Myriam Hadjouni

Myriam Hadjouni
Princess Nora bint Abdul Rahman University | PNU · Computer Science

Doctor of Philosophy

About

21
Publications
1,982
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
29
Citations

Publications

Publications (21)
Article
Full-text available
River streamflow is an essential hydrological parameters for optimal water resource management. This study investigates models used to estimate monthly time-series river streamflow data at two hydrological stations in the USA (Heise and Irwin on Snake River, Idaho). Five diverse types of machine learning (ML) model were tested, support vector machi...
Article
Full-text available
Coronavirus biologically named COVID-19 is a disease that is circulating throughout the world due to its viral nature. The interaction of people is a source of spreading of coronavirus. Millions of people have been affected by this virus, and most of them have lost their lives. At present, this viral disease has grown into a worldwide pandemic whic...
Article
Full-text available
An intrusion detection system, often known as an IDS, is extremely important for preventing attacks on a network, violating network policies, and gaining unauthorized access to a network. The effectiveness of IDS is highly dependent on data preprocessing techniques and classification models used to enhance accuracy and reduce model training and tes...
Article
Full-text available
A compact 5G wideband antenna for body-centric network (BCN) operating on Ka band has been presented in this paper. The design of the antenna consists of a very simple key-shaped radiator patch with a vertical slot for better impedance matching. The antenna was designed and simulated with the help of the Computer Simulation Technology (CST) Microwa...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs) seem to be the most efficient way of achieving the intended aerial tasks, according to recent improvements. Various researchers from across the world have studied a variety of UAV formations and path planning methodologies. However, when unexpected obstacles arise during a collective flight, path planning might get c...
Article
Full-text available
Gender recognition by voice is a vital research subject in speech processing and acoustics, as human voices have many remarkable characteristics. Voice recognition is beneficial in a variety of applications, including mobile health care systems, interactive systems, crime analysis, and recognition systems. Several algorithms for voice recognition h...
Article
Full-text available
The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent years. Many IoT nodes collect, store, and process personal data, which is an ideal target for attackers. Several researchers have worked on this problem and have presented many...
Article
Full-text available
This research offers an improved method for the self-organization of a swarm of UAVs based on a social learning approach. To start, we use three different colonies and three best members i.e., unmanned aerial vehicles (UAVs) randomly placed in the colonies. This study uses max-min ant colony optimization (MMACO) in conjunction with social learning...
Article
Full-text available
The smart grid is characterized as a power system that integrates real-time measurements, bi-directional communication, a two-way flow of electricity, and evolutionary computation. The power distribution system is a fundamental aspect of the electric power system in order to deliver safe, efficient, reliable, and resilient power to consumers. A dis...
Article
Full-text available
Recently, Huang et al. (2021) presented a quantum key agreement schemeto securely negotiate on a secret key employing the properties of a quantumsearch algorithm. First, the authors proposed the two-party quantum key agreement, and then they extended their work to the three-party case. Huang et al.‘s protocol employs the unitary operation and singl...
Article
Full-text available
In this paper, we present a hybrid deep learning model that is based on a two-dimensional convolutional neural network (2D-CNN) and a bidirectional long short-term memory network (Bi-LSTM)to detect non-technical losses (NTLs) in smart meters. NTLs occur due to the fraudulent use of electricity. The global integration of smart meters has proven to b...
Article
Electricity theft is considered one of the most significant reasons of the non technical losses (NTL). It negatively influences the utilities in terms of the power supply quality, grid’s safety, and economic loss. Therefore, it is necessary to effectively deal with the electricity theft problem. For detecting electricity theft in smart grids (SGs),...
Article
In the underlying work, the problems faced during message dissemination in the conventional Vehicular Energy Networks (VENs) like lack of security, breach of personal identities, absence of trust between vehicle owners, etc., are tackled. In this study, a Blockchain (BC) based announcement system is proposed for VENs to ensure secure and reliable a...
Article
Full-text available
The purpose of this study is to offer an adaptive hybrid controller for the formation control of multiple unmanned aerial vehicles (UAVs) leader-follower configurations with communication delay. Although numerous studies about the control of the formation exist, very few incorporate the delay in their model and are adaptive as well. The motivation...
Article
Full-text available
The purpose of this paper is to develop a fixed-wing aircraft that has the abilities of both vertical take-off (VTOL) and a fixed-wing aircraft. To achieve this goal, a prototype of a fixed-wing gyroplane with two propellers is developed and a rotor can maneuver like a drone and also has the ability of vertical take-off and landing similar to a hel...
Article
Full-text available
The paper presents a recommendation model for developing new smart city and smart health projects. The objective is to provide recommendations to citizens about smart city and smart health startups to improve entrepreneurship and leadership. These recommendations may lead to the country’s advancement and the improvement of national income and reduc...
Article
Full-text available
Technological advances integrating emotional maturity with established IoT systems are being examined with the emergence of the fourth industrial revolution. In this article, researchers propose an emotion-based music recommendation and classification framework (EMRCF) categorizing songs with high precision following individuals’ interpersonal team...
Article
Full-text available
Data Mining is a growing field, a strand of which is Educational data mining (EDM). EDM is currently used to help institutions and students through creating accurate predictions that are considered in decision making. One of EDM’s concerns is that of predicting students’ academic performance and fundamental learning difficulties in a particular cou...
Article
Full-text available
Accurate discrimination of images features is a main success factor towards efficient content-based image retrieval systems. These features can be extracted using local and/or global descriptors. Researchers efforts showed that, hybrid descriptors reported superior results compared to methods that use single descriptor, where hybridization certainl...
Article
The web explosion has led Information Retrieval (IR) to be extended and web search engines emergence. The conventional IR methods, usually intended for simple textual searches, faced new documents types and rich and scalable contents. The users, facing these evolutions, ask more for IR systems search results quality. In this context, the personaliz...
Article
Full-text available
The main goal of this paper is to present a platform dedicated to the Mobil and ubiquitous learning. This platform is designed on the basis of Service-Oriented Architecture and is developed using the emerging Web services standards. Sets of web services are developed taking into account the ubiquity and mobility of students and teachers. The final...

Network

Cited By