Moez Krichen

Moez Krichen
Albaha University, Albaha, Saudi Arabia · Computer Science

PhD

About

170
Publications
27,273
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,739
Citations
Introduction
Moez Krichen currently works at the Computer Science, Albaha University, Albaha, Saudi Arabia.

Publications

Publications (170)
Chapter
Large pose variation is considered a major research concern due to its significant impact on the performance of face recognition systems. In this paper, we present a new efficient Machine-Learning Based System that identifies a person’s face in 3D under Large pose variation. The proposed system can automatically detect and recognize people under tr...
Article
Full-text available
In this study, a scalable and real-time intelligent transportation system based on a big data framework is presented. The proposed system allows for the use of existing data from road sensors to better understand traffic flow, and traveler behavior and increase road network performance. Our transportation system is designed to process large-scale s...
Article
Full-text available
According to the risk investigations of being involved in an accident, alcohol-impaired driving is one of the major causes of motor vehicle accidents. Preventing highly intoxicated persons from driving could potentially save many lives. This paper proposes a lightweight in-vehicle alcohol detection that processes the data generated from six alcohol...
Article
Exhaust research work has been carried out in the field of Terrestrial Wireless Sensor Networks (TWSN). Now, research penetration is moving toward Underwater Acoustic Sensor Networks (UASNs). The communication of UASNs has dependencies on acoustic instead of radio. Efficient data collection by the UASN seems a tedious job in comparison with TWSN du...
Article
Full-text available
It has been noted that disease detection approaches based on deep learning are becoming increasingly important in artificial intelligence-based research in the field of agriculture. Studies conducted in this area are not at the level that is desirable due to the diversity of plant species and the regional characteristics of many of these species. A...
Preprint
Full-text available
According to the risk investigations of being involved in an accident, alcohol-impaired driving is one of the major causes of motor-vehicles accidents. Preventing highly intoxicated persons from driving would potentially save many lives. This paper proposes a lightweight in-vehicle alcohol detection that processes the data generated from 6-alcohol...
Article
Full-text available
Blockchain is a modern technology that has revolutionized the way society interacts and trades. It could be defined as a chain of blocks that stores information with digital signatures in a distributed and decentralized network. This technique was first adopted for the creation of digital cryptocurrencies, such as Bitcoin and Ethereum. However, res...
Article
Full-text available
In centralized video streaming platforms, the platform owner, rather than the content producer, controls most of the content uploaded on the centralized video platform.—Blockchain-based video streaming systems aim to create decentralized peer-to-peer networks for video streaming services with various monetization options. Video transcoding is commo...
Article
Full-text available
The concept of mobile healthcare systems is promising. It is based on the cloud connected wireless biomedical wearables. In this scenario, the compression, processing, transmission and power effectiveness with precision are the key terms. A novel technique is presented for arrhythmia identification by processing the electrocardiogram (ECG) signals....
Article
Full-text available
Smart meters are key elements of a smart grid. These data from Smart Meters can help us analyze energy consumption behaviour. The machine learning and deep learning approaches can be used for mining the hidden theft detection information in the smart meter data. However, it needs effective data extraction. This research presents a theft detection d...
Preprint
Full-text available
Microgrids are becoming popular nowadays because they provide clean, efficient, and low-cost energy. To use the stored energy in times of emergency or peak loads, microgrids require bulk storage capacity. Since microgrids are the future of renewable energy, the energy storage technology employed should be optimized to generate electricity. Batterie...
Cover Page
Full-text available
Special Issue Information: The fossil-fuel depletion, along with growing awareness of deteriorating climatic conditions, has prompted the adoption of alternative energy technologies. Moreover, after the Paris 2015 climate convention a remarkable evolution is made to reduce the greenhouse gas emission, it is particularly remarkable in the transport...
Article
Full-text available
The roots of Wireless Sensor Networks (WSNs) are tracked back to US military developments, and, currently, WSNs have paved their way into a vast domain of civil applications, especially environmental, critical infrastructure, habitat monitoring, etc. In the majority of these applications, WSNs have been deployed to monitor critical and inaccessible...
Article
Full-text available
Global agricultural production, in particular, is of increasing concern to the major international organizations in charge of nutrition. The rising demand for food globally due to unprecedented population growth has led to food insecurity in some populated regions such as Africa. Another contributing factor to global food insecurity is climate chan...
Article
Full-text available
Computer science plays an important role in modern dynamic health systems. Given the collaborative nature of the diagnostic process, computer technology provides important services to healthcare professionals and organizations, as well as to patients and their families, researchers, and decision-makers. Thus, any innovations that improve the diagno...
Article
Full-text available
Though many researchers have studied plant leaf disease, the timely diagnosis of diseases in olive leaves still presents an indisputable challenge. Infected leaves may display different symptoms from one plant to another, or even within the same plant. For this reason, many researchers studied the effects of those diseases on, at most, two plants....
Article
Full-text available
IoT (Internet of Things) systems are still facing a great number of attacks due to their integration in several areas of life. The most-reported attacks against IoT systems are "Denial of Service" (DoS) and "Distributed Denial of Service" (DDoS) attacks. In this paper, we investigate DoS/DDoS attacks detection for IoT using machine learning techniq...
Article
Full-text available
Food security has become a real challenge for some organizations in charge of the food program and for the majority of countries, especially African countries. The United Nations Organizations’ has recently defined the end of hunger and the improvement of food security in 2030 as its primary goal. Improving food security could also pass through the...
Article
Full-text available
The massive modern technical revolution in electronics, cognitive computing, and sensing has provided critical infrastructure for the development of today’s Internet of Things (IoT) for a wide range of applications. However, because endpoint devices’ computing, storage, and communication capabilities are limited, IoT infrastructures are exposed to...
Article
Full-text available
The use of Blockchain technology has recently become widespread. It has emerged as an essential tool in various academic and industrial fields, such as healthcare, transportation, finance, cybersecurity, and supply chain management. It is regarded as a decentralized, trustworthy, secure, transparent, and immutable solution that innovates data shari...
Article
Full-text available
Power Quality Disturbances (PQDs) commonly occur in large scale power systems and networks that rise critical issues. Therefore, an automated recognition and mitigation of PQDs is necessary. In this scenario, an efficient adaptive rate technique is proposed for viable features mining and recognition of PQDs. Event-driven A/D converters (EDADCs) are...
Chapter
Full-text available
In the case of the fight against COVID-19, social distancing has proven tobe an effective intervention to minimize disease transmission. AI/Deep Learning hasrecently lent itself as a great tool to solving almost every conceivable problem in dailylife and has shown significant promising results for such problems. In this article, wewill explore in-d...
Chapter
Full-text available
The alarming situation caused by COVID-19 has prompted the artificialintelligence community to think about using new tools in order to contribute to thefight against COVID-19. Computer vision is a sub-discipline of AI that is blossomingsince 2010s and helps in diverse fields like robotics, self-driving cars, health care byhandling very complex nonl...
Conference Paper
Full-text available
This work presents a short review on the most relevant studies in the context of testing Blockchain-Oriented Software (BoS), especially at the smart contract level. Focusing on dynamic testing, we first provide a classification of 20 studies according to the accessibility of smart contract code. Second, we give an overview of each identified work w...
Preprint
Full-text available
In this paper, we present a scalable and real-time intelligent transportation system based on a big data framework. The proposed system allows for the use of existing data from road sensors to better understand traffic flow, traveler behavior, and increase road network performance. Our transportation system is designed to process large-scale stream...
Preprint
Full-text available
div>We propose a new model-based testing approach which takes as input a set of requirements described in Arabic Controlled Natural Language (CNL) which is a subset of the Arabic language generated by a specific grammar. The semantics of the considered requirements is defined using the Case Grammar Theory (CTG). The requirements are translated into...
Preprint
div>We propose a new model-based testing approach which takes as input a set of requirements described in Arabic Controlled Natural Language (CNL) which is a subset of the Arabic language generated by a specific grammar. The semantics of the considered requirements is defined using the Case Grammar Theory (CTG). The requirements are translated into...
Preprint
Full-text available
This paper proposes an architecture taking advantage of artificial intelligence and text mining techniques in order to: (i) detect paranoid people by classifying their set of tweets into two classes (Paranoid/not-Paranoid), (ii) ensure the surveillance of these people by classifying their tweets about Covid-19 into two classes (person with normal b...
Preprint
Full-text available
This paper proposes an architecture taking advantage of artificial intelligence and text mining techniques in order to: (i) detect paranoid people by classifying their set of tweets into two classes (Paranoid/not-Paranoid), (ii) ensure the surveillance of these people by classifying their tweets about Covid-19 into two classes (person with normal b...
Article
Full-text available
Despite the seemingly exponential growth of mobile and wireless communication, this same technology aims to offer uninterrupted access to different wireless systems like Radio Communication, Bluetooth, and Wi-Fi to achieve better network connection which in turn gives the best quality of service (QoS). Many analysts have established many handover d...
Article
Full-text available
Autonomous transportation is an inevitable means of day-to-day activity that supports a country’s economic growth. Effective communication systems design is an incentive for autonomous vehicles’ protection and comfort to be further extended. Inter-vehicle communication and effective ways for the user to communicate with the autonomous vehicle and t...
Article
Full-text available
To restrict COVID-19, individuals must remain two meters away from one another in public since public health authorities find this a healthy distance. In this way, the incidence of "social distancing" keeps pace with COVID-19 spread. For this purpose, the proposed solution consists of the development of a tool based on AI technologies which takes a...
Article
Full-text available
The Internet of Medical Things (IoMT) is a kind of associated smart-medical device infrastructure with applications, health services, and systems. These medical devices and applications are linked via the Internet to healthcare systems. The privacy and security for patient data, scalability, and data accessibility are the most complex IoT challenge...
Article
Full-text available
This article addresses the need of applying testing activities with the purpose of checking the consistency and the correctness of distributed and dynamically adaptable systems whose structure and behavior evolve dynamically at runtime. We identified in the literature a number of studies that used some traditional testing techniques (e.g., regressi...
Conference Paper
Full-text available
In the case of the fight against COVID-19, social distancing has proven to be an effective intervention to minimize disease transmission. AI / Deep Learning has recently lent itself as a great tool to solving almost every conceivable problem in daily life and has shown significant promising results for such problems. In this article, we will explor...
Conference Paper
Full-text available
The COVID-19 pandemic is a real threat to the survival of the human species by disabling mobility, education and economical productivity. This alarming situation has prompted the Artificial Intelligence community to think about using new tools in order to contribute to the fight against COVID-19. Computer vision is a sub-discipline of AI that is bl...
Conference Paper
Full-text available
The technological advancement is evolving the human–computer interaction (HCI). The goal is to ameliorate the HCI to a level where computers can be interacted in a natural way. It is a demanding aim and keeps the contemporary HCI systems complex and challenging. This paper aims to develop an effective hand gesture identification piloted HCI. It is...
Article
Full-text available
Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random w...
Article
Full-text available
Experts have predicted that COVID-19 may prevail for many months or even years before it can be completely eliminated. A major problem in its cure is its early screening and detection, which will decide on its treatment. Due to the fast contactless spreading of the virus, its screening is unusually difficult. Moreover, the results of COVID-19 tests...
Article
Full-text available
One of the key challenges in ad-hoc networks is the resource discovery problem. How ef ciently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question? Broadcasting is a basic technique in the Mobile Ad-hoc Networks (MANETs), and it refers to sending a packet from one node to e...
Article
Full-text available
As the Internet of Things (IoT) is evolving, one of its rapidly developing components is the transformation of standard Vehicle Ad-hoc Networks (VANETs) into the Internet of Vehicles (IoV). Due to the exceptional progress in computation and communication technologies, the IoV has attracted the attention of researchers and commercial companies. Neve...
Article
Full-text available
The usage of wearable gadgets is growing in the cloud-based health monitoring systems. The signal compression, computational and power efficiencies play an imperative part in this scenario. In this context, we propose an efficient method for the diagnosis of cardiovascular diseases based on electrocardiogram (ECG) signals. The method combines multi...
Preprint
Full-text available
During the last decade, several research works have focused on providing novel deep learning methods in many application fields. However, few of them have investigated the weight initialization process for deep learning, although its importance is revealed in improving deep learning performance. This can be justified by the technical difficulties i...
Chapter
Full-text available
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they are exposed to a variety of attacks. The biggest challenge facing organizations is how to develop a WA that fulfills their requirements with respect to sensitive data exchange, E-commerce, and secure workflows. This paper identifies the most critical web vulne...
Article
With smartphones being so ubiquitous, more connected and largely fitted with several types of sensors such as GPS, microphones, cameras, magnetometers, accelerometers, etc; there is an increasing opportunity in the development of smartphone-based sensor systems. In this article, we propose a short survey on the use of smartphone sensors in the dete...
Chapter
Full-text available
Internet of Things (IoT) is composed of many IoT devices connected throughout the Internet, that collect and share information to represent the environment. IoT is currently restructuring the actual manufacturing to smart manufacturing. However, inherent characteristics of IoT lead to a number of titanic challenges such as decentralization, weak in...
Article
Full-text available
Technological advances in recent years have significantly changed the way an operating room works. This work aims to create a platform to solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations. Using this system, a doctor can control all operation rooms, especially before an ope...
Chapter
This paper deals with an efficient and robust distributed framework for finite state machine coverage in the field model based testing theory. All final states coverage in large-scale automaton is inherently computing-intensive and memory exhausting with impractical time complexity because of an explosion of the number of states. Thus, it is import...