Skip to main content

Showing 1–7 of 7 results for author: Noura, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.10363  [pdf, other

    cs.LG

    A Survey on Data-Driven Fault Diagnostic Techniques for Marine Diesel Engines

    Authors: Ayah Youssef, Hassan Noura, Abderrahim El Amrani, El Mostafa El Adel, Mustapha Ouladsine

    Abstract: Fault diagnosis in marine diesel engines is vital for maritime safety and operational efficiency.These engines are integral to marine vessels, and their reliable performance is crucial for safenavigation. Swift identification and resolution of faults are essential to prevent breakdowns,enhance safety, and reduce the risk of catastrophic failures at sea. Proactive fault diagnosisfacilitates timely… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Journal ref: 12th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, International Federation of Automatic Control (IFAC), Jun 2024, Farrera, Italy

  2. arXiv:2105.09280  [pdf, other

    cs.MM

    A Deep Learning Scheme for Efficient Multimedia IoT Data Compression

    Authors: Hassan N. Noura, Ola Salman, Raphaël Couturier

    Abstract: Given the voluminous nature of the multimedia sensed data, the Multimedia Internet of Things (MIoT) devices and networks will present several limitations in terms of power and communication overhead. One traditional solution to cope with the large-size data challenge is to use lossy compression. However, current lossy compression schemes require low compression rate to guarantee acceptable perceiv… ▽ More

    Submitted 3 April, 2021; originally announced May 2021.

  3. arXiv:2104.13634  [pdf, other

    cs.CV

    A Deep Learning Object Detection Method for an Efficient Clusters Initialization

    Authors: Raphaël Couturier, Hassan N. Noura, Ola Salman, Abderrahmane Sider

    Abstract: Clustering is an unsupervised machine learning method grou** data samples into clusters of similar objects. In practice, clustering has been used in numerous applications such as banking customers profiling, document retrieval, image segmentation, and e-commerce recommendation engines. However, the existing clustering techniques present significant limitations, from which is the dependability of… ▽ More

    Submitted 4 July, 2021; v1 submitted 28 April, 2021; originally announced April 2021.

  4. arXiv:2103.17028  [pdf, other

    cs.CR

    Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations

    Authors: Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab

    Abstract: The number of cyber attacks has increased tremendously in the last few years. This resulted into both human and financial losses at the individual and organization levels. Recently, cyber-criminals are leveraging new skills and capabilities by employing anti-forensics activities, techniques and tools to cover their tracks and evade any possible detection. Consequently, cyber-attacks are becoming m… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

  5. arXiv:2103.15072  [pdf, other

    cs.CR

    A Survey on Ethical Hacking: Issues and Challenges

    Authors: Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab

    Abstract: Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the effect of these attacks, penetration tests are highly required, and can be considered as a suitable solution for this task. Therefore, the main focus of this paper is to explain the technical and non-technical steps of… ▽ More

    Submitted 28 March, 2021; originally announced March 2021.

  6. arXiv:1705.09872  [pdf, other

    cs.CR

    An Efficient Keyless Fragmentation Algorithm for Data Protection

    Authors: Katarzyna Kapusta, Gerard Memmi, Hassan Noura

    Abstract: The family of Information Dispersal Algorithms is applied to distributed systems for secure and reliable storage and transmission. In comparison with perfect secret sharing it achieves a significantly smaller memory overhead and better performance, but provides only incremental confidentiality. Therefore, even if it is not possible to explicitly reconstruct data from less than the required amount… ▽ More

    Submitted 27 May, 2017; originally announced May 2017.

  7. arXiv:1701.08371  [pdf, other

    cs.CR

    A Revision of a New Chaos-Based Image Encryption System: Weaknesses and Limitations

    Authors: Hassan Noura, Lama Sleem, Raphaël Couturier

    Abstract: Lately, multimedia encryption has been the focus of attention in many researches. Recently, a large number of encryption algorithms has been presented to protect image contents.The main objective of modern image encryption schemes is to reduce the computation complexity in order to respond to the real time multimedia and/or limited resources requirements without degrading the high level of securit… ▽ More

    Submitted 29 January, 2017; originally announced January 2017.