Mtibaa Abdellatif(Since 2022) National Engineering School of Sfax (ENIMonastir from 2002 to 2022) · DGIMA
Mtibaa Abdellatif
Professor
About
379
Publications
162,715
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,975
Citations
Introduction
Additional affiliations
September 1992 - present
January 2005 - present
January 2002 - December 2007
Publications
Publications (379)
In recent years, convolutional neural networks (CNNs) have proven their effectiveness in many challenging computer vision-based tasks, including small object classification. However, according to recent literature, this task is mainly based on 2D CNNs, and the small size of object instances makes their recognition a challenging task. Since 3D CNNs...
The outbreak of novel coronavirus (2019-nCOV, commonly known as COVID-19) was declared a global pandemic by the World Health Organization (WHO) in March 2020. An accurate diagnostic tool is needed to test for COVID-19, as this disease is highly contagious and can be fatal in some patients. The use of radiological methods to detect the early stages...
Deep convolutional neural networks (DCNNs) have been mainly powerful and important artificial intelligence techniques, which are exploited in various computer vision applications, such as facial point detection (FPD), owing their versatility and high performance. The role of DCNNs in this area is pivotal due to their ability to learn hierarchical f...
This paper proposes a novel method using a machine learning-based Adaptive Neuro-Fuzzy Inference System (ANFIS) to optimize Maximum Power Point Tracking (MPPT) in variable-speed Wind Turbines (WT). The ANFIS algorithm, blending artificial neural networks and fuzzy logic, addresses issues with traditional wind speed sensors, such as cost, imprecisio...
Plant diseases pose a significant problem for agricultural sustainability, notably reducing crop quality and yield. Addressing this challenge, this study introduces an AI-based smart agriculture 4.0 system specifically designed for diagnosing plant leaf diseases. Using a self-generated dataset collected from the Monastir region of Tunisia, the syst...
The explosive growth of Internet of Things (IoT) applications has driven the development of specialized communication technologies to cater to diverse device needs. Narrowband IoT (NB-IoT) is a promising low-power wide-area network (LPWAN) technology designed to support massive machine-type communication (MTC) with tolerant delay transmission. Howe...
In today's interconnected world, digital data transmissions are an integral part of our communication systems. Connected objects are commonly used in digital life, however, they can be vulnerable to hacking and personal data theft due to inadequate security. To address the size and capability limitations of existing embedded devices, lightweight cr...
Autonomous vehicles are a family of complex systems permanently connected to the rest of the world and communicating autonomously with other systems. It has a certain on-board intelligence and good decision-making autonomy. Among the challenges faced by autonomous vehicles are the detection and tracking of multi-objects in the path of the vehicle i...
Following the considerable development of big data and the need for real-time information process-ing, the recent computing paradigm changed from centralized intelligence on cloud computing tothe distributed intelligence on Edge Computing. On the algorithm layer, Artificial Intelligence (AI) hasbeen applied in different areas related to intelligent...
This paper presents an optimized Parallel Prefix Adders (PPA) based on Quantum dot Cellular
Automata (QCA) technology. PPA presents the most used block in Arithmetic Logic Units (ALU)
which presents a fundamental part in several digital integrated circuits. The classical implemen-
tation method of PPA based on traditional Complementary Metal Oxide...
Agriculture serves as a vital sector in Tunisia, supporting the nation's economy and ensuring food production. However, the detrimental impact of plant diseases on crop yield and quality presents a significant challenge for farmers. In this context, computer vision techniques have emerged as promising tools for automating disease detection processe...
Direct Torque Control (DTC) of Induction Machine (IM) has received increasing attention due to its high performance and low dependence on machine parameters. Recently, intelligent approaches have been proposed to improve the DTC performance, in particular the reduction in the torque and the flux ripples. In this paper, an approach for designing DTC...
Real-time stereo matching with high accuracy is a dynamic research topic; it is attractive in diverse computer vision applications. This paper presents a stereo-matching algorithm that produces high-quality disparity map while maintaining real-time performance. The proposed stereo-matching method is based on three per-pixel difference measurements...
Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems with software implementation have been studied and documented in the literature. Nevertheless, with the fast growth of the internet and connected objects, the development of hardware secure and low-res...
Human facial emotion recognition (FER) has attracted interest from the scientific community for its prospective uses. The fundamental goal of FER is to match distinct facial expressions to different emotional states. Recent state-of-the-art studies have generally adopted more complex methods to achieve this aim, such as large-scale deep learning mo...
Undeniably, the Internet of Things (IoT) ecosystem keeps on advancing at a fast speed, far above all predictions for growth and ubiquity. From sensor to cloud, this massive network continues to break technical limits in a variety of ways, and wireless sensor nodes are likely to become more prevalent as the number of Internet of Things devices incre...
In this contribution, a robust image cryptosystem built over a diffusion-confusion architecture is established. The design of a hardware pseudorandom number generator is achieved using two different chaotic systems: Lorenz chaotic system and Rössler chaotic system, exploited to build a single generic architecture. The proposed PRNG is designed usin...
This paper proposed a hardware architecture of a strong block‐cipher system dedicated to digital image encryption and decryption. On the one hand, a pseudorandom number generator (PRNG) based on two 3D chaotic systems is created to produce strong keys. On the other hand, a robust algorithm is proposed to ensure high‐level security and low computati...
The research progress in multimodal learning has grown rapidly over the last decade in several areas, especially in computer vision. The growing potential of multimodal data streams and deep learning algorithms has contributed to the increasing universality of deep multimodal learning. This involves the development of models capable of processing a...
Nowadays, secure digital data in store and transmission is an important issue. Cryptographic methods are widely used to provide optimal security for multimedia data. In this paper, a good performance implementation of a strong block-cipher system is proposed. This article's contribution is to develop a new method to block-cipher hardware system bas...
This article puts forward a fast chaos‐RSA‐based hybrid cryptosystem to secure and authenticate secret images. The SHA‐512 is used to generate a 512‐bit initial key. The RSA system is used to encrypt the initial secret key and signature generation for both the sender and image authentication. In fact, a powerful block‐cipher algorithm is developed...
Quantum-dot cellular automata (QCA) is a promising nanotechnology that offers an alternative to complementary metal-oxide-semiconductor (CMOS) technology. Nanoscale size, ultra-low power dissipation, and Terahertz range operating frequency make QCA more attractive to circuit designers. Recently, numerous designs of QCA have been proposed but aren’t...
Dense disparity map extraction is one of the most active research areas in computer vision. It tries to recover three-dimensional information from a stereo image pair. A large variety of algorithms has been developed to solve stereo matching problems. This paper proposes a new stereo matching algorithm, capable of generating the disparity map in re...
Vision-based hardware driver assistance systems are the most important systems in the world because of their low cost and ability to provide information on driving environments. Improving safety and reducing accidents are the two main objectives of these systems. For this, in this paper a new Vision-based Hardware Advanced Driver Assistance System...
5G networks are envisioned to support heterogeneous Industrial IoT (IIoT) and Industrial Wireless Sensor Network (IWSN) applications with a multitude Quality of Service (QoS) requirements. Network slicing is being recognized as a beacon technology that enables multi-service IIoT networks. Motivated by the growing computational capacity of the IIoT...
Since the infectious coronavirus disease (COVID-19) was first reported in Wuhan, it has become a public health problem around the world. This pandemic is having devastating effects on societies and economies. Due to the lack of health resources in a short period, all countries and continents are likely to face particularly severe damage that could...
Quantum Dot-Cellular automata (QCA) is a developing technology which is considered as the best viable alternate solution for CMOS technology which has short-channel
effects. QCA is a transistor-free technology, and the information is distributed formulated on the charge of the electron and by Columbic repulsion theory. In this paper, an optimal add...
This paper introduces a full Xilinx FPGA-Zynq implementation of a robust cryptosystem for real-time image encryption and decryption. Firstly, a strong chaos-based digital pseudo-random number generator is proposed to generate high-quality keys. Secondly, a robust algorithm is suggested to encrypt and decrypt images. The latter ensures the data conf...
Since the infectious coronavirus disease (COVID-19) was first reported in Wuhan, it has become a public health problem in China and even around the world. This pandemic is having devastating effects on societies and economies around the world. The increase in the number of COVID-19 tests gives more information about the epidemic spread, which may l...
This paper presents an optimized geometric greedy router (GGR) based on quantum dot cellular automata (QCA) technology. The proposed structure of GGR is based on a spanning tree of the network. This type of communication does not require an IP address. It uses only local information and can be used in many communication devices. In this paper, we f...
We propose a novel method for medical image watermarking in the DCT domain using the AES encryption algorithm. First, we decompose the original medical image into subblocks of 8 × 8. Besides, we apply the DCT and the quantization, respectively, to each subblock. However, in the DCT domain, an adequate choice of the DCT coefficients according to the...
This paper presents an intra-prediction study comparing two software's coding efficiency performance: the Versatile Video Coding (VVC) and the High-Efficiency Video Coding (HEVC). The VVC codec is a new video coding standard considered to improve its preceding standard HEVC (H.265). The primary goal of VVC is to enhance compression performance rela...
Recently, Low power and reduced heat dissipation are an increasing demand for digital systems. Quantum Dot Cellular Automata (QCA) is a future generation solution based on nanotechnology for the digital systems. The QCA systems have advantages like the small size, ultralow power consumption and high switching frequency. The present research aims at...
This paper proposes a well-optimized FPGA implementation of a chaos-based cryptosystem for real-time image encryption and decryption. A highly sensitive Pseudo-Random Number Generator (PRNG) based on the Lorenz chaotic system is designed to generate pseudo-random numbers. A high-quality encryption key is acquired by encrypting the numbers of a 128-...
The continuous market demands for high performance and energy-efficient computing systems have steered the computational paradigm and technologies towards nanoscale quantum-dot cellular automata (QCA). In this paper, novel energy- and area-efficient QCA-based adder/subtractor designs have been proposed. First, a QCA-based 3-input XOR gate is design...
Annually, deep learning algorithms have proven their effectiveness in many vision-based applications, such as autonomous driving, traffic, and congestion monitoring, and so on. In computer vision, accurate traffic sign recognition and semantic road detection are vital challenges for increased safety, which are becoming a major research topic for in...
In the medical sector, the digital image is multimedia data that contain secret information. However, designing an efficient secure cryptosystem to protect the confidential images in sharing is a challenge. In this work, we propose an improved chaos-based cryptosystem to encrypt and decrypt rapidly secret medical images. A complex chaos-based PRNG...
The novel Coronavirus disease (COVID-19), which first appeared at the end of December 2019, continues to spread rapidly in most countries of the world. Respiratory infections occur primarily in the majority of patients treated with COVID-19. In light of the growing number of COVID-19 cases, the need for diagnostic tools to identify COVID-19 infecti...
In this paper, we propose an efficient cryptosystem for digital image encryption and authentication. The cryptosystem is a hybrid scheme that uses symmetric and asymmetric approaches. The first one is used to encrypt the host image by utilizing a chaos-based key generator. The second one is used to encrypt the initial secret key and the owner’s sig...
So far, COVID-19, the novel coronavirus, continues to spread rapidly in most countries of the world, putting people's lives at risk. According to the WHO, respiratory infections occur primarily in the majority of patients treated with COVID-19. For decades, chest X-ray (CXR) technologies have proven their ability to accurately detect and treat resp...
Optimization for power is one of the most important design objectives in modern digital signal processing applications (DSP). Digital Finite duration impulse response FIR filter is considered to be one of the most essential components of DSP and consequently a number of extensive works had been carried out by researchers on the power optimization o...
In Round-Robin (RR) scheduling algorithm, Time Quantum (QT) is fixed and processes are scheduled such that no process uses CPU time more than a one-time quantum in one go. If QT is too large, the response time of the processes will not be tolerated in an interactive environment. If QT is too small, unnecessary frequent context switch may occur. Con...
Nowadays, traffic sign recognition is the most important task of advanced driver assistance systems since it improves the safety and comfort of drivers. However, it remains a challenging task due to the complexity of road traffic scenes. In this study, a novel two‐stage approach for real‐time traffic sign detection and recognition in a real traffic...
A robust direct torque control (DTC) strategy for an induction motor is proposed in this study. In fact, the proposed control strategy is defined by a combination of DTC, space vector modulation (SVM), input–output feedback linearisation (IOFL), a second‐order super‐twisting speed controller (STSC), and sliding‐mode‐load torque and stator‐flux obse...
In this paper, we propose a cryptography system for digital image high securing. Our method is asymmetric utilizing RSA algorithm, which requires a public key for encryption and a private key for decryption. However, the image is encrypted with a combination between the AES-256 CTR mode algorithm and the SHA-2 function. Our algorithm is evaluated b...
Instead of analog Electromagnetic Interference (EMI) filters, digital filters have been the alternate EMI mitigation solution in power converters to overcome the passive and analog active filters ‘limitations such as size, cost, size and high power consumption. In this paper, Common Mode (CM) EMI digital filter based on the use of fuzzy logic techn...
The increasing demand for efficient signal processors necessitates the design of digital finite duration impulse response FIR filter which occupies less area and consumes less power. FIR filters have simple, regular and scalable structures. This paper represents designing and implementation of a low-power 4-tap FIR filter based on quantum-dot cellu...
Quantum-dot Cellular Automata (QCA) technology is one of the emerging technologies that can be used for replacing CMOS technology. It has attracted significant attention in the recent years due to its extremely low power dissipation, high operating frequency, and a small size. In this study, we demonstrate an n-bit parity generator circuit by utili...
Optimization for power is one of the most important design objectives in modern digital image processing applications. The DCT is considered to be one of the most essential technique in image and video compression systems and consequently a number of extensive works had been carried out by researchers on the power optimization. On the other hand, Q...
Real time Video applications are becoming widely used in many domains with more demand for high performance. Video processing is intensive and habitually has accompanying real-time or super-real-time requirements. Such us, Multiple cameras are used in monitoring and surveillance systems in automatically real time analyze video to detect unusual eve...
In most cases, the quantum time length is taken to be fix in all applications that use Round Robin (RR) scheduling algorithm. Many attempts aim to determination of the optimal length of the quantum that results in a small average turnaround time, but the unknown nature of the tasks in the ready queue make the problem more complicated: Considering a...