This paper deals with the real-time scheduling of embedded systems based on the neural networks with low power consumption optimization. Indeed, while most embedded systems are designed for real-time applications, they suffer from resource constraints and energy consumption. Many techniques have been proposed for real-time task scheduling to reduce energy consumption. A combination of Dynamic Voltage Scaling (DVS) and feedback scheduling can be used to scale dynamically the frequency by adjusting the operating voltage, and improve the run-time reliability of embedded systems. We present in this paper a novel hybrid contribution that handles real-time scheduling of embedded systems and low power consumption based on the combination of DVS and Neural Feedback Scheduling NFS with the priority-energy earliest-deadline-first (PEDF) algorithm.