This page has only limited features, please log in for full access.

Unclaimed
Jacques Bou Abdo
College of Business and Technology, University of Nebraska Kearney, Kearney, USA

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Original research
Published: 09 July 2021 in AI and Ethics
Reads 0
Downloads 0

The convergence of AI, IoT, and blockchain as the next disruptive technology is inevitable. Studying the ethics of these converged technologies is crucial for the steady development and adoption of the applications. Even though this topic is crucial, it is still not yet touched in the literature. This work is the first attempt to tackle this issue by developing a conceptual ethics framework for converged AI, IoT, and blockchain. The framework is based on a systematic literature review and categorizes the ethical issues into three layers namely micro (ethical issue involving the technology itself), meso (ethical issue involving the applications), and macro (ethical issue involving the society and institutions).

ACS Style

Esther Nehme; Rayane El Sibai; Jacques Bou Abdo; A. Ross Taylor; Jacques Demerjian. Converged AI, IoT, and blockchain technologies: a conceptual ethics framework. AI and Ethics 2021, 1 -15.

AMA Style

Esther Nehme, Rayane El Sibai, Jacques Bou Abdo, A. Ross Taylor, Jacques Demerjian. Converged AI, IoT, and blockchain technologies: a conceptual ethics framework. AI and Ethics. 2021; ():1-15.

Chicago/Turabian Style

Esther Nehme; Rayane El Sibai; Jacques Bou Abdo; A. Ross Taylor; Jacques Demerjian. 2021. "Converged AI, IoT, and blockchain technologies: a conceptual ethics framework." AI and Ethics , no. : 1-15.

Journal article
Published: 04 March 2021 in Sustainability
Reads 0
Downloads 0

The benefits of having a Bike Sharing System (BSS) in a city are numerous. Among other advantages, it promotes a cleaner environment with less traffic and pollution. One major problem the users of such services encounter is that of full or empty stations, causing user dissatisfaction. The objective of this work is to propose a new user-based incentive method to enhance BSS performance. The proposed method relies on a spatial outlier detection algorithm. It consists of adapting the departure and arrival stations of the users to the BSS state by stimulating the users to change their journeys in view of minimizing the number of full and empty stations. Experiments are carried out to compare our proposed method to some existing methods for enhancing the resource availability of BSSs, and they are performed on a real dataset issued from a well-known BSS called Velib. The results show that the proposed strategy improves the availability of BSS resources, even when the collaboration of users is partial.

ACS Style

Rayane El Sibai; Khalil Challita; Jacques Bou Abdo; Jacques Demerjian. A New User-Based Incentive Strategy for Improving Bike Sharing Systems’ Performance. Sustainability 2021, 13, 2780 .

AMA Style

Rayane El Sibai, Khalil Challita, Jacques Bou Abdo, Jacques Demerjian. A New User-Based Incentive Strategy for Improving Bike Sharing Systems’ Performance. Sustainability. 2021; 13 (5):2780.

Chicago/Turabian Style

Rayane El Sibai; Khalil Challita; Jacques Bou Abdo; Jacques Demerjian. 2021. "A New User-Based Incentive Strategy for Improving Bike Sharing Systems’ Performance." Sustainability 13, no. 5: 2780.

Research article
Published: 02 November 2020 in Transactions on Emerging Telecommunications Technologies
Reads 0
Downloads 0

Over the past years, blockchain technology has become more and more interesting since its ability to carry out transactions without any mediator. To ensure the transactions' reliability, consensus algorithms are adopted by blockchain technology. However, due to the failure of consensus algorithms in managing nodes' identities, blockchain technology is considered inappropriate for many applications. In this article, we propose the permissionless proof‐of‐reputation‐X (PL‐PoRX) that upgrades an existing consensus algorithm, the proof‐of‐reputation‐X (PoRX). PL‐PoRX replaces the trusted identity database in PoRX with a new admission process to make the algorithm suitable for permissionless blockchains, while maintaining PoRX's reputation mechanism. Several experiments are conducted to show the efficiency of our approach under different scenarios. We also debate the security model of the new protocol and study its time complexity. The results show that PL‐PoRX decreases the number of blocks issued by malicious miners, and help benign miners build reputation faster.

ACS Style

Jacques Bou Abdo; Rayane El Sibai; Jacques Demerjian. Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains. Transactions on Emerging Telecommunications Technologies 2020, 32, 1 .

AMA Style

Jacques Bou Abdo, Rayane El Sibai, Jacques Demerjian. Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains. Transactions on Emerging Telecommunications Technologies. 2020; 32 (1):1.

Chicago/Turabian Style

Jacques Bou Abdo; Rayane El Sibai; Jacques Demerjian. 2020. "Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains." Transactions on Emerging Telecommunications Technologies 32, no. 1: 1.

Letter
Published: 29 July 2020 in Internet Technology Letters
Reads 0
Downloads 0

Underwater Collaborative Body Sensor Network (UCBSN) is an important application of Underwater Wireless Sensor Networks (UWSNs). It allows monitoring the performance and status of group of persons in underwater environments to take appropriate actions. In this article, an optimal cluster‐based routing scheme that was previously validated for BSNs and terrestrial CBSN is adapted to the underwater environment and proposed to address UCBSNs challenges. The main aim of the proposed scheme is to ensure reliable transmission of data, while reducing the network delay and the energy consumption of nodes, through optimizing the three steps of the routing process. The performance of the proposed scheme is compared to other existing algorithms in terms of delay, BER, energy consumption, and percentage of dropped packets. This article is protected by copyright. All rights reserved.

ACS Style

Nadine Boudargham; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux; Abdallah Makhoul. An optimal cluster‐based routing algorithm for UCBSNs. Internet Technology Letters 2020, 4, 1 .

AMA Style

Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul. An optimal cluster‐based routing algorithm for UCBSNs. Internet Technology Letters. 2020; 4 (2):1.

Chicago/Turabian Style

Nadine Boudargham; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux; Abdallah Makhoul. 2020. "An optimal cluster‐based routing algorithm for UCBSNs." Internet Technology Letters 4, no. 2: 1.

Chapter
Published: 09 July 2020 in Transactions on Computational Science and Computational Intelligence
Reads 0
Downloads 0

Data streams represent a challenge to the data processing operations such as query execution and information retrieval. They pose many constraints in terms of memory space and execution time for the computation process. This is mainly due to the huge volume of the data and their high arrival rate. Generating approximate answers by using a small proportion of the data stream, called “summary,” is acceptable for many applications. Sampling algorithms are used to construct a data stream summary. The purpose of sampling algorithms is to provide information concerning a large set of data from a representative sample extracted from it. An effective summary of a data stream must have the ability to respond, in an approximate manner, to any query, whatever the period of time investigating. In this chapter, we present a survey of these algorithms. Firstly, we introduce the basic concepts of data streams, windowing models, as well as data stream applications. Next, we introduce the state of the art of different sampling algorithms used in data stream environments. We classify these algorithms according to the following metrics: number of passes over the data, memory consumption, and skewing ability. In the end, we evaluate the performance of three sampling algorithms according to their execution time and accuracy.

ACS Style

Rayane El Sibai; Jacques Bou Abdo; Yousra Chabchoub; Jacques Demerjian; Raja Chiky; Kablan Barbar. Data Summarization Using Sampling Algorithms: Data Stream Case Study. Transactions on Computational Science and Computational Intelligence 2020, 105 -124.

AMA Style

Rayane El Sibai, Jacques Bou Abdo, Yousra Chabchoub, Jacques Demerjian, Raja Chiky, Kablan Barbar. Data Summarization Using Sampling Algorithms: Data Stream Case Study. Transactions on Computational Science and Computational Intelligence. 2020; ():105-124.

Chicago/Turabian Style

Rayane El Sibai; Jacques Bou Abdo; Yousra Chabchoub; Jacques Demerjian; Raja Chiky; Kablan Barbar. 2020. "Data Summarization Using Sampling Algorithms: Data Stream Case Study." Transactions on Computational Science and Computational Intelligence , no. : 105-124.

Letter
Published: 24 February 2020 in Internet Technology Letters
Reads 0
Downloads 0

Reputation‐based consensus algorithms are one of the most promising, but least investigated types of consensus algorithms. Its limitation to persmissioned node identity management shades its potential and causes many applications to find blockchain unsuitable. In this paper, we upgrade PoRX, an existing consensus algorithm, into becoming the first permissionless pure reputation‐based consensus algorithm. This upgrade is highly potential since it only affects the admission process and doesn't intervene with the consensus process, thus can be extended into other types of consensus algorithms. This article is protected by copyright. All rights reserved.

ACS Style

Jacques Bou Abdo; Rayane El Sibai; Krishna Kambhampaty; Jacques Demerjian. Permissionless reputation‐based consensus algorithm for blockchain. Internet Technology Letters 2020, 3, 1 .

AMA Style

Jacques Bou Abdo, Rayane El Sibai, Krishna Kambhampaty, Jacques Demerjian. Permissionless reputation‐based consensus algorithm for blockchain. Internet Technology Letters. 2020; 3 (3):1.

Chicago/Turabian Style

Jacques Bou Abdo; Rayane El Sibai; Krishna Kambhampaty; Jacques Demerjian. 2020. "Permissionless reputation‐based consensus algorithm for blockchain." Internet Technology Letters 3, no. 3: 1.

Article
Published: 15 November 2019 in Peer-to-Peer Networking and Applications
Reads 0
Downloads 0

The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate performance and Quality of Service (QoS). This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment with respect to different QoS and network performance metrics. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropriate action. This study can also be extended to cover collaborative WBAN systems where information from different bodies is sent simultaneously leading to high traffic. OPNET simulations are performed to compare the performance of the different MAC protocols under the same experimental conditions. A new MAC scheme aiming to enhance the delay, throughput, and energy performance of the system is then proposed and compared to existing protocols, to evaluate its performance in high traffic environment.

ACS Style

Nadine Boudargham; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux; Abdallah Makhoul. Performance of low level protocols in high traffic wireless body sensor networks. Peer-to-Peer Networking and Applications 2019, 13, 850 -871.

AMA Style

Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul. Performance of low level protocols in high traffic wireless body sensor networks. Peer-to-Peer Networking and Applications. 2019; 13 (3):850-871.

Chicago/Turabian Style

Nadine Boudargham; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux; Abdallah Makhoul. 2019. "Performance of low level protocols in high traffic wireless body sensor networks." Peer-to-Peer Networking and Applications 13, no. 3: 850-871.

Conference paper
Published: 12 January 2019 in Business Information Systems
Reads 0
Downloads 0

The study of recommender systems is essential nowadays due to its great effect on businesses and customer satisfaction. Different active learning strategies were previously developed to gain ratings from the users on specific items, and this enables the system to have more information and consequently make more accurate recommendations. In previous studies, these strategies were evaluated using a different selection of metrics in each work, and the experimentations were done on different datasets. In this paper, we solve these weaknesses by comparing the main ten non-personalized strategies on a fair ground, by simulating them against two datasets and using seven of the mostly agreed upon metrics. This gives more trust and less biased results when comparing their performances. Also, the analysis of the computation time and the elicitation efficiency is added.

ACS Style

Georges Chaaya; Jacques Bou Abdo; Elisabeth Métais; Raja Chiky; Jacques Demerjian; Kablan Barbar. Comparison of the Non-personalized Active Learning Strategies Used in Recommender Systems. Business Information Systems 2019, 443 -456.

AMA Style

Georges Chaaya, Jacques Bou Abdo, Elisabeth Métais, Raja Chiky, Jacques Demerjian, Kablan Barbar. Comparison of the Non-personalized Active Learning Strategies Used in Recommender Systems. Business Information Systems. 2019; ():443-456.

Chicago/Turabian Style

Georges Chaaya; Jacques Bou Abdo; Elisabeth Métais; Raja Chiky; Jacques Demerjian; Kablan Barbar. 2019. "Comparison of the Non-personalized Active Learning Strategies Used in Recommender Systems." Business Information Systems , no. : 443-456.

Journal article
Published: 22 October 2018 in Sensors
Reads 0
Downloads 0

In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay efficiency of DS-CDMA in traffic burst, and the high energy efficiency of DTDMA in periodic traffic. The proposed scheme is evaluated in terms of delay, packet drop percentage, and energy consumption. Different OPNET simulations are performed for various number of nodes carrying emergency data, and for various payload sizes. The protocol performance is compared to other existing hybrid protocols. Results show that the proposed scheme outperforms the others in terms of delay and packet drop percentage for different number of nodes carrying emergency data, as well as for different payload sizes. It also offers the highest energy efficiency during periodic observation, while adjusting the energy consumption during emergency by assigning spreading codes only to nodes holding emergency data.

ACS Style

Nadine Bou Dargham; Abdallah Makhoul; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux. Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks. Sensors 2018, 18, 3572 .

AMA Style

Nadine Bou Dargham, Abdallah Makhoul, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux. Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks. Sensors. 2018; 18 (10):3572.

Chicago/Turabian Style

Nadine Bou Dargham; Abdallah Makhoul; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux. 2018. "Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks." Sensors 18, no. 10: 3572.

Journal article
Published: 01 January 2018 in International Journal of Mobile Network Design and Innovation
Reads 0
Downloads 0
ACS Style

Jacques Bou Abdo; Rabih Jreish; Jacques Demerjian. Extended optimisation mechanism for radio resource allocation in multicast mobile networks. International Journal of Mobile Network Design and Innovation 2018, 8, 157 .

AMA Style

Jacques Bou Abdo, Rabih Jreish, Jacques Demerjian. Extended optimisation mechanism for radio resource allocation in multicast mobile networks. International Journal of Mobile Network Design and Innovation. 2018; 8 (3):157.

Chicago/Turabian Style

Jacques Bou Abdo; Rabih Jreish; Jacques Demerjian. 2018. "Extended optimisation mechanism for radio resource allocation in multicast mobile networks." International Journal of Mobile Network Design and Innovation 8, no. 3: 157.

Journal article
Published: 01 January 2018 in International Journal of Mobile Network Design and Innovation
Reads 0
Downloads 0

Mobile communication paradigm has shifted from a closed network of transmitters and receivers to an access network transporting what the content providers have to offer. Many existing and future applications offer the same content to most, if not all, clients. These applications include crowdsensing, news, and traffic monitoring portals. Mobile operators would largely benefit if such applications use multicast messages instead of unicast. Multicast communication suits such applications, but in some scenarios its efficiency can drop to reach that of unicast. In this work, we will propose a mechanism to optimise the allocation of radio resources when used for multicast, thus offering the mobile operator an opportunity to increase profit without affecting user satisfaction. The performance of the proposed mechanism is measured for various simulation scenarios.

ACS Style

Jacques Bou Abdo; Rabih Jreish; Jacques Demerjian. Extended optimisation mechanism for radio resource allocation in multicast mobile networks. International Journal of Mobile Network Design and Innovation 2018, 8, 157 .

AMA Style

Jacques Bou Abdo, Rabih Jreish, Jacques Demerjian. Extended optimisation mechanism for radio resource allocation in multicast mobile networks. International Journal of Mobile Network Design and Innovation. 2018; 8 (3):157.

Chicago/Turabian Style

Jacques Bou Abdo; Rabih Jreish; Jacques Demerjian. 2018. "Extended optimisation mechanism for radio resource allocation in multicast mobile networks." International Journal of Mobile Network Design and Innovation 8, no. 3: 157.

Journal article
Published: 01 August 2017 in Pervasive and Mobile Computing
Reads 0
Downloads 0
ACS Style

Jacques Bou Abdo; Jacques Demerjian. Evaluation of mobile cloud architectures. Pervasive and Mobile Computing 2017, 39, 284 -303.

AMA Style

Jacques Bou Abdo, Jacques Demerjian. Evaluation of mobile cloud architectures. Pervasive and Mobile Computing. 2017; 39 ():284-303.

Chicago/Turabian Style

Jacques Bou Abdo; Jacques Demerjian. 2017. "Evaluation of mobile cloud architectures." Pervasive and Mobile Computing 39, no. : 284-303.

Research article
Published: 31 July 2016 in Mobile Information Systems
Reads 0
Downloads 0

Crowdsourcing mobile applications are of increasing importance due to their suitability in providing personalized and better matching replies. The competitive edge of crowdsourcing is twofold; the requestors can achieve better and/or cheaper responses while the crowd contributors can achieve extra money by utilizing their free time or resources. Crowdsourcing location-based services inherit the querying mechanism from their legacy predecessors and this is where the threat lies. In this paper, we are going to show that none of the advanced privacy notions found in the literature except for K -anonymity is suitable for crowdsourced location-based services. In addition, we are going to prove mathematically, using an attack we developed, that K -anonymity does not satisfy the privacy level needed by such services. To respond to this emerging threat, we will propose a new concept, totally different from existing resource consuming privacy notions, to handle user privacy using Mobile Cloud Computing.

ACS Style

Jacques Bou Abdo; Thomas Bourgeau; Jacques Demerjian; Hakima Chaouchi. Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing. Mobile Information Systems 2016, 2016, 1 -13.

AMA Style

Jacques Bou Abdo, Thomas Bourgeau, Jacques Demerjian, Hakima Chaouchi. Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing. Mobile Information Systems. 2016; 2016 ():1-13.

Chicago/Turabian Style

Jacques Bou Abdo; Thomas Bourgeau; Jacques Demerjian; Hakima Chaouchi. 2016. "Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing." Mobile Information Systems 2016, no. : 1-13.

Book chapter
Published: 01 January 2013 in Computer Communications and Networks
Reads 0
Downloads 0

This chapter presents emerging wireless technologies applied to the domain of healthcare, which has been identified as a very important domain of increasing interest to researchers. The chapter also provides an overview of the security issues related to these emerging technologies and networks.

ACS Style

Jacques Bou Abdo; Hakima Chaouchi; Jacques Demerjian. Security in Emerging 4G Networks. Computer Communications and Networks 2013, 243 -272.

AMA Style

Jacques Bou Abdo, Hakima Chaouchi, Jacques Demerjian. Security in Emerging 4G Networks. Computer Communications and Networks. 2013; ():243-272.

Chicago/Turabian Style

Jacques Bou Abdo; Hakima Chaouchi; Jacques Demerjian. 2013. "Security in Emerging 4G Networks." Computer Communications and Networks , no. : 243-272.