Skip to main content

Showing 1–11 of 11 results for author: Makhoul, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2207.09320  [pdf, other

    cs.IR

    Group Validation in Recommender Systems: Framework for Multi-layer Performance Evaluation

    Authors: Wissam Al Jurdi, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul

    Abstract: Interpreting the performance results of models that attempt to realize user behavior in platforms that employ recommenders is a big challenge that researchers and practitioners continue to face. Although current evaluation tools possess the capacity to provide solid general overview of a system's performance, they still lack consistency and effectiveness in their use as evident in most recent stud… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

  2. arXiv:1904.06705  [pdf, other

    cs.NI eess.SP

    A Spatial-Temporal Correlation Approach for Data Reduction in Cluster-Based Sensor Networks

    Authors: Gaby Bou Tayeh, Abdallah Makhoul, Charith Perera, Jacques Demerjian

    Abstract: In a resource-constrained Wireless Sensor Networks (WSNs), the optimization of the sampling and the transmission rates of each individual node is a crucial issue. A high volume of redundant data transmitted through the network will result in collisions, data loss, and energy dissipation. This paper proposes a novel data reduction scheme, that exploits the spatial-temporal correlation among sensor… ▽ More

    Submitted 14 April, 2019; originally announced April 2019.

    Journal ref: IEEE ACCESS, 2019

  3. arXiv:1708.05965  [pdf, other

    cs.DC cs.CY

    On the topology effects in wireless sensor networks based prognostics and health management

    Authors: Ahmad Farhat, Abdallah Makhoul, Christophe Guyeux, Rami Tawil, Ali Jaber, Abbas Hijazi

    Abstract: In this work, we consider the usage of wireless sensor networks (WSN) to monitor an area of interest, in order to diagnose on real time its state. Each sensor node forwards information about relevant features towards the sink where the data is processed. Nevertheless, energy conservation is a key issue in the design of such networks and once a sensor exhausts its resources, it will be dropped from… ▽ More

    Submitted 20 August, 2017; originally announced August 2017.

    Comments: 19th IEEE International Conference on Computational Science and Engineering

  4. arXiv:1706.08136  [pdf, other

    cs.MM cs.SE

    On the usefulness of information hiding techniques for wireless sensor networks security

    Authors: Rola Al-Sharif, Christophe Guyeux, Yousra Ahmed Fadil, Abdallah Makhoul, Ali Jaber

    Abstract: A wireless sensor network (WSN) typically consists of base stations and a large number of wireless sensors. The sensory data gathered from the whole network at a certain time snapshot can be visualized as an image. As a result, information hiding techniques can be applied to this "sensory data image". Steganography refers to the technology of hiding data into digital media without drawing any susp… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  5. arXiv:1706.08133  [pdf, other

    cs.DC

    A Security Framework for Wireless Sensor Networks: Theory and Practice

    Authors: Christophe Guyeux, Abdallah Makhoul, Jacques M. Bahi

    Abstract: Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompts a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. In this work we emphasize two security issues: (1) secure com… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  6. arXiv:1706.08088  [pdf, other

    cs.CV

    Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance

    Authors: Anthony Tannoury, Rony Darazi, Christophe Guyeux, Abdallah Makhoul

    Abstract: Wireless Multimedia Sensor Network (WMSN) is a promising technology capturing rich multimedia data like audio and video, which can be useful to monitor an environment under surveillance. However, many scenarios in real time monitoring requires 3D depth information. In this research work, we propose to use the disparity map that is computed from two or multiple images, in order to monitor the depth… ▽ More

    Submitted 25 June, 2017; originally announced June 2017.

  7. arXiv:1702.02516  [pdf, other

    cs.CR

    Low Cost Monitoring and Intruders Detection using Wireless Video Sensor Networks

    Authors: Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul, Congduc Pham

    Abstract: There is a growing interest in the use of video sensor networks in surveillance applications in order to detect intruders with low cost. The essential concern of such networks is whether or not a specified target can pass or intrude the monitored region without being detected. This concern forms a serious challenge to wireless video sensor networks of weak computation and battery power. In this… ▽ More

    Submitted 8 February, 2017; originally announced February 2017.

    Comments: Published in IJDSN

  8. arXiv:1611.08401  [pdf, other

    cs.DC cs.IT

    Investigating Low Level Protocols for Wireless Body Sensor Networks

    Authors: Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul

    Abstract: The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper inve… ▽ More

    Submitted 25 November, 2016; originally announced November 2016.

    Comments: Accepted to AICCSA 2016

  9. arXiv:1608.07443  [pdf, other

    cs.DC cs.SI

    Using an epidemiological approach to maximize data survival in the internet of things

    Authors: Abdallah Makhoul, Christophe Guyeux, Mourad Hakem, Jacques M. Bahi

    Abstract: The internet of things (IoT) has gained worldwide attention in recent years. It transforms the everyday objects that surround us into proactive actors of the Internet, generating and consuming information. An important issue related to the appearance of such large-scale self-coordinating IoT is the reliability and the collaboration between the objects in the presence of environmental hazards. High… ▽ More

    Submitted 26 August, 2016; originally announced August 2016.

    Comments: arXiv admin note: text overlap with arXiv:1608.05951

    Journal ref: ACM Transactions on Internet Technology. 16 (1), 2015

  10. arXiv:1608.05951  [pdf, other

    cs.DC cs.NI

    Epidemiological Approach for Data Survivability in Unattended Wireless Sensor Networks

    Authors: Jacques M. Bahi, Christophe Guyeux, Mourad Hakem, Abdallah Makhoul

    Abstract: Unattended Wireless Sensor Networks (UWSNs) are Wireless Sensor Networks characterized by sporadic sink presence and operation in hostile settings. The absence of the sink for period of time, prevents sensor nodes to offload data in real time and offer greatly increased opportunities for attacks resulting in erasure, modification, or disclosure of sensor-collected data. In this paper, we focus on… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

  11. arXiv:1608.05936  [pdf, other

    cs.DC cs.CR

    Two Security Layers for Hierarchical Data Aggregation in Sensor Networks

    Authors: Jacques M. Bahi, Christophe Guyeux, Abdallah Makhoul

    Abstract: Due to resource restricted sensor nodes, it is important to minimize the amount of data transmission among sensor networks. To reduce the amount of sending data, an aggregation approach can be applied along the path from sensors to the sink. However, as sensor networks are often deployed in untrusted and even hostile environments, sensor nodes are prone to node compromise attacks. Hence, an end-to… ▽ More

    Submitted 21 August, 2016; originally announced August 2016.

    Journal ref: International Journal of Autonomous and Adaptive Communications Systems. 7(3), 239-270, 2014