Hassan Mathkour

ORCID: 0000-0001-8663-3017
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Database Systems and Queries
  • Service-Oriented Architecture and Web Services
  • Algorithms and Data Compression
  • Natural Language Processing Techniques
  • Genomics and Phylogenetic Studies
  • Machine Learning in Bioinformatics
  • Topic Modeling
  • Advanced Text Analysis Techniques
  • Robotic Path Planning Algorithms
  • Semantic Web and Ontologies
  • Advanced Steganography and Watermarking Techniques
  • Data Mining Algorithms and Applications
  • Digital Media Forensic Detection
  • Distributed systems and fault tolerance
  • Text and Document Classification Technologies
  • Speech Recognition and Synthesis
  • Distributed and Parallel Computing Systems
  • Fuzzy Logic and Control Systems
  • Speech and Audio Processing
  • Biometric Identification and Security
  • Robotics and Sensor-Based Localization
  • Spam and Phishing Detection
  • Chaos-based Image/Signal Encryption
  • Image Retrieval and Classification Techniques
  • Opportunistic and Delay-Tolerant Networks

King Saud University
2015-2024

Laboratoire d'Informatique de Paris-Nord
2015

The King's College
2014

Policy making for smart cities: innovation and social inclusive economic growth sustainability 1. Introduction This paper aims to query the scientific debate related a new generation of policy-aware cities research geared towards socially sustainability.It summarizes rationale behind relevant JSTPM Special Issue its overall objective serve as reference policymakers, educators, practitioners, government think-tank officers interested in emerging topics research.This examines state-of-the-art...

10.1108/jstpm-07-2018-079 article EN Journal of Science and Technology Policy Management 2018-06-28

Hand gesture recognition is an attractive research field with a wide range of applications, including video games and telesurgery techniques. Another important application hand the translation sign language, which complicated structured form gestures. In fingers' configuration, hand's orientation, relative position to body are primitives expressions. The importance has increased due prevalence touchless applications rapid growth hearing-impaired population. However, developing efficient...

10.1109/access.2020.3032140 article EN cc-by IEEE Access 2020-01-01

An Intrusion detection system is an essential security tool for protecting services and infrastructures of wireless sensor networks from unseen unpredictable attacks. Few works machine learning have been proposed intrusion in that achieved reasonable results. However, these still need to be more accurate efficient against imbalanced data problems network traffic. In this paper, we a new model detect attacks based on genetic algorithm extreme gradient boosting (XGBoot) classifier, called...

10.3390/s19204383 article EN cc-by Sensors 2019-10-10

Nowadays, Internet of Things (IoT) technology has various network applications and attracted the interest many research industrial communities. Particularly, number vulnerable or unprotected IoT devices drastically increased, along with amount suspicious activity, such as botnet large-scale cyber-attacks. In order to address this security issue, researchers have deployed machine deep learning methods detect attacks targeting compromised devices. Despite these efforts, developing an efficient...

10.3390/s20216336 article EN cc-by Sensors 2020-11-06

This paper presents an adaptation of the flying ant colony optimization (FACO) algorithm to solve traveling salesman problem (TSP). new modification is called dynamic (DFACO). FACO was originally proposed quality service (QoS)-aware web selection problem. Many researchers have addressed TSP, but most solutions could not avoid stagnation In FACO, a deposits pheromone by injecting it from distance; therefore, only nodes on path also neighboring receive pheromone. The amount node receives...

10.3390/s19081837 article EN cc-by Sensors 2019-04-17

This paper presents a novel Arabic Sign Language (ArSL) recognition system, using selected 2D hands and body key points from successive video frames. The system recognizes the recorded signs, for both signer dependent independent modes, concatenation of 3D CNN skeleton network point convolution network. To accomplish this, we built new ArSL video-based sign database. We will present detailed methodology recording dataset, which comprises 80 static dynamic signs that were repeated five times...

10.1109/access.2021.3069714 article EN cc-by IEEE Access 2021-01-01

Sign language is the main channel for hearing-impaired people to communicate with others. It a visual that conveys highly structured components of manual and non-manual parameters such it needs lot effort master by hearing people. recognition aims facilitate this mastering difficulty bridge communication gap between This study presents an efficient architecture sign based on convolutional graph neural network (GCN). The presented consists few separable 3DGCN layers, which are enhanced...

10.3390/s22124558 article EN cc-by Sensors 2022-06-16

Recently, several countries have been trying hard to facilitate the integration of disabled people into their societies by ensuring equal opportunities through ease access social services, daily human necessities, and labor market. Deafness is considered one major disabilities separating deaf from society. To integrate fully society, a two-way mode communication required: hearing people, other deaf. Communication person generally easy can be done speech recognition text-to-sign...

10.1016/j.jksuci.2023.101642 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2023-07-01

Due to the maturing of digital image processing techniques, there are many tools that can forge an easily without leaving visible traces and lead problem authentication images. Based on assumption forgery alters texture micro-patterns in a descriptors be used for modeling this change; we employed two stat-of-the-art local descriptors: multi-scale Weber's law descriptor (multi-WLD) binary pattern (multi-LBP) splicing copy-move detection. As tamper not open eyes, so chrominance components...

10.1142/s0218213015400163 article EN International Journal of Artificial Intelligence Tools 2015-08-01

Although fingerprint-based systems are the commonly used biometric systems, they suffer from a critical vulnerability to presentation attack (PA). Therefore, several approaches based on fingerprint biometrics have been developed increase robustness against PA. We propose an alternative approach combination of and electrocardiogram (ECG) signals. An ECG signal has advantageous characteristics that prevent replication. Combining with is potentially interesting solution reduce impact PAs in...

10.3390/s20072085 article EN cc-by Sensors 2020-04-07

Sentiment is currently one of the most emerging areas research due to large amount web content coming from social networking websites. analysis a crucial process for recommending systems people. Generally, purpose sentiment determine an author’s attitude toward subject or overall tone document. There huge collection studies that make effort predict how useful online reviews will be and have produced conflicting results on efficacy different methodologies. Furthermore, many current solutions...

10.3390/s23115232 article EN cc-by Sensors 2023-05-31

Speaker recognition is an important application of digital speech processing. However, a major challenge degrading the robustness speaker-recognition systems variation in emotional states speakers, such as happiness, anger, sadness, or surprise. In this paper, we propose speaker system corresponding to three states, namely emotional, neutral, and with no consideration for speaker's state (i.e., can be neutral state), two languages: Arabic English. Additionally, cross-language was applied...

10.1109/access.2020.2983029 article EN cc-by IEEE Access 2020-01-01

A high-performance versatile computer-assisted pronunciation training (CAPT) system that provides the learner immediate feedback as to whether their is correct very helpful in learning and allows learners practice this at any time with unlimited repetitions, without presence of an instructor. In paper, we propose deep learning-based techniques build a CAPT for mispronunciation detection diagnosis (MDD) articulatory generation non-native Arabic learners. The proposed can locate error...

10.3390/math10152727 article EN cc-by Mathematics 2022-08-02

In recent times, the progress of machine learning has facilitated development decision support systems that exhibit predictive accuracy, surpassing human capabilities in certain scenarios. However, this improvement come at cost increased model complexity, rendering them black-box models obscure their internal logic from users. These black boxes are primarily designed to optimize limiting applicability critical domains such as medicine, law, and finance, where both accuracy interpretability...

10.3390/info14080469 article EN cc-by Information 2023-08-21

Various image steganography techniques have been proposed. In this paper, we investigate diverse and tools. We state a set of criteria to analyze evaluate the strengths weaknesses presented techniques. propose more robust technique that takes advantages avoids limitations.

10.1109/wicom.2008.2918 article EN 2008-10-01

Virtual reality technologies and their applications have received increasing attention in recent years from various perspectives. The thriving numbers behind adoption exploitation for dif...

10.1080/0144929x.2016.1235815 article EN Behaviour and Information Technology 2016-09-23

This paper presents an enhanced artificial bee colony (ABC) algorithm for solving the web service selection problem. The proposed searches best possible combination of services to satisfy user requirements. An adapted neighborhood and replacement process a swapping are used improve ABC behavior. Neighboring nodes employed enhance performance by encouraging exploration in early iterations, where bees have no knowledge regarding search space, exploitation later iterations exploit space. is...

10.1109/access.2019.2894683 article EN cc-by IEEE Access 2019-01-01
Coming Soon ...