Tahar Kechadi

ORCID: 0000-0002-0176-6281
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital and Cyber Forensics
  • Advanced Malware Detection Techniques
  • Data Mining Algorithms and Applications
  • Distributed and Parallel Computing Systems
  • Data Management and Algorithms
  • Peer-to-Peer Network Technologies
  • Digital Media Forensic Detection
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Clustering Algorithms Research
  • Parallel Computing and Optimization Techniques
  • Privacy-Preserving Technologies in Data
  • Smart Agriculture and AI
  • Cloud Computing and Resource Management
  • User Authentication and Security Systems
  • Network Security and Intrusion Detection
  • Customer churn and segmentation
  • Cloud Data Security Solutions
  • Advanced Data Storage Technologies
  • Handwritten Text Recognition Techniques
  • Scientific Computing and Data Management
  • Complex Network Analysis Techniques
  • Data Quality and Management
  • Caching and Content Delivery
  • Advanced Database Systems and Queries
  • Crime, Illicit Activities, and Governance

University College Dublin
2016-2025

Dublin City University
2023-2024

Beijing Institute of Technology
2024

University of Ulster
2022-2024

University of Laghouat
2024

University of Science and Technology Beijing
2022-2024

University of Cagliari
2022

University Ferhat Abbas of Setif
2022

Institut National Polytechnique de Toulouse
2015-2020

University Child Development School
2020

10.1016/j.eswa.2011.08.024 article EN Expert Systems with Applications 2011-08-21

This paper presents the first version of a Wireless Sensor Network simulator, called CupCarbon. It is multiagent and discrete event (WSN) simulator. Networks can be designed prototyped in an ergonomic user-friendly interface using OpenStreetMap (OSM) framework by de

10.4108/icst.simutools.2014.254811 preprint EN 2014-01-01

6G wireless networks improve on 5G by further increasing reliability, speeding up the and available bandwidth. These evolutionary enhancements, together with a number of revolutionary improvements such as high-precision 3D localization, ultra-high reliability extreme mobility, introduce new generation 6G-native applications. Such application can be based on, for example, distributed, ubiquitous Artificial Intelligence (AI) ultra-reliable, low-latency Internet Things (IoT). Along enhanced...

10.1109/6gsummit49458.2020.9083832 article EN 2020-03-01

A trust management system (TMS) is an integral component of any Internet Things (IoT) network. reliable TMS must guarantee the network security, data integrity, and act as a referee that promotes legitimate devices, punishes malicious activities. Trust scores assigned by TMSs reflect devices' reputations, which can help predict future behaviors entities subsequently judge reliability different in IoT networks. Many have been proposed literature, these systems are designed for small-scale...

10.1109/jiot.2022.3201772 article EN IEEE Internet of Things Journal 2022-08-25

Vehicular social networking is an emerging application of the Internet Vehicles (IoV) which aims to achieve seamless integration vehicular networks and networks. However, unique characteristics networks, such as high mobility frequent communication interruptions, make content delivery end-users under strict delay constraints extremely challenging. In this paper, we propose a social-aware edge computing architecture that solves problem by using some vehicles in network servers can store...

10.1109/tits.2023.3250320 article EN cc-by IEEE Transactions on Intelligent Transportation Systems 2023-03-14

Metaverse is a virtual environment where users are represented by their avatars to navigate world having strong links with its physical counterpart. The state-of-the-art architectures rely on cloud-based approach for avatar physics emulation and graphics rendering computation. current centralized architecture of such systems unfavorable as it suffers from several drawbacks caused the long latency cloud access, low-quality visualization. To this end, we propose Fog-Edge hybrid computing...

10.26599/tst.2023.9010052 article EN Tsinghua Science & Technology 2023-12-04

Data Warehouse (DW) is a common term used in the Mining process for storing copious amounts of data ready analysis. Organizations are starting to prioritize Warehouses, which essential mining their historical datasets. In healthcare industry, significance warehouses escalates due critical nature managing and processing medical data, plays crucial role facilitating optimal delivery generation valuable insights. While clinical complex, its timely integration analysis providing excellent...

10.1016/j.imu.2023.101270 article EN cc-by Informatics in Medicine Unlocked 2023-01-01

10.1016/j.eswa.2013.04.020 article EN Expert Systems with Applications 2013-05-06

The Metaverse is a virtual environment where users are represented by avatars to navigate world, which has strong links with the physical one. State-of-the-art architectures rely on cloud-based approach for avatar physics emulation and graphics rendering computation. Such centralized design unfavorable as it suffers from several drawbacks caused long latency required cloud access, such low quality visualization. To solve this issue, in paper, we propose Fog-Edge hybrid computing architecture...

10.36227/techrxiv.19606954 preprint EN cc-by-nc-sa 2022-04-21

Abstract Recent advances in Information and Communication Technologies have a significant impact on all sectors of the economy worldwide. Digital Agriculture appeared as consequence democratisation digital devices artificial intelligence data science. agriculture created new processes for making farming more productive efficient while respecting environment. sophisticated science allowed collection analysis vast amounts agricultural datasets to help farmers, agronomists, professionals...

10.1186/s40537-022-00668-2 article EN cc-by Journal Of Big Data 2022-12-23

Recently, money laundering is becoming more and sophisticated, it seems to have moved from the personal gain cliché of drug trafficking financing terrorism. This criminal activity poses a serious threat not only financial institutions but also nation. Today, most international been implementing anti-money solutions traditional investigative techniques consume numerous man-hours. Besides, existing commercial are based on statistics such as means standard deviations therefore efficient enough,...

10.1109/icdmw.2010.66 article EN IEEE ... International Conference on Data Mining workshops 2010-12-01

Having a clear view of events that occurred over time is difficult objective to achieve in digital investigations (DI). Event reconstruction, which allows investigators understand the timeline crime, one most important step DI process. This complex task requires exploration large amount due pervasiveness new technologies nowadays. Any evidence produced at end investigative process must also meet requirements courts, such as reproducibility, verifiability, validation, etc. For this purpose,...

10.1016/j.diin.2014.05.009 article EN cc-by-nc-nd Digital Investigation 2014-07-17

Band selection (dimensionality reduction) plays an essential role in hyper-spectral image processing and applications. This article presents a unified comparison framework for systematic performance of filter-based feature models conducts comparative evaluation four methods: maximal minimal associated index (MMAIQ), mutual information-based max-dependency criterion (mRMR), relief (Relief-F), correlation-based (CFS) band selection. The is based on the effectiveness, robustness, classification...

10.1080/01431161.2013.827815 article EN International Journal of Remote Sensing 2013-09-17
Coming Soon ...