Bassem Ben Hamed

ORCID: 0000-0003-1586-9537
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Differential Equations and Dynamical Systems
  • Nonlinear Waves and Solitons
  • Quantum chaos and dynamical systems
  • Stability and Control of Uncertain Systems
  • Vehicular Ad Hoc Networks (VANETs)
  • Autonomous Vehicle Technology and Safety
  • Meromorphic and Entire Functions
  • Neural Networks Stability and Synchronization
  • Traffic control and management
  • Retinal Imaging and Analysis
  • Stability and Controllability of Differential Equations
  • Adaptive Control of Nonlinear Systems
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Microtubule and mitosis dynamics
  • Numerical methods for differential equations
  • Neural Networks and Applications
  • Hydrological Forecasting Using AI
  • Coronary Interventions and Diagnostics
  • Spectral Theory in Mathematical Physics
  • Anomaly Detection Techniques and Applications
  • Chaos control and synchronization
  • Video Surveillance and Tracking Methods
  • Algebraic Geometry and Number Theory
  • Dam Engineering and Safety

University of Sfax
2014-2024

Diponegoro University
2024

Edinburgh Napier University
2024

Taibah University
2024

University of Manchester
2024

Gachon University
2024

Institute of Electronics
2012-2013

University of Gabès
2007-2012

Institut Supérieur des Sciences Appliquées et de Technologies de Gafsa
2012

The advancement of communication and internet technology has brought risks to network security. Thus, Intrusion Detection Systems (IDS) was developed combat malicious attacks. However, IDSs still struggle with accuracy, false alarms, detecting new intrusions. Therefore, organizations are using Machine Learning (ML) Deep (DL) algorithms in IDS for more accurate attack detection. This paper provides an overview IDS, including its classes methods, the detected attacks as well dataset, metrics,...

10.3389/fcomp.2024.1387354 article EN cc-by Frontiers in Computer Science 2024-06-10

In this paper, a neutral Hopfield neural network with bidirectional connection is considered. the first step, by choosing weights as parameters bifurcation, critical point at which zero root of multiplicity two occurs in characteristic equation associated linearized system. second we studied zeros third degree exponential polynomial order to make sure that except double root, all other roots have real parts are negative. Moreover, find values guarantee existence Bogdanov–Takens bifurcation....

10.1142/s1793524520500497 article EN International Journal of Biomathematics 2020-07-11

With the progression and sophistication of technology, frequency intricacy cyber-attacks also escalate. Malicious hackers cybercriminals are perpetually devising novel techniques to infiltrate computer systems steal vital data illicitly. To tackle these risks, organizations must deploy efficient Intrusion Detection Systems (IDSs) detect respond attacks promptly. In recent times, IDSs have garnered considerable interest due their efficacy accuracy in identifying anomalous patterns network...

10.1109/isorc61049.2024.10551335 article EN 2024-05-22

ABSTRACT In this paper we present a new sufficient condition for absolute stability of delay Lure system. This improves the one given in [1]. We use criterion to construct an observer‐based control class nonlinear time‐delay systems. Some examples are illustrate results paper.

10.1111/j.1934-6093.2007.tb00423.x article EN Asian Journal of Control 2007-09-01

We classify all functions satisfying nontrivial families of Painlevé VI equations. Each family is parameterized by an affine space. This space, except for the so-called constant families, generated points “geometric origin,” associated either to deformations elliptic surfaces with four singular fibers or three-sheeted covers ℙ1 branching locus consisting points.

10.1155/imrn.2005.3727 article EN International Mathematics Research Notices 2005-01-01

10.1007/s00009-012-0227-z article EN Mediterranean Journal of Mathematics 2012-10-11

In this paper, a Hopfield network model with three neurons, bidirectional connection and multiple delays is considered. We aim to show that the topology very important. fact, we consider connected weights of system as bifurcation parameters, critical values where Bogdanov–Takens occurs are derived. Using normal form method centre manifold theory, obtain our study its dynamical behaviours. Finally, numerical example given demonstrate validity results.

10.1093/imamci/dnv035 article EN IMA Journal of Mathematical Control and Information 2015-07-13

<title>Abstract</title> Image quality enhancement is a rapidly advancing field in computer vision, with researchers exploring various techniques. This paper introduces robust Gaussian noise removal, denoted as IQI-UNet, based on the U-Net deep learning architecture, which excels image denoising. The key advantage of our model its ability to operate without reference or prior knowledge application context. Our study investigates impact incorporating additional blocks into autoencoder,...

10.21203/rs.3.rs-4372745/v1 preprint EN cc-by Research Square (Research Square) 2024-05-14

Electric motors are crucial components in electric vehicles. However, defaults such induction machine can significantly impact the car's operation, disrupt traffic flow, and raise diagnostic costs, where many of these being progressive. This paper explores default detection approaches motors, focusing on employing support vector machines technique (SVMs) for identifying to mitigate potential consequences vehicle operation safety. The developed methodology is utilized classify different types...

10.1109/iraset60544.2024.10549645 article EN 2024-05-16

Specifically, Iraq is threatened in its second-largest northern city, Mosul, by the collapse of Mosul Dam due to problems at root dam, causing a wave floods that will cause massive loss life, resources, and public property. The objective this study effectively monitor level dam water predicting held In anticipation achieving flood stage breaking supporting behavior through formation 14-day time series data predict seven days later. Used six deep learning models (deep neural network (DNN),...

10.7717/peerj-cs.2416 article EN cc-by PeerJ Computer Science 2024-10-31

Evaporation plays a significant role in managing water resources and is an important indicator risk crisis management, particularly operating reservoirs dams. Precise predictions of evaporation rates are crucial to effective resource various modelling methods, including AI autoregression, have been employed create accurate models. This makes it more use innovative technology continuously monitor this phenomenon with scientific results, allowing decision-makers be aware prepare for potential...

10.54216/fpa.170225 article EN Fusion Practice and Applications 2024-11-14

Angiographic images contain a vast amount of information that can be extracted from both the image data itself and associated metadata. In field cardiology, Deep Learning has proven valuable for tasks such as stenosis detection localization.In this study, we focus on classification Left Right Coronary Artery using architectures applied to frames angiographic videos. Additionally, explore utilization Machine algorithms video metadata.Our experiments demonstrate methods achieve high...

10.1109/inista59065.2023.10310496 article EN 2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) 2023-09-20

There are many Vehicle Ad-Hoc Network (VANET) applications that can cause real problems and serious accidents for passengers using vehicles along the highway if rules changing safe lane (overtaking) between on road violated or not. The nature of use high speed driving it requires, as well changes in traffic conditions, vehicle density, situation weather unexpected obstacles make difficult to find enough time real-time information needed right decision at place. In this article, a new...

10.1109/hora55278.2022.9800087 article EN 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) 2022-06-09

We classify all functions satisfying non-trivial families of PVI equations. It turns out that, up to an Okamoto equivalence, there are exactly four parameterized by affine planes or lines. Each space is generated points "geometric origin", associated either deformations elliptic surfaces with singular fibers, three-sheeted covers the projective line branching locus consisting points.

10.48550/arxiv.math/0507002 preprint EN other-oa arXiv (Cornell University) 2005-01-01

10.1016/j.bulsci.2019.102796 article EN publisher-specific-oa Bulletin des Sciences Mathématiques 2019-09-20

Vehicular Ad-hoc Networks (VANETs) applications can pose serious issues to highway users if the rules for safe lane change (overtaking) between vehicles on road are violated. It is a challenging task make right decision at time due high speed of and changing conditions highway. In this research paper, we propose novel algorithm cooperative semi-automated S-AV that emphasizes passing highway, how find way despite vehicles. We classify types overtaking depending condition into major categories...

10.1109/isncc55209.2022.9851707 article EN 2022 International Symposium on Networks, Computers and Communications (ISNCC) 2022-07-19
Coming Soon ...