Baabda, Lebanon

Time filter

Source Type

Al Bouna B.,Antonin University | Chbeir R.,University of Burgundy | Gabillon A.,University of French Polynesia
SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography | Year: 2011

The tremendous sharing of multimedia objects on the web shed the light on several privacy concerns related in essence to the safe publishing of end users' personal data. Providing techniques to protect multimedia objects faces several difficulties due to multimedia objects' heterogeneous and complex structure on one hand, and on the other hand, the wide range of information that could be used to describe their content. In this paper, we present a flexible security rule specification toolkit for multimedia objects. Our toolkit is based on a security model and a core ontology in which we populate the model's related information and multimedia objects data. To specify security rules, we use the SWRL language in order to address both, the content and the context of multimedia objects.


Saad S.,Antonin University | Al Bouna B.,Antonin University | Chbeir R.,University of Burgundy
Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES'11 | Year: 2011

In this paper, we propose a novel technique for privacy preserving in multimedia databases. Our technique is based on a multimedia co-occurrence matrix and a tree augmented naive Bayesian classifier (TAN) to detect possible data associations making confidential multimediaobjects at risk. Categories and Subject Descriptors H.2.7 [Database Administration]:Security, integrity, and protection. Copyright © 2011 ACM.


Al Bouna B.,Antonin University | Chbeir R.,University of Burgundy | Gabillon A.,University of French Polynesia | Capolsini P.,University of French Polynesia
8th International Conference on Signal Image Technology and Internet Based Systems, SITIS 2012r | Year: 2012

Sharing and publishing images and photos have become the trend of nowadays (social networks, messengers, etc.). Providing appropriate techniques to preserve privacy and protect content of sensitive and private images is an essential need. In this paper, we present a novel security model for image content protection. In our model, we provide dynamic security rules based on first order logic to express constraints that can be applied to contextual information as well as low level features of images. We finally discuss a set of experiments and studies carried out to evaluate the proposed approach. © 2012 IEEE.


Raad E.,Memorial University of Newfoundland | Al Bouna B.,Antonin University | Chbeir R.,University of Pau and Pays de l'Adour
International Journal of Information Security | Year: 2016

A fundamental aspect of all social networks is information sharing. It is one of the most common forms of online interaction that is tightly associated with social media preservation and information disclosure. As such, information sharing is commonly viewed as a key enabler for social media preservation tasks. In the current situation, where information sharing and inter-user communications are made instantly possible via the widespread use of ubiquitous technologies, privacy related, and particularly information disclosure issues, are the obvious, much discussed, immediate consequences of information sharing. As a result, information disclosure, especially when multimedia data come to play, is critical for appropriate social media preservation strategies that consider and respect the privacy of social network users. Social media preservation must align with privacy protection solutions and consequently must protect sensitive information that social network users would like to keep private. In this paper, we propose a new approach to implement a privacy-oriented social media preservation strategy that prevents the disclosure of sensitive information. Instead of using a preserve-all strategy, we present a framework to personalize social media preservation tasks. We then describe our proposed rule-based algorithm to evaluate information disclosure addressing mainly relationship type disclosure and using shared photos. We also provide an experimental study to investigate the efficiency and the relevance of our approach. © 2015, Springer-Verlag Berlin Heidelberg.


Bayard S.,Montpellier University | Erkes J.,Antonin University | Moroni C.,University of Lille Nord de France
Archives of Clinical Neuropsychology | Year: 2011

The Stroop Color-Word Test-Victoria version (VST) is a measure of executive function commonly used in neuropsychological evaluation. Because of its short administration time, the VST seems particularly appropriate for use in geriatric populations and with those suffering from dementia and who are prone to fatigue during neuropsychological examination. In this study, we examine the influence of demographic characteristics on VST score and present descriptive data for a sample of 244 elderly French speakers (50-94 years of age). Normative data corrected for age and education are provided for clinical use. Furthermore, by comparing the VST performance of patients with the Alzheimer-type dementia to that of 40 matched healthy controls, we provide clinical evidence suggesting that the VST has a clinical utility in the assessment of inhibition in AD. © The Author 2011. Published by Oxford University Press. All rights reserved.


Salim C.,CNRS Femto ST Institute | Makhoul A.,CNRS Femto ST Institute | Darazi R.,Antonin University | Couturier R.,CNRS Femto ST Institute
Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium | Year: 2016

Nowadays, Wireless Body Sensor Networks (WBSN) are emerging as a low cost solution for healthcare application to find new solutions, regarding patient monitoring which is becoming the elusive requirement. Quicker emergency detection is the main purpose to create a quicker reaction and treatment if required, such as an abnormal variation of the respiration rate, which satisfies the goal of extending life expectancy. This process can help all the chronic patients who are most of the time living alone or in nursing homes. However, the limited lifetime bio-medical sensors bring on the energy consumption challenge as one of the leading challenges in WBSN. Moreover, detecting locally an emergency is also one of the main challenges in WBSN. In this paper, we propose an adaptive sampling approach, based on fisher test theory, that estimates and adapts the sensing frequency based on previous readings and the patient criticality. The main goal is to optimize the energy consumption. Furthermore, we show how emergency alerts can be supported locally on each node of the network. To validate the effectiveness of our approach we conducted several series of simulations and built a simple energy saving comparison. © 2016 IEEE.


Habib C.,CNRS Femto ST Institute | Makhoul A.,CNRS Femto ST Institute | Darazi R.,Antonin University | Couturier R.,CNRS Femto ST Institute
Proceedings of the NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium | Year: 2016

Maintaining and improving the quality of life in ageing populations is a necessity. Hence, distant patient monitoring is a solution providing constant surveillance of vital signs and the detection of emergencies when they occur. In the past few years, wireless body sensor networks (WBSNs) emerged as a low cost solution for healthcare applications. In WBSNs, biosensors collect periodically physiological measures and send them to the coordinator where the data fusion process takes place. However, processing the huge amount of data captured by the limited lifetime biosensors and taking the right decisions when there is an emergency are major challenges in WBSNs. In this paper, we introduce a data fusion model using a decision matrix, an early warning score system and fuzzy set theory. We propose an algorithm at the coordinator level of the WBSN, aiming to take the appropriate decision when an emergency is detected. © 2016 IEEE.


Badr G.,Antonin University | Ghorra A.,Antonin University | Chaccour K.,Antonin University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2016

Software keyboards were designed to provide accessibility to mobile users as well as to people with motor disability. Text entry is henceforth made possible on portable devices such as mobile phones, tablets, pads. Despite their obvious utility, these keyboards present major drawbacks in terms of speed of acquisition and induced fatigue comparatively to conventional physical keyboards. Optimization efforts have showed efficacy by adding prediction lists and dictionaries. Other researches have considered the effect of the position of characters and the prediction list relatively to the time of acquisition and performance. Those researches were designed for computer software keyboards. In this paper, the position of the prediction list is investigated on a mobile device. The “MobiCentraList” is the mobile version of a previous computer software keyboard “Centralist” which was developed for this purpose. The position effect of the prediction list is studied and compared to natural software keyboards. © Springer International Publishing Switzerland 2016.


Al-Rifai A.,Antonin University | Boyajian T.,Antonin University
2015 5th International Conference on Digital Information and Communication Technology and Its Applications, DICTAP 2015 | Year: 2015

Magnetic materials are fundamental part of non-reciprocal microwave components such as isolators and circulators. In order to improve the effect of the isolation, new materials with magnetic anisotropy were studied such as composites, but the determination of their magnetic properties is still a non-trivial mission. While the miniaturization of these microwave components is becoming more compulsory, a new characterization method suitable for thin magnetic layers is presented. The described technique allows the estimation of diagonal and extra-diagonal components of the permeability tensor. © 2015 IEEE.


Chaccour K.,Antonin University | Badr G.,Antonin University
2015 1st International Conference on Applied Research in Computer Science and Engineering, ICAR 2015 | Year: 2015

Visual impairment or vision loss is the main reason for reduced mobility in humans. Visually Impaired (VI) people require continuous assistance during their movement. Researchers and scientists have put many solutions to assist those people in the activities of their daily living (ADL). The current research delivers a novel indoor navigation system for visually impaired people. The proposed solution is designed for indoor use only (house, office, companies, etc.). It provides the visually impaired person the ability to navigate without any other hardware assistance. The proposed system architecture uses a network of IP cameras installed at the ceiling of each room. A remote processing system analyzes-by computer vision algorithms-photos taken from the environment in order to inform the subject about his location and reacts accordingly to deliver the adequate assistance. A guidance algorithm helps him reach his destination using a simple interactive mobile application installed on his smart phone. The proof of concept prototype was designed with one camera on top of a wooden floor model to simulate the system. Results showed good reliability in indoor navigation and obstacles avoidance. © 2015 IEEE.

Loading Antonin University collaborators
Loading Antonin University collaborators