Omar Cheikhrouhou

Omar Cheikhrouhou
Taif University · Department of Information Technology

PhD Computer Science

About

133
Publications
48,104
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,598
Citations
Introduction
Cybersecurity, Blockchain, Machine learning, Optimization IoT, Edge Computing, smart transportation security
Additional affiliations
August 2014 - present
Taif University
Position
  • Professor (Assistant)
September 2012 - August 2014
University of Monastir
Position
  • Professor (Assistant)
September 2006 - August 2012
Institut Supérieur des Etudes Technologiques de Sfax
Position
  • Technologist

Publications

Publications (133)
Article
Full-text available
Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video. Image-based information hiding has been a significantly important topic for digital forensics. Here, active image deep steganographic approaches have come forward for hiding data. The least si...
Article
Full-text available
Network communications are expanding rapidly in many fields, including telecommunications, the Internet of Things, space, consumer electronics, and the military, with different privacy and security issues at stake in each of these areas. The Internet of Things (IoT) has drawn increased attention from academic and industrial researchers over the las...
Article
Full-text available
This paper presents a proposal for the development of a new intelligent solution for the optimization of hybrid energy systems. This solution is of great importance for installers of hybrid energy systems, as it helps them obtain the best configuration of the hybrid energy system (efficient and less expensive). In this solution, it is sufficient to...
Article
Full-text available
This paper provides an extensive and complete survey on the process of detecting and preventing various types of IoT-based security attacks. It is designed for software developers, researchers, and practitioners in the Internet of Things field who aim to understand the process of detecting and preventing these attacks. For each entry identified fro...
Article
The collaboration between ground and flying robots can take advantage of the capabilities of each system to enhance the performance of robotic applications, including military, healthcare, disaster management, etc. Unfortunately, this cooperation is restricted by the physical constraint that all computation should be performed on robots. The concep...
Article
Full-text available
Localization is a crucial method applied in Wireless Sensor Networks (WSNs) to determine the geographic position of the sensor nodes in the sensing region. Many existing WSNs applications require location awareness of sensor nodes. Global Positioning System (GPS) is a well-known technique of localization. However, as a WSN is composed of thousands...
Article
Alliance blockchains provide a multi-party trusted data trading environment, promoting the development of the data trading market in which the value compensation for personal data is still a key issue. However, limited by the data format and content, traditional attempts on data value compensation cannot form a widely applicable solution. Therefore...
Preprint
Full-text available
Cybersecurity is an inherent characteristic that should be addressed before the large deployment of smart city applications. Recently, Blockchain appears as a promising technology to provide several cybersecurity aspects of smart city applications. This paper provides a comprehensive review of the existing blockchain-based solutions for the cyberse...
Article
Full-text available
In this paper, modifications in neoteric architectures such as VGG16, VGG19, ResNet50, and InceptionV3 are proposed for the classification of COVID-19 using chest X-rays. The proposed architectures termed “COV-DLS” consist of two phases: heading model construction and classification. The heading model construction phase utilizes four modified deep...
Article
Full-text available
IoT (Internet of Things) systems are still facing a great number of attacks due to their integration in several areas of life. The most-reported attacks against IoT systems are "Denial of Service" (DoS) and "Distributed Denial of Service" (DDoS) attacks. In this paper, we investigate DoS/DDoS attacks detection for IoT using machine learning techniq...
Article
Full-text available
In the transmission of medical images, if the image is not processed, it is very likely to leak data and personal privacy, resulting in unpredictable consequences. Traditional encryption algorithms have limited ability to deal with complex data. e chaotic system is characterized by randomness and ergodicity, which has advantages over traditional en...
Article
Full-text available
Algeria is characterized by extreme cold in winter and high heat and humidity in summer. This leads to an increase in the use of electrical appliances, which has a negative impact on electrical energy consumption and its high costs, especially with the high price of electricity in Algeria. In this context, artificial intelligence can help to regula...
Article
Full-text available
The public sector provides open data to create new opportunities, stimulate innovation, and implement new solutions that benefit academia and society. However, open data is usually available in large quantities and often lacks quality, accuracy, and completeness. It may be difficult to find the right data to analyze a target. There are many rich op...
Article
Full-text available
Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance. The UWSN is an attractive field for both researchers and the industrial side. Due to the harsh underwater environment, own capabilities, and...
Article
Blockchain is a database that contains the history of all exchanges made between its users since its creation. Blockchain is a new tool that enables essential distributed applications without the need for centralized trust. It is a transparent and secure technology for storing and transmitting information that operates without a central control bod...
Article
Full-text available
Many patients have begun to use mobile applications to handle different health needs because they can better access high-speed Internet and smartphones. These devices and mobile applications are now increasingly used and integrated through the medical Internet of Things (mIoT). mIoT is an important part of the digital transformation of healthcare,...
Article
Full-text available
The COVID-19 pandemic has negatively affected aspects of human life and various sectors , especially the health sector. These conditions led to the creation of new patterns of life that people have had to deal with to reduce the spread of the epidemic by committing to social distanc-ing, among others. Therefore, governments and technological organi...
Article
Full-text available
There is a growing demand for the detection of endangered plant species through machine learning approaches. Ziziphus lotus is an endangered deciduous plant species in the buckthorn family (Rhamnaceae) native to Southern Europe. Traditional methods such as object-based image analysis have achieved good recognition rates. However, they are slow and...
Article
Full-text available
Cloud ERP is a type of enterprise resource planning (ERP) system that runs on the vendor’s cloud platform instead of an on-premises network, enabling companies to connect through the Internet. The goal of this study was to rank and prioritise the factors driving cloud ERP adoption by organisations and to identify the critical issues in terms of sec...
Article
Full-text available
Alzheimer’s disease (AD) is a leading health concern affecting the elderly population worldwide. It is defined by amyloid plaques, neurofibrillary tangles, and neuronal loss. Neuroimaging modalities such as positron emission tomography (PET) and magnetic resonance imaging are routinely used in clinical settings to monitor the alterations in the bra...
Article
Full-text available
Price forecasting (PF) is the primary concern in distributed power generation. This paper presents a novel and improved technique to forecast electricity prices. The data of various power producers, Capacity Purchase Price (CPP), Power Purchase Price (PPP), Tariff rates, and load demand from National Electric Power Regulatory Authority (NEPRA) are...
Conference Paper
Full-text available
Remote Patient Monitoring (RPM) is a form of telehealth or virtual health that strengthens online medical services and allows delivering healthcare remotely. Nowadays, remote patient monitoring systems (RPMS) are widely used by healthcare providers to remotely monitor the vital signs of patients. As the RPM field expands, concerns about efficient a...
Article
Full-text available
Emerging commucation technologies, such as mobile edge computing (MEC), Internet of Things (IoT), and fifth-generation (5G) broadband cellular networks, have recently drawn a great deal of interest. Therefore, numerous multiobjective optimization problems (MOOP) associated with the aforementioned technologies have arisen, for example, energy consum...
Article
Full-text available
High energy consumption, rising environmental concerns and depleting fossil fuels demand an increase in clean energy production. The enhanced resiliency, efficiency and reliability offered by microgrids with distributed energy resources (DERs) have shown to be a promising alternative to the conventional grid system. Large-sized commercial customers...
Article
Full-text available
Location awareness is very crucial for almost existing sensor network applications. However, using Global Positioning System (GPS) receivers to every node is very expensive. Therefore, anchor based localization techniques are proposed. The lack of anchors in some WSNs lead to the appearance of multi-hop localization, which permits to localize nodes...
Article
The security and privacy of electronic healthcare records (EHRs) remain a critical issue for both healthcare services consumers and providers. Breaching a healthcare system causes the disclosure of sensitive health data. This data is usually saved into centralized databases, which creates vulnerabilities and gives rise to cyber attacks. This resear...
Article
Full-text available
The 2019–2020 coronavirus pandemic had far-reaching consequences beyond the spread of the disease and efforts to cure it. Today, it is obvious that the pandemic devastated key sectors ranging from health to economy, culture, and education. As far as education is concerned, one direct result of the spread of the pandemic was the resort to suspending...
Article
Full-text available
Educational data generated through various platforms such as e-learning, e-admission systems, and automated result management systems can be effectively processed through educational data mining techniques in order to gather highly useful insights into students' performance. The prediction of student performance from historical academic data is a h...
Article
Full-text available
According to the research, many task scheduling approaches have been proposed like GA, ACO, etc., which have improved the performance of the cloud data centers concerning various scheduling parameters. The task scheduling problem is NP-hard, as the key reason is the number of solutions/combinations grows exponentially with the problem size, e.g., t...
Article
Full-text available
This article addresses the costs and benefits of integrating security into the development of applications and gives formulas for calculating security costs and benefits. The lack of safe application might lead to safety issues. Increasingly, there are accidents recorded that expose security flaws in many major software systems. It results in signi...
Article
The Internet of Vehicles (IoV) is a distributed network that enables vehicles to connect to each other and to various infrastructure and smart devices, in order to exchange data and provide important services. The highly dynamic environment of the IoV offers a lot of opportunities but at the same time makes the network susceptible to a large number...
Preprint
The Internet of Vehicles (IoV) is a distributed network that enables vehicles to connect to each other and to various infrastructure and smart devices, in order to exchange data and provide important services. The highly dynamic environment of the IoV offers a lot of opportunities but at the same time makes the network susceptible to a large number...
Article
Volunteer computing based data processing is a new trend in healthcare applications. Researchers are now leveraging volunteer computing power to train deep learning networks consisting of billions of parameters. Breast cancer is the second most common cause of death in women among cancers. The early detection of cancer may diminish the death risk o...
Article
Full-text available
Real-time robotic applications encounter the robot on board resources’ limitations. The speed of robot face recognition can be improved by incorporating cloud technology. However, the transmission of data to the cloud servers exposes the data to security and privacy attacks. Therefore, encryption algorithms need to be set up. This paper aims to stu...
Article
Full-text available
Because of the availability of more than an actor and a wireless component among e-health applications, providing more security and safety is expected. Moreover, ensuring data confidentiality within different services becomes a key requirement. In this paper, we propose to collect data from health and fitness smart devices deployed in connection wi...
Article
Full-text available
Restricted abilities of mobile devices in terms of storage, computation, time, energy supply, and transmission causes issues related to energy optimization and time management while processing tasks on mobile phones. This issue pertains to multifarious mobile device-related dimensions, including mobile cloud computing, fog computing, and edge compu...
Article
Full-text available
As localization represents the main backbone of several wireless sensor networks applications, several localization algorithms have been proposed in the literature. There is a growing interest in the multi-hop localization algorithms as they permit the localization of sensor nodes even if they are several hops away from anchor nodes. One of the mos...
Article
Full-text available
Due to the growing of the use of Internet and communication media, image encryption is rapidly increased. Image sharing through unsafe open channels is vulnerable for attacking and stealing. For protecting the images from attacks, encryption techniques are required. Recently, new and efficient chaos-based techniques have been suggested to develop s...
Article
Full-text available
Cloud computing is the most prominent established framework; it offers access to resources and services based on large-scale distributed processing. An intensive management system is required for the cloud environment, and it should gather information about all phases of task processing and ensuring fair resource provisioning through the levels of...
Article
Full-text available
This paper shows the importance of automated scoring (AS) and that it is better than human graders in terms of degree of reproducibility. Considering the potential of the automated scoring system, there is further a need to refine and develop the existing system. The paper goes through the state of the art. It presents the results concerning the pr...
Article
Full-text available
Object detection plays a vital role in the fields of computer vision, machine learning, and artificial intelligence applications (such as FUSE-AI (E-healthcare MRI scan), face detection, people counting, and vehicle detection) to identify good and defective food products. In the field of artificial intelligence, target detection has been at its pea...
Article
Full-text available
The advanced technology Internet of Things (IoT) visualizes a worldwide, that is, internally connected, networks of smart physical entities. IoT is a promising technology used in several applications including disaster management. In disaster management, the role of IoT is so important and ubiquitous and could be life-saving. This article describes...
Article
Full-text available
Authentication is the primary and mandatory process for any Information and Communication Technology (ICT) application to prove the legitimacy of the genuine user. It becomes more important and crucial for public platforms like e-governance platforms. The Government of India is transforming the country into Digital India through various e-governanc...
Article
Full-text available
Software-defined networking is an evolving network architecture beheading the traditional network architecture focusing its disadvantages in a limited perspective. A couple of decades before, programming and networking were viewed as different domains which today with the lights of SDN bridging themselves together. This is to overcome the existing...
Article
Full-text available
Due to the physical restriction of current CMOS technology, emerging technologies that have majority logic gate as a base component are being explored. The process of transforming from boolean network to the majority logic network is called majority logic synthesis. Hence, the contributions of this work is as follows: (i) a novel heuristic-driven t...
Article
Full-text available
Object detection plays a vital role in the fields of computer vision, machine learning and artificial intelligence applications (such as Fuse AI (E-Healthcare MRI Scan), face detection, people counting and vehicle detection) to identify good and defective food products. In the field of artificial intelligence, target detection has been at its peak,...
Article
Full-text available
The Multiple Traveling Salesman Problem (MTSP) is among the most interesting combinatorial optimization problems because it is widely adopted in real-life applications, including robotics, transportation, networking, etc. Although the importance of this optimization problem, there is no survey dedicated to reviewing recent MTSP contributions. In th...
Article
Full-text available
Due to the COVID-19 pandemic, the world has faced a significant challenge in the increase of the rate of morbidity and mortality among people, particularly the elderly aged patients. The risk of acquiring infections may increase during the visit of patients to the hospitals. The utilisation of technology such as the “Internet of Things (IoT)” based...
Article
Full-text available
A Brain-Computer Interface (BCI) is a system used to communicate with an external world through the brain activity. The brain activity is measured by electroencephalography (EEG) signal and then processed by a BCI system. EEG source reconstruction could be a way to improve the accuracy of EEG classification in EEG based brain-computer interface (BC...