Mostafa Azizi
YOU?
Author Swipe
View article: MIoT-Driven Comparison of Open Blockchain Platforms
MIoT-Driven Comparison of Open Blockchain Platforms Open
Being propelled by the fourth industrial revolution (Industry 4.0), IoT devices and solutions are well adopted everywhere, ranging from home applications to industrial use, crossing through transportation, healthcare, energy, and so on. Th…
View article: Semantic segmentation and thermal imaging for forest fires detection and monitoring by drones
Semantic segmentation and thermal imaging for forest fires detection and monitoring by drones Open
Forest ecosystems play a crucial role in providing a wide range of ecological, social, and economic benefits. However, the increasing frequency and severity of forest fires pose a significant threat to the sustainability of forests and the…
View article: ESTIMATION OF JAVA GRDP IN REGENCY/CITY LEVEL: SATELLITE IMAGERY AND MACHINE LEARNING APPROACHES
ESTIMATION OF JAVA GRDP IN REGENCY/CITY LEVEL: SATELLITE IMAGERY AND MACHINE LEARNING APPROACHES Open
Gross Regional Domestic Product (GRDP) is one of the most important socio-economic indicators. In order to gain a more comprehensive understanding of the current economic situation and regional differences, estimating GRDP using integratio…
View article: Artificial Intelligence Techniques in Medical Imaging: A Systematic Review
Artificial Intelligence Techniques in Medical Imaging: A Systematic Review Open
This scientific review presents a comprehensive overview of medical imaging modalities and their diverse applications in artificial intelligence (AI)-based disease classification and segmentation. The paper begins by explaining the fundame…
View article: PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Open
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DS…
View article: Image and video-based crime prediction using object detection and deep learning
Image and video-based crime prediction using object detection and deep learning Open
In recent years, the use of artificial intelligence (AI) for image and video-based crime detection has gained significant attention from law enforcement agencies and security experts. Indeed, deep learning (DL) models can learn complex pat…
View article: PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Open
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DS…
View article: Log Data Integrity Solution based on Blockchain Technology and IPFS
Log Data Integrity Solution based on Blockchain Technology and IPFS Open
Threats towards information systems have continued to increase and become more sophisticated, making security approaches a necessity for all types of organizations to ensure their protection. To implement an appropriate computer security p…
View article: Early wildfire detection using machine learning model deployed in the fog/edge layers of IoT
Early wildfire detection using machine learning model deployed in the fog/edge layers of IoT Open
The impact of wildfires, even following the fire's extinguishment, continues to affect harmfully public health and prosperity. Wildfires are becoming increasingly frequent and severe, and make the world's biodiversity in a growing serious …
View article: Optimal text-to-image synthesis model for generating portrait images using generative adversarial network techniques
Optimal text-to-image synthesis model for generating portrait images using generative adversarial network techniques Open
The advancements in artificial intelligence research, particularly in computer vision, have led to the development of previously unimaginable applications, such as generating new contents based on text description. In our work we focused o…
View article: Crime prediction using a hybrid sentiment analysis approach based on the bidirectional encoder representations from transformers
Crime prediction using a hybrid sentiment analysis approach based on the bidirectional encoder representations from transformers Open
Sentiment analysis (SA) is widely used today in many areas such as crime detection (security intelligence) to detect potential security threats in realtime using social media platforms such as Twitter. The most promising techniques in sent…
View article: An unsupervised generative adversarial network based-host intrusion detection system for internet of things devices
An unsupervised generative adversarial network based-host intrusion detection system for internet of things devices Open
Machine learning (ML) and deep learning (DL) have achieved amazing progress in diverse disciplines. One of the most efficient approaches is unsupervised learning (UL), a sort of algorithms for analyzing and clustering unlabeled data; it al…
View article: A Lightweight Optimized Deep Learning-based Host-Intrusion Detection System Deployed on the Edge for IoT
A Lightweight Optimized Deep Learning-based Host-Intrusion Detection System Deployed on the Edge for IoT Open
The Internet of Things (IoT) is now present in every domain from applications in smart homes, Smart Cities, Industrial Internet of Things (IIoT), such as e-Health, and beyond.The wide use of Internet of Things is making its security a real…
View article: Unsupervised Clustering for 5G Network Planning Assisted by Real Data
Unsupervised Clustering for 5G Network Planning Assisted by Real Data Open
The fifth-generation (5G) of networks is being deployed to provide a wide range of new services and to manage the accelerated traffic load of the existing networks. In the present-day networks, data has become more noteworthy than ever to …
View article: Augmented binary multi-labeled CNN for practical facial attribute classification
Augmented binary multi-labeled CNN for practical facial attribute classification Open
Both human face recognition and generation by machines are currently an active area of computer vision, drawing curiosity of researchers, capable of performing amazing image analysis, and producing applications in multiple domains. In this…
View article: Accelerating the update of a DL-based IDS for IoT using deep transfer learning
Accelerating the update of a DL-based IDS for IoT using deep transfer learning Open
Deep learning (DL) models are nowadays broadly applied and have shown outstanding performance in a variety of fields, including our focus topic of "IoTcybersecurity". Deep learning-based intrusion detection system (DL-IDS) models are more …
View article: A comparative study of deep learning based language representation learning models
A comparative study of deep learning based language representation learning models Open
Deep learning (DL) approaches use various processing layers to learn hierarchical representations of data. Recently, many methods and designs of natural language processing (NLP) models have shown significant development, especially in tex…
View article: Toward a deep learning-based intrusion detection system for IoT against botnet attacks
Toward a deep learning-based intrusion detection system for IoT against botnet attacks Open
The massive network traffic data between connected devices in the internet of things have taken a big challenge to many traditional intrusion detection systems (IDS) to find probable security breaches. However, security attacks lean toward…
View article: Scientific Applications in the Cloud: Resource Optimisation based on Metaheuristics
Scientific Applications in the Cloud: Resource Optimisation based on Metaheuristics Open
The advent of emerging technologies such as 5G and Internet of Things (IoT) will generate a colossal amount ofdata that should be processed by the cloud computing. Thereby, cloud resources optimisation represents significant benefits in di…
View article: Multimodal access control system combining RFID, fingerprint and facial recognition
Multimodal access control system combining RFID, fingerprint and facial recognition Open
Monomodal biometry does not constitute an effective measure to meet the desired performance requirements for large-scale applications, due to limita-tions such as noisy data, restricted degree of freedom and unacceptable error rates. Some …
View article: Measurement-based methodology for modelling the energy consumption of mobile devices
Measurement-based methodology for modelling the energy consumption of mobile devices Open
Energy consumption is the result of interactions between hardware, software, users, and the application environment. Optimisation of energy consumption has become crucial, and energy is considered a critical resource, so it is important to…
View article: Measurement-based Methodology for Modeling the Energy Consumption of Mobile Devices
Measurement-based Methodology for Modeling the Energy Consumption of Mobile Devices Open
International audience
View article: Log files Analysis Using MapReduce to Improve Security
Log files Analysis Using MapReduce to Improve Security Open
Log files are a very useful source of information to diagnose system security and to detect problems that occur in the system, and are often very large and can have complex structure. In this paper, we provide a methodology of security ana…
View article: A Novel Approach for an Interoperable Biometric Verification
A Novel Approach for an Interoperable Biometric Verification Open
Increasingly, safety is present in everyday life, at work, at home, in recreational environments, and in all places where there is a flow of people who share a common space. Using biometric fingerprint technique for identity verification h…
View article: EMV Cards Vulnerabilities Detection Using Deterministic Finite Automaton
EMV Cards Vulnerabilities Detection Using Deterministic Finite Automaton Open
Europay-MasterCard-Visa (EMV) standard aims to improve the security and reliability of smartcards. The main concern of this contribution is to detect vulnerabilities in an EMV transaction between terminal and EMV card. In this paper, we pr…
View article: An Experimental Methodology for Modeling the Energy Consumption of Mobile Devices
An Experimental Methodology for Modeling the Energy Consumption of Mobile Devices Open
International audience
View article: Review on security issues in RFID systems
Review on security issues in RFID systems Open
Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people.Based on a combination of tags and readers, RFID technology has widely been applied in …