Meissa M, Benharzallah S, Kahloul L, Kazar O.
Social-aware Web API Recommendation in IoT. 21st International Arab Conference on Information Technology (ACIT) [Internet]. 2020.
Publisher's VersionAbstract
The core idea of IoT is the connectivity of real-world devices to the Internet, which allows them to expose their functionalities in APIs ways, communicate to other entities, and flow their data over internet. With the massive growth of connected IoT devices, the number of APIs have also increased. Thus, led up to overload information problem, which is making APIs selection more and more difficult for devices owners and users. Therefore, this paper propose web APIs recommendation framework in IoT environment based on social relationships. The main purpose is providing a novel Recommendation method, which enable to discover APIs and provide relevant suggestion for users. The proposed hybrid algorithm is combined content-based filtering and collaborative filtering techniques to improve the accuracy of rating prediction. Finally, experiments are conducted to evaluate the performance of recommendation.
Ahmid M, Kazar O, Benharzallah S, Kahloul L, Merizig A.
An Intelligent and Secure Health Monitoring System Based on Agent. IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) [Internet]. 2020.
Publisher's VersionAbstract
In this paper, we propose a novel, secure, and intelligent IoT approach based on agent, we have implemented in the health care domain, where we developed an intelligent patient monitoring system for monitoring the patients heart rate automatically. Our system is more intelligent that can anticipate the critical condition before it even happens, send a message to the patient family, doctors, nurses, as well as hospital in-charge personal, and launch an alarm to be assisted by the nearest people in place. Also, our architecture ensures the authentication, authorization, and data sensing confidentiality. Hospitals and medical clinics can utilize our system to monitor their outpatients who are in danger of unpredictable health conditions. The approach presented in the paper can also be applied to other IoT domains.
Aoudia I, Benhazrallah S, Kahloul L, Kazar O.
QoS-aware service composition in Fog-IoT computing using multi-population genetic algorithm. 21st International Arab Conference on Information Technology (ACIT) [Internet]. 2020.
Publisher's VersionAbstract
The Internet of things (IoT) is the integration of information space and physical space, becoming more and more popular in several places. In this paper, we will present QoS service composition approach based on multi-population genetic algorithm based on Fog-IoT computing, IoT-cloud architecture problems led us to use the 5-layared architecture implemented on a Fog computing system especially the transport layer. Our work was focus on this transport layer where we divided it into four sub-layers (security, storage, pre-processing & monitoring), it allows us to have promising advantages. Secondly, we implemented a multi-population genetic algorithm (MPGA) based on a QoS model, we considered seven QoS dimensions, i.e. Cost, response time, reliability, reputation, location, security and availability. Experimental results show the excellent results of MPGA in terms of fitness value and execution time to handle our ambulance emergency study case.
GOLEA N-E-H, Melkemi K-E.
A Feature-based Fragile Watermarking for Tamper Detection using Voronoi Diagram Decomposition. 10th International Conference on Computer Science, Engineering and Applications (CCSEA 2020) [Internet]. 2020.
Publisher's VersionAbstract
In this paper, we have proposed a novel feature-based fragile watermarking scheme for image authentication. The proposed technique extracts Feature Points (FP) by performing the Harris corner detector and used them as germs to decomposes the host image in segments using Voronoi Diagram (VD). The authentication of each segment is guaranteed by using the Cyclic Redundancy Check code (CRC). Then, the CRC encoding procedure is applied to each segment to generate the watermark. Voronoi decomposition is employed because it has a good retrieval performance compared to similar geometrical decomposition algorithms. The security aspect of our proposed method is achieved by using the public key crypto-system RSA (Rivest–Shamir–Adleman) to encrypt the FP. Experimental results demonstrate the efficiency of our approach in terms of imperceptibility, the capability of detection of alterations, the capacity of embedding, and computation time. We have also prove the impact of VD decomposition on the quality of the watermarked image compared to block decomposition. The proposed method can be applicable in the case where the tamper detection is critical and only some regions of interest must be re-transmitted if they are corrupted, like in the case of medical images. An example of the application of our approach to medical image is briefly presented.
Noui L.
Weaknesses of Shamir’ssecret sharing scheme. International Conference on Computational Techniques and iIntelligent Machines, ICCTIM-. 2020.