Zobrazeno 1 - 10
of 343
pro vyhledávání: '"Jaouhar A"'
This paper investigates the impact of feature encoding techniques on the explainability of XAI (Explainable Artificial Intelligence) algorithms. Using a malware classification dataset, we trained an XGBoost model and compared the performance of two f
Externí odkaz:
http://arxiv.org/abs/2307.05614
FPGA is a hardware architecture based on a matrix of programmable and configurable logic circuits thanks to which a large number of functionalities inside the device can be modified using a hardware description language. These functionalities must of
Externí odkaz:
http://arxiv.org/abs/2301.01889
Autor:
Ramzi Kheder, Ridha Ghayoula, Amor Smida, Issam El Gmati, Lassad Latrach, Wided Amara, Amor Hammami, Jaouhar Fattahi, Mohamed I. Waly
Publikováno v:
Telecom, Vol 5, Iss 2, Pp 451-475 (2024)
This article presents an innovative method for efficiently synthesizing radiation patterns by combining the Taguchi method and neural networks, validating the results on a ten-element antenna array. The Taguchi method aims to minimize product and pro
Externí odkaz:
https://doaj.org/article/b6a0e15f7b124a12a19308b8b0c9abec
Autor:
Al wachami N, Arraji M, Iderdar Y, Mourajid Y, Boumendil K, Bouchachi FZ, Jaouhar S, Guennouni M, Laamiri F, Elkhoudri N, Bandadi L, Louerdi ML, Hilali A, Chahboune M
Publikováno v:
International Journal of COPD, Vol Volume 19, Pp 375-387 (2024)
Nadia Al wachami,1 Maryem Arraji,1 Younes Iderdar,1 Yassmine Mourajid,1 Karima Boumendil,1 Fatima Zahra Bouchachi,1 Samira Jaouhar,2 Morad Guennouni,1,3 Fatimazahra Laamiri,1 Noureddine Elkhoudri,1 Lahcen Bandadi,1 Mohamed Lahbib Louerdi,4 Abderraouf
Externí odkaz:
https://doaj.org/article/9752b3ed296d46b38222299b20d28a01
Publikováno v:
Applied Sciences, Vol 14, Iss 20, p 9231 (2024)
The number of cybersecurity vulnerabilities keeps growing every year. Each vulnerability must be reported to the MITRE Corporation and assessed by a Counting Number Authority, which generates a metrics vector that determines its severity score. This
Externí odkaz:
https://doaj.org/article/e9e48ba69bf546d4a0ad78ada7ebe0a4
Autor:
Fattahi, Jaouhar, Mejri, Mohamed
Fingerprint recognition is often a game-changing step in establishing evidence against criminals. However, we are increasingly finding that criminals deliberately alter their fingerprints in a variety of ways to make it difficult for technicians and
Externí odkaz:
http://arxiv.org/abs/2012.15041
Autor:
Fattahi, Jaouhar, Mejri, Mohamed
In this paper, we put forward a new tool, called SpaML, for spam detection using a set of supervised and unsupervised classifiers, and two techniques imbued with Natural Language Processing (NLP), namely Bag of Words (BoW) and Term Frequency-Inverse
Externí odkaz:
http://arxiv.org/abs/2010.07444
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Data acquisition is an important process in the functioning of any control system. Usually, the acquired signal is analogic, representing a continuous physical measure, and it should be processed in a digital system based on an analog to digital conv
Externí odkaz:
http://arxiv.org/abs/1909.02447
Publikováno v:
Trustcom/BigDataSE/ISPA 2016: 1990-1997
Witness functions have recently been introduced in cryptographic protocols' literature as a new powerful way to prove protocol correctness with respect to secrecy. In this paper, we extend them to the property of authentication. We show how to use th
Externí odkaz:
http://arxiv.org/abs/1903.05791