- Advanced Differential Equations and Dynamical Systems
- Nonlinear Waves and Solitons
- Quantum chaos and dynamical systems
- Stability and Control of Uncertain Systems
- Vehicular Ad Hoc Networks (VANETs)
- Autonomous Vehicle Technology and Safety
- Meromorphic and Entire Functions
- Neural Networks Stability and Synchronization
- Traffic control and management
- Retinal Imaging and Analysis
- Stability and Controllability of Differential Equations
- Adaptive Control of Nonlinear Systems
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Microtubule and mitosis dynamics
- Numerical methods for differential equations
- Neural Networks and Applications
- Hydrological Forecasting Using AI
- Coronary Interventions and Diagnostics
- Spectral Theory in Mathematical Physics
- Anomaly Detection Techniques and Applications
- Chaos control and synchronization
- Video Surveillance and Tracking Methods
- Algebraic Geometry and Number Theory
- Dam Engineering and Safety
University of Sfax
2014-2024
Diponegoro University
2024
Edinburgh Napier University
2024
Taibah University
2024
University of Manchester
2024
Gachon University
2024
Institute of Electronics
2012-2013
University of Gabès
2007-2012
Institut Supérieur des Sciences Appliquées et de Technologies de Gafsa
2012
The advancement of communication and internet technology has brought risks to network security. Thus, Intrusion Detection Systems (IDS) was developed combat malicious attacks. However, IDSs still struggle with accuracy, false alarms, detecting new intrusions. Therefore, organizations are using Machine Learning (ML) Deep (DL) algorithms in IDS for more accurate attack detection. This paper provides an overview IDS, including its classes methods, the detected attacks as well dataset, metrics,...
In this paper, a neutral Hopfield neural network with bidirectional connection is considered. the first step, by choosing weights as parameters bifurcation, critical point at which zero root of multiplicity two occurs in characteristic equation associated linearized system. second we studied zeros third degree exponential polynomial order to make sure that except double root, all other roots have real parts are negative. Moreover, find values guarantee existence Bogdanov–Takens bifurcation....
With the progression and sophistication of technology, frequency intricacy cyber-attacks also escalate. Malicious hackers cybercriminals are perpetually devising novel techniques to infiltrate computer systems steal vital data illicitly. To tackle these risks, organizations must deploy efficient Intrusion Detection Systems (IDSs) detect respond attacks promptly. In recent times, IDSs have garnered considerable interest due their efficacy accuracy in identifying anomalous patterns network...
ABSTRACT In this paper we present a new sufficient condition for absolute stability of delay Lure system. This improves the one given in [1]. We use criterion to construct an observer‐based control class nonlinear time‐delay systems. Some examples are illustrate results paper.
We classify all functions satisfying nontrivial families of Painlevé VI equations. Each family is parameterized by an affine space. This space, except for the so-called constant families, generated points “geometric origin,” associated either to deformations elliptic surfaces with four singular fibers or three-sheeted covers ℙ1 branching locus consisting points.
In this paper, a Hopfield network model with three neurons, bidirectional connection and multiple delays is considered. We aim to show that the topology very important. fact, we consider connected weights of system as bifurcation parameters, critical values where Bogdanov–Takens occurs are derived. Using normal form method centre manifold theory, obtain our study its dynamical behaviours. Finally, numerical example given demonstrate validity results.
<title>Abstract</title> Image quality enhancement is a rapidly advancing field in computer vision, with researchers exploring various techniques. This paper introduces robust Gaussian noise removal, denoted as IQI-UNet, based on the U-Net deep learning architecture, which excels image denoising. The key advantage of our model its ability to operate without reference or prior knowledge application context. Our study investigates impact incorporating additional blocks into autoencoder,...
Electric motors are crucial components in electric vehicles. However, defaults such induction machine can significantly impact the car's operation, disrupt traffic flow, and raise diagnostic costs, where many of these being progressive. This paper explores default detection approaches motors, focusing on employing support vector machines technique (SVMs) for identifying to mitigate potential consequences vehicle operation safety. The developed methodology is utilized classify different types...
Specifically, Iraq is threatened in its second-largest northern city, Mosul, by the collapse of Mosul Dam due to problems at root dam, causing a wave floods that will cause massive loss life, resources, and public property. The objective this study effectively monitor level dam water predicting held In anticipation achieving flood stage breaking supporting behavior through formation 14-day time series data predict seven days later. Used six deep learning models (deep neural network (DNN),...
Evaporation plays a significant role in managing water resources and is an important indicator risk crisis management, particularly operating reservoirs dams. Precise predictions of evaporation rates are crucial to effective resource various modelling methods, including AI autoregression, have been employed create accurate models. This makes it more use innovative technology continuously monitor this phenomenon with scientific results, allowing decision-makers be aware prepare for potential...
Angiographic images contain a vast amount of information that can be extracted from both the image data itself and associated metadata. In field cardiology, Deep Learning has proven valuable for tasks such as stenosis detection localization.In this study, we focus on classification Left Right Coronary Artery using architectures applied to frames angiographic videos. Additionally, explore utilization Machine algorithms video metadata.Our experiments demonstrate methods achieve high...
There are many Vehicle Ad-Hoc Network (VANET) applications that can cause real problems and serious accidents for passengers using vehicles along the highway if rules changing safe lane (overtaking) between on road violated or not. The nature of use high speed driving it requires, as well changes in traffic conditions, vehicle density, situation weather unexpected obstacles make difficult to find enough time real-time information needed right decision at place. In this article, a new...
We classify all functions satisfying non-trivial families of PVI equations. It turns out that, up to an Okamoto equivalence, there are exactly four parameterized by affine planes or lines. Each space is generated points "geometric origin", associated either deformations elliptic surfaces with singular fibers, three-sheeted covers the projective line branching locus consisting points.
Vehicular Ad-hoc Networks (VANETs) applications can pose serious issues to highway users if the rules for safe lane change (overtaking) between vehicles on road are violated. It is a challenging task make right decision at time due high speed of and changing conditions highway. In this research paper, we propose novel algorithm cooperative semi-automated S-AV that emphasizes passing highway, how find way despite vehicles. We classify types overtaking depending condition into major categories...