Khalid Satori
YOU?
Author Swipe
View article: Optimal architecture for a sentiment analysis transformer with multihead attention and genetic crossover
Optimal architecture for a sentiment analysis transformer with multihead attention and genetic crossover Open
Sentiment analysis, a key component of natural language processing, is of paramount importance in various fields such as strategic surveillance, online image management, and customer satisfaction assessment. However, despite recent advance…
View article: Revolution-bump mapping with texture function adjustment according to the geometry of the revolved object
Revolution-bump mapping with texture function adjustment according to the geometry of the revolved object Open
Nowadays, 3D computer graphics are firmly anchored in our daily lives, extending across a multitude of distinct fields. Although each field follows its specific objectives, two major objectives are taken into consideration: realism and ren…
View article: The Security of SSH Protocol Public Key Sharing in the Post-Quantum Era
The Security of SSH Protocol Public Key Sharing in the Post-Quantum Era Open
The security of traditional cryptographic schemes is based on mathematical puzzles that cannot be cracked by current computers. However, the rapid development of quantum computers has the potential to greatly reduce the time and resources …
View article: Improving Arabic handwritten text recognition through transfer learning with convolutional neural network-based models
Improving Arabic handwritten text recognition through transfer learning with convolutional neural network-based models Open
Arabic handwritten text recognition is a complex and challenging research domain. This study proposes an offline Arabic handwritten word recognition system based on transfer learning. The system exploits four pre-trained convolutional neur…
View article: An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers Open
In this study, we introduce a refined approach to encrypting 32-bit color images, leveraging the potential of four 1D chaotic maps – the Logistic map, Tent map, Chebyshev map, and Sine map. These chaotic maps intricately populate the four …
View article: End-to-End Artificial Intelligence-Based System for Automatic Stereo Camera Self-Calibration
End-to-End Artificial Intelligence-Based System for Automatic Stereo Camera Self-Calibration Open
Stereo camera self-calibration is a complex challenge in computer vision applications such as robotics, object tracking, surveillance and 3D reconstruction. To address this, we propose an efficient, fully automated End-To-End AI-Based syst…
View article: Efficient Braille Transformation for Secure Password Hashing
Efficient Braille Transformation for Secure Password Hashing Open
In this work, we propose a novel approach to enhancing the security of passwords before storing them in databases. Our method utilizes Braille transformation to encrypt the password after generating the corresponding hash. The hash is divi…
View article: Quantum Optimization for Location Assignment Problem in ASSR
Quantum Optimization for Location Assignment Problem in ASSR Open
In an Automated Storage and Retrieval System (AS/RS), a location assignment of products is important to improve the picking efficiency. In this paper, the optimization of shelf location assignment with a quantum annealing is investigated. …
View article: Clustering for Moroccan Prefecture-Provinces and World Countries Based COVID-19 Dataset
Clustering for Moroccan Prefecture-Provinces and World Countries Based COVID-19 Dataset Open
This paper describes the clustering technique for provinces-territories in Morocco and countries of the world at risk of the COVID-19 epidemic.Based on this proposed method, we have used COVID-19 Moroccan dataset, on August 18, 2021, with …
View article: A Feature Selection Approach Based on Archimedes’ Optimization Algorithm for Optimal Data Classification.
A Feature Selection Approach Based on Archimedes’ Optimization Algorithm for Optimal Data Classification. Open
Feature selection is an active research area in data mining and machine learning, especially with the increase in the amount of numerical data. FS is a search strategy to find the best subset of features among a large number of subsets of …
View article: CONVOLUTIONAL NEURAL NETWORKS FOR CAMERA SELF-CALIBRATION WITH VARYING INTRINSIC PARAMETERS
CONVOLUTIONAL NEURAL NETWORKS FOR CAMERA SELF-CALIBRATION WITH VARYING INTRINSIC PARAMETERS Open
Stereo camera self-calibration is a complex problem that has been tackled by computer vision and pattern recognition communities, and significant progress has been made. In the same context, this work proposes a new and robust fully automa…
View article: EFFECTIVE COMPARATIVE EVALUATION OF SENTIMENT ANALYSIS USING PAIRED T-TEST: A PERFORMANCE STUDY OF SUPERVISED METHODS
EFFECTIVE COMPARATIVE EVALUATION OF SENTIMENT ANALYSIS USING PAIRED T-TEST: A PERFORMANCE STUDY OF SUPERVISED METHODS Open
This article introduces a comprehensive investigation into the evolution of sentiment analysis, a field dedicated to extracting and comprehending human language expressions of opinions and emotions. The authors address a pivotal question: …
View article: Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques
Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques Open
With the growing need for secure multimedia data transmission, image encryption has become an important research area. Traditional encryption algorithms like RSA are not well-suited for this purpose, leading researchers to explore new appr…
View article: An Efficient Hybrid Model for Arabic Text Recognition
An Efficient Hybrid Model for Arabic Text Recognition Open
In recent years, Deep Learning models have become indispensable in several fields such as computer vision, automatic object recognition, and automatic natural language processing. The implementation of a robust and efficient handwritten te…
View article: Malicious Attack Classification Based-on Continuous Hidden Markov Models in Wireless Sensor Networks
Malicious Attack Classification Based-on Continuous Hidden Markov Models in Wireless Sensor Networks Open
Alongside the rapid progress of Wireless sensor networks (WSNs) technologies, sensors and networks can rapidly be victim of distributed attacks. Attackers can perform intrusions to breakdown the network during the routing process, intercep…
View article: Antnet Pheromone-Based Stochastic Multipath Routing Protocols using Hidden Markov Models for Energy Enhancement in Wireless Sensor Networks
Antnet Pheromone-Based Stochastic Multipath Routing Protocols using Hidden Markov Models for Energy Enhancement in Wireless Sensor Networks Open
Evolving of Wireless Sensor Network (WSNs) a type of infrastructure-less networks by tens, hundreds, thousandths, or billions of devices that provide indispensable services for the phenomenon study become more used in many industries with …
View article: Novel Approach for Augmented Reality using Convolutional Neural Networks
Novel Approach for Augmented Reality using Convolutional Neural Networks Open
In this paper, we will exploit the potential of convolutional neural networks (CNN) in augmented reality. Our work combines existing approaches and produces a new method for aligning a virtual object in the real world and in real time. Our…
View article: A Performant Clustering Approach Based on An Improved Sine Cosine Algorithm
A Performant Clustering Approach Based on An Improved Sine Cosine Algorithm Open
Image segmentation is a fundamental and important step in many computer vision applications. One of the most widely used image segmentation techniques is clustering. It is a process of segmenting the intensities of a non-homogeneous image …
View article: A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method
A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method Open
This paper proposes a new and efficient color image encryption algorithm based on multiple chaotic maps (Logistic map, Sine map, and Chebyshev map) and the intersecting planes method inside a cube. All maps were used to fill the three adja…
View article: The Optimal Inference Rules Selection for Unstructured Data Multi-Classification
The Optimal Inference Rules Selection for Unstructured Data Multi-Classification Open
The Fuzzy Inference System (FIS) is frequently utilized in a variety of Text Mining applications. In the text processing domains, where the amount of the processed data is vast, inserting manual rules for FIS remains a real issue, especial…
View article: The extensions of revolution-bump mapping
The extensions of revolution-bump mapping Open
Creating 3D computer-generated surfaces has long been a difficult challenge in computer graphics, particularly when portraying massive landscapes with extremely detailed surfaces in real-time. Despite significant advances in computer visio…
View article: Per-pixel displacement mapping using cone tracing with correct silhouette
Per-pixel displacement mapping using cone tracing with correct silhouette Open
Per-pixel displacement mapping is a texture mapping technique that adds the microrelief effect to 3D surfaces without increasing the density of their corresponding meshes. This technique relies on ray tracing algorithms to find the interse…
View article: Deep Learning for the Improvement of Object Detection in Augmented Reality
Deep Learning for the Improvement of Object Detection in Augmented Reality Open
In this article, we give a comprehensive overview of recent methods in object detection using deep learning and their uses in augmented reality. The objective is to present a complete understanding of these algorithms and how augmented rea…
View article: Per-Pixel Extrusion Mapping with Correct Silhouette
Per-Pixel Extrusion Mapping with Correct Silhouette Open
Per-pixel extrusion mapping consists of creating a virtual geometry stored in a texture over a polygon model without increasing its density. There are four types of extrusion mapping, namely, basic extrusion, outward extrusion, beveled ext…
View article: Secure and Guarantee QoS in a Video Sequence: a New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-time Exchanges
Secure and Guarantee QoS in a Video Sequence: a New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-time Exchanges Open
The continued development of networks has significantly contributed to increasing the quantity of information available to replace old intelligence-gathering methods faster and more efficiently. For this, it is necessary to implement servi…
View article: Secure and Guarantee QoS in a Video Sequence: A New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-Time Exchanges
Secure and Guarantee QoS in a Video Sequence: A New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-Time Exchanges Open
Much of the Internet's communication is encrypted, and its content is only accessible at two endpoints, a client and a server. However, any encryption requires a key that must be negotiated without being revealed to potential attackers. Th…
View article: An Efficient Image Clustering Technique based on Fuzzy C-means and Cuckoo Search Algorithm
An Efficient Image Clustering Technique based on Fuzzy C-means and Cuckoo Search Algorithm Open
Clustering is a predominant technique used in image segmentation due to its simple, easy and efficient approach. It is very important for the analysis, extraction and interpretation of images; which makes it used in multiple applications a…