Skip to main content

Showing 1–10 of 10 results for author: Kheddar, H

Searching in archive eess. Search in all archives.
.
  1. arXiv:2403.15442  [pdf, other

    eess.AS cs.AI cs.CV eess.IV

    Advanced Artificial Intelligence Algorithms in Cochlear Implants: Review of Healthcare Strategies, Challenges, and Perspectives

    Authors: Billel Essaid, Hamza Kheddar, Noureddine Batel, Abderrahmane Lakas, Muhammad E. H. Chowdhury

    Abstract: Automatic speech recognition (ASR) plays a pivotal role in our daily lives, offering utility not only for interacting with machines but also for facilitating communication for individuals with either partial or profound hearing impairments. The process involves receiving the speech signal in analogue form, followed by various signal processing algorithms to make it compatible with devices of limit… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

  2. arXiv:2403.13843  [pdf, other

    cs.LG cs.AI eess.IV

    Machine Learning and Vision Transformers for Thyroid Carcinoma Diagnosis: A review

    Authors: Yassine Habchi, Hamza Kheddar, Yassine Himeur, Abdelkrim Boukabou, Ammar Chouchane, Abdelmalik Ouamane, Shadi Atalla, Wathiq Mansoor

    Abstract: The growing interest in develo** smart diagnostic systems to help medical experts process extensive data for treating incurable diseases has been notable. In particular, the challenge of identifying thyroid cancer (TC) has seen progress with the use of machine learning (ML) and big data analysis, incorporating transformers to evaluate TC prognosis and determine the risk of malignancy in individu… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

  3. arXiv:2403.11934  [pdf, other

    hep-ph cs.CV eess.IV hep-ex

    Image Classification in High-Energy Physics: A Comprehensive Survey of Applications to Jet Analysis

    Authors: Hamza Kheddar, Yassine Himeur, Abbes Amira, Rachik Soualah

    Abstract: Nowadays, there has been a growing trend in the fields of high-energy physics (HEP) in its both parts experimental and phenomenological studies, to incorporate machine learning (ML) and its specialized branch, deep learning (DL). This review paper provides a thorough illustration of these applications using different DL approaches. The first part of the paper examines the basics of various particl… ▽ More

    Submitted 23 May, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

  4. arXiv:2403.01255  [pdf, other

    cs.SD cs.AI eess.AS eess.SP

    Automatic Speech Recognition using Advanced Deep Learning Approaches: A survey

    Authors: Hamza Kheddar, Mustapha Hemis, Yassine Himeur

    Abstract: Recent advancements in deep learning (DL) have posed a significant challenge for automatic speech recognition (ASR). ASR relies on extensive training datasets, including confidential ones, and demands substantial computational and storage resources. Enabling adaptive systems improves ASR performance in dynamic environments. DL techniques assume training and testing data originate from the same dom… ▽ More

    Submitted 18 April, 2024; v1 submitted 2 March, 2024; originally announced March 2024.

    Journal ref: Information Fusion, Elsevier, 2024

  5. arXiv:2308.13592  [pdf, other

    eess.IV cs.AI cs.CY cs.LG

    AI in Thyroid Cancer Diagnosis: Techniques, Trends, and Future Directions

    Authors: Yassine Habchi, Yassine Himeur, Hamza Kheddar, Abdelkrim Boukabou, Shadi Atalla, Ammar Chouchane, Abdelmalik Ouamane, Wathiq Mansoor

    Abstract: There has been a growing interest in creating intelligent diagnostic systems to assist medical professionals in analyzing and processing big data for the treatment of incurable diseases. One of the key challenges in this field is detecting thyroid cancer, where advancements have been made using machine learning (ML) and big data analytics to evaluate thyroid cancer prognosis and determine a patien… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

    Comments: 30 pages, 16 figures and 10 tables

  6. arXiv:2308.04522  [pdf, other

    cs.CR cs.AI cs.LG cs.MM cs.SD eess.AS eess.IV

    Deep Learning for Steganalysis of Diverse Data Types: A review of methods, taxonomy, challenges and future directions

    Authors: Hamza Kheddar, Mustapha Hemis, Yassine Himeur, David MegĂ­as, Abbes Amira

    Abstract: Steganography and steganalysis are two interrelated aspects of the field of information security. Steganography seeks to conceal communications, whereas steganalysis is aimed to either find them or even, if possible, recover the data they contain. Steganography and steganalysis have attracted a great deal of interest, particularly from law enforcement. Steganography is often used by cybercriminals… ▽ More

    Submitted 11 March, 2024; v1 submitted 8 August, 2023; originally announced August 2023.

    Journal ref: Neurocomputing, Elsevier, 2024

  7. arXiv:2304.14535  [pdf, other

    cs.SD cs.CL cs.LG eess.AS

    Deep Transfer Learning for Automatic Speech Recognition: Towards Better Generalization

    Authors: Hamza Kheddar, Yassine Himeur, Somaya Al-Maadeed, Abbes Amira, Faycal Bensaali

    Abstract: Automatic speech recognition (ASR) has recently become an important challenge when using deep learning (DL). It requires large-scale training datasets and high computational and storage resources. Moreover, DL techniques and machine learning (ML) approaches in general, hypothesize that training and testing data come from the same domain, with the same input feature space and data distribution char… ▽ More

    Submitted 31 July, 2023; v1 submitted 27 April, 2023; originally announced April 2023.

    Journal ref: Knowledge-Based Systems, Elsevier, 2023

  8. arXiv:2304.10550  [pdf, other

    cs.CR cs.AI cs.LG cs.NI eess.SY

    Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review

    Authors: Hamza Kheddar, Yassine Himeur, Ali Ismail Awad

    Abstract: Globally, the external internet is increasingly being connected to industrial control systems. As a result, there is an immediate need to protect these networks from a variety of threats. The key infrastructure of industrial activity can be protected from harm using an intrusion detection system (IDS), a preventive mechanism that seeks to recognize new kinds of dangerous threats and hostile activi… ▽ More

    Submitted 1 April, 2024; v1 submitted 19 April, 2023; originally announced April 2023.

    Journal ref: Journal of Network and Computer Applications, Elsevier, 2023

  9. arXiv:2210.00642  [pdf, other

    cs.NI cs.PF eess.SP

    From 2G to 4G Mobile Network: Architecture and Key Performance Indicators

    Authors: Hamza Kheddar

    Abstract: The second-generation (2G) mobile systems were developed in response to the growing demand for a system that met mobile communication demands while also providing greater interoperability with other systems. International organizations were crucial in the development of a system that would offer better services, be more transparent, and be more interoperable with other networks. The aim of having… ▽ More

    Submitted 2 October, 2022; originally announced October 2022.

  10. arXiv:2207.11477  [pdf, other

    cs.NI eess.SP

    All you need for horizontal slicing in 5G network

    Authors: Hamza Kheddar, Soufiane Ouldkhaoua, Riadh Bouguerra

    Abstract: The telecommunication field has seen unprecedented growth in the last decade that has led to the release of several generations that have been committed to satisfy users by increasing the data rate and reducing the latency, especially in the 5G network. With fully commercialized 5G networks that is already launched in many country, Software-defined network (SDN) and network function virtualization… ▽ More

    Submitted 23 July, 2022; originally announced July 2022.