This page has only limited features, please log in for full access.
The convergence of AI, IoT, and blockchain as the next disruptive technology is inevitable. Studying the ethics of these converged technologies is crucial for the steady development and adoption of the applications. Even though this topic is crucial, it is still not yet touched in the literature. This work is the first attempt to tackle this issue by developing a conceptual ethics framework for converged AI, IoT, and blockchain. The framework is based on a systematic literature review and categorizes the ethical issues into three layers namely micro (ethical issue involving the technology itself), meso (ethical issue involving the applications), and macro (ethical issue involving the society and institutions).
Esther Nehme; Rayane El Sibai; Jacques Bou Abdo; A. Ross Taylor; Jacques Demerjian. Converged AI, IoT, and blockchain technologies: a conceptual ethics framework. AI and Ethics 2021, 1 -15.
AMA StyleEsther Nehme, Rayane El Sibai, Jacques Bou Abdo, A. Ross Taylor, Jacques Demerjian. Converged AI, IoT, and blockchain technologies: a conceptual ethics framework. AI and Ethics. 2021; ():1-15.
Chicago/Turabian StyleEsther Nehme; Rayane El Sibai; Jacques Bou Abdo; A. Ross Taylor; Jacques Demerjian. 2021. "Converged AI, IoT, and blockchain technologies: a conceptual ethics framework." AI and Ethics , no. : 1-15.
The benefits of having a Bike Sharing System (BSS) in a city are numerous. Among other advantages, it promotes a cleaner environment with less traffic and pollution. One major problem the users of such services encounter is that of full or empty stations, causing user dissatisfaction. The objective of this work is to propose a new user-based incentive method to enhance BSS performance. The proposed method relies on a spatial outlier detection algorithm. It consists of adapting the departure and arrival stations of the users to the BSS state by stimulating the users to change their journeys in view of minimizing the number of full and empty stations. Experiments are carried out to compare our proposed method to some existing methods for enhancing the resource availability of BSSs, and they are performed on a real dataset issued from a well-known BSS called Velib. The results show that the proposed strategy improves the availability of BSS resources, even when the collaboration of users is partial.
Rayane El Sibai; Khalil Challita; Jacques Bou Abdo; Jacques Demerjian. A New User-Based Incentive Strategy for Improving Bike Sharing Systems’ Performance. Sustainability 2021, 13, 2780 .
AMA StyleRayane El Sibai, Khalil Challita, Jacques Bou Abdo, Jacques Demerjian. A New User-Based Incentive Strategy for Improving Bike Sharing Systems’ Performance. Sustainability. 2021; 13 (5):2780.
Chicago/Turabian StyleRayane El Sibai; Khalil Challita; Jacques Bou Abdo; Jacques Demerjian. 2021. "A New User-Based Incentive Strategy for Improving Bike Sharing Systems’ Performance." Sustainability 13, no. 5: 2780.
Over the past years, blockchain technology has become more and more interesting since its ability to carry out transactions without any mediator. To ensure the transactions' reliability, consensus algorithms are adopted by blockchain technology. However, due to the failure of consensus algorithms in managing nodes' identities, blockchain technology is considered inappropriate for many applications. In this article, we propose the permissionless proof‐of‐reputation‐X (PL‐PoRX) that upgrades an existing consensus algorithm, the proof‐of‐reputation‐X (PoRX). PL‐PoRX replaces the trusted identity database in PoRX with a new admission process to make the algorithm suitable for permissionless blockchains, while maintaining PoRX's reputation mechanism. Several experiments are conducted to show the efficiency of our approach under different scenarios. We also debate the security model of the new protocol and study its time complexity. The results show that PL‐PoRX decreases the number of blocks issued by malicious miners, and help benign miners build reputation faster.
Jacques Bou Abdo; Rayane El Sibai; Jacques Demerjian. Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains. Transactions on Emerging Telecommunications Technologies 2020, 32, 1 .
AMA StyleJacques Bou Abdo, Rayane El Sibai, Jacques Demerjian. Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains. Transactions on Emerging Telecommunications Technologies. 2020; 32 (1):1.
Chicago/Turabian StyleJacques Bou Abdo; Rayane El Sibai; Jacques Demerjian. 2020. "Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains." Transactions on Emerging Telecommunications Technologies 32, no. 1: 1.
Underwater Collaborative Body Sensor Network (UCBSN) is an important application of Underwater Wireless Sensor Networks (UWSNs). It allows monitoring the performance and status of group of persons in underwater environments to take appropriate actions. In this article, an optimal cluster‐based routing scheme that was previously validated for BSNs and terrestrial CBSN is adapted to the underwater environment and proposed to address UCBSNs challenges. The main aim of the proposed scheme is to ensure reliable transmission of data, while reducing the network delay and the energy consumption of nodes, through optimizing the three steps of the routing process. The performance of the proposed scheme is compared to other existing algorithms in terms of delay, BER, energy consumption, and percentage of dropped packets. This article is protected by copyright. All rights reserved.
Nadine Boudargham; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux; Abdallah Makhoul. An optimal cluster‐based routing algorithm for UCBSNs. Internet Technology Letters 2020, 4, 1 .
AMA StyleNadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul. An optimal cluster‐based routing algorithm for UCBSNs. Internet Technology Letters. 2020; 4 (2):1.
Chicago/Turabian StyleNadine Boudargham; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux; Abdallah Makhoul. 2020. "An optimal cluster‐based routing algorithm for UCBSNs." Internet Technology Letters 4, no. 2: 1.
Data streams represent a challenge to the data processing operations such as query execution and information retrieval. They pose many constraints in terms of memory space and execution time for the computation process. This is mainly due to the huge volume of the data and their high arrival rate. Generating approximate answers by using a small proportion of the data stream, called “summary,” is acceptable for many applications. Sampling algorithms are used to construct a data stream summary. The purpose of sampling algorithms is to provide information concerning a large set of data from a representative sample extracted from it. An effective summary of a data stream must have the ability to respond, in an approximate manner, to any query, whatever the period of time investigating. In this chapter, we present a survey of these algorithms. Firstly, we introduce the basic concepts of data streams, windowing models, as well as data stream applications. Next, we introduce the state of the art of different sampling algorithms used in data stream environments. We classify these algorithms according to the following metrics: number of passes over the data, memory consumption, and skewing ability. In the end, we evaluate the performance of three sampling algorithms according to their execution time and accuracy.
Rayane El Sibai; Jacques Bou Abdo; Yousra Chabchoub; Jacques Demerjian; Raja Chiky; Kablan Barbar. Data Summarization Using Sampling Algorithms: Data Stream Case Study. Transactions on Computational Science and Computational Intelligence 2020, 105 -124.
AMA StyleRayane El Sibai, Jacques Bou Abdo, Yousra Chabchoub, Jacques Demerjian, Raja Chiky, Kablan Barbar. Data Summarization Using Sampling Algorithms: Data Stream Case Study. Transactions on Computational Science and Computational Intelligence. 2020; ():105-124.
Chicago/Turabian StyleRayane El Sibai; Jacques Bou Abdo; Yousra Chabchoub; Jacques Demerjian; Raja Chiky; Kablan Barbar. 2020. "Data Summarization Using Sampling Algorithms: Data Stream Case Study." Transactions on Computational Science and Computational Intelligence , no. : 105-124.
Reputation‐based consensus algorithms are one of the most promising, but least investigated types of consensus algorithms. Its limitation to persmissioned node identity management shades its potential and causes many applications to find blockchain unsuitable. In this paper, we upgrade PoRX, an existing consensus algorithm, into becoming the first permissionless pure reputation‐based consensus algorithm. This upgrade is highly potential since it only affects the admission process and doesn't intervene with the consensus process, thus can be extended into other types of consensus algorithms. This article is protected by copyright. All rights reserved.
Jacques Bou Abdo; Rayane El Sibai; Krishna Kambhampaty; Jacques Demerjian. Permissionless reputation‐based consensus algorithm for blockchain. Internet Technology Letters 2020, 3, 1 .
AMA StyleJacques Bou Abdo, Rayane El Sibai, Krishna Kambhampaty, Jacques Demerjian. Permissionless reputation‐based consensus algorithm for blockchain. Internet Technology Letters. 2020; 3 (3):1.
Chicago/Turabian StyleJacques Bou Abdo; Rayane El Sibai; Krishna Kambhampaty; Jacques Demerjian. 2020. "Permissionless reputation‐based consensus algorithm for blockchain." Internet Technology Letters 3, no. 3: 1.
The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate performance and Quality of Service (QoS). This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment with respect to different QoS and network performance metrics. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropriate action. This study can also be extended to cover collaborative WBAN systems where information from different bodies is sent simultaneously leading to high traffic. OPNET simulations are performed to compare the performance of the different MAC protocols under the same experimental conditions. A new MAC scheme aiming to enhance the delay, throughput, and energy performance of the system is then proposed and compared to existing protocols, to evaluate its performance in high traffic environment.
Nadine Boudargham; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux; Abdallah Makhoul. Performance of low level protocols in high traffic wireless body sensor networks. Peer-to-Peer Networking and Applications 2019, 13, 850 -871.
AMA StyleNadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul. Performance of low level protocols in high traffic wireless body sensor networks. Peer-to-Peer Networking and Applications. 2019; 13 (3):850-871.
Chicago/Turabian StyleNadine Boudargham; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux; Abdallah Makhoul. 2019. "Performance of low level protocols in high traffic wireless body sensor networks." Peer-to-Peer Networking and Applications 13, no. 3: 850-871.
The study of recommender systems is essential nowadays due to its great effect on businesses and customer satisfaction. Different active learning strategies were previously developed to gain ratings from the users on specific items, and this enables the system to have more information and consequently make more accurate recommendations. In previous studies, these strategies were evaluated using a different selection of metrics in each work, and the experimentations were done on different datasets. In this paper, we solve these weaknesses by comparing the main ten non-personalized strategies on a fair ground, by simulating them against two datasets and using seven of the mostly agreed upon metrics. This gives more trust and less biased results when comparing their performances. Also, the analysis of the computation time and the elicitation efficiency is added.
Georges Chaaya; Jacques Bou Abdo; Elisabeth Métais; Raja Chiky; Jacques Demerjian; Kablan Barbar. Comparison of the Non-personalized Active Learning Strategies Used in Recommender Systems. Business Information Systems 2019, 443 -456.
AMA StyleGeorges Chaaya, Jacques Bou Abdo, Elisabeth Métais, Raja Chiky, Jacques Demerjian, Kablan Barbar. Comparison of the Non-personalized Active Learning Strategies Used in Recommender Systems. Business Information Systems. 2019; ():443-456.
Chicago/Turabian StyleGeorges Chaaya; Jacques Bou Abdo; Elisabeth Métais; Raja Chiky; Jacques Demerjian; Kablan Barbar. 2019. "Comparison of the Non-personalized Active Learning Strategies Used in Recommender Systems." Business Information Systems , no. : 443-456.
In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay efficiency of DS-CDMA in traffic burst, and the high energy efficiency of DTDMA in periodic traffic. The proposed scheme is evaluated in terms of delay, packet drop percentage, and energy consumption. Different OPNET simulations are performed for various number of nodes carrying emergency data, and for various payload sizes. The protocol performance is compared to other existing hybrid protocols. Results show that the proposed scheme outperforms the others in terms of delay and packet drop percentage for different number of nodes carrying emergency data, as well as for different payload sizes. It also offers the highest energy efficiency during periodic observation, while adjusting the energy consumption during emergency by assigning spreading codes only to nodes holding emergency data.
Nadine Bou Dargham; Abdallah Makhoul; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux. Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks. Sensors 2018, 18, 3572 .
AMA StyleNadine Bou Dargham, Abdallah Makhoul, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux. Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks. Sensors. 2018; 18 (10):3572.
Chicago/Turabian StyleNadine Bou Dargham; Abdallah Makhoul; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux. 2018. "Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks." Sensors 18, no. 10: 3572.
Jacques Bou Abdo; Rabih Jreish; Jacques Demerjian. Extended optimisation mechanism for radio resource allocation in multicast mobile networks. International Journal of Mobile Network Design and Innovation 2018, 8, 157 .
AMA StyleJacques Bou Abdo, Rabih Jreish, Jacques Demerjian. Extended optimisation mechanism for radio resource allocation in multicast mobile networks. International Journal of Mobile Network Design and Innovation. 2018; 8 (3):157.
Chicago/Turabian StyleJacques Bou Abdo; Rabih Jreish; Jacques Demerjian. 2018. "Extended optimisation mechanism for radio resource allocation in multicast mobile networks." International Journal of Mobile Network Design and Innovation 8, no. 3: 157.
Mobile communication paradigm has shifted from a closed network of transmitters and receivers to an access network transporting what the content providers have to offer. Many existing and future applications offer the same content to most, if not all, clients. These applications include crowdsensing, news, and traffic monitoring portals. Mobile operators would largely benefit if such applications use multicast messages instead of unicast. Multicast communication suits such applications, but in some scenarios its efficiency can drop to reach that of unicast. In this work, we will propose a mechanism to optimise the allocation of radio resources when used for multicast, thus offering the mobile operator an opportunity to increase profit without affecting user satisfaction. The performance of the proposed mechanism is measured for various simulation scenarios.
Jacques Bou Abdo; Rabih Jreish; Jacques Demerjian. Extended optimisation mechanism for radio resource allocation in multicast mobile networks. International Journal of Mobile Network Design and Innovation 2018, 8, 157 .
AMA StyleJacques Bou Abdo, Rabih Jreish, Jacques Demerjian. Extended optimisation mechanism for radio resource allocation in multicast mobile networks. International Journal of Mobile Network Design and Innovation. 2018; 8 (3):157.
Chicago/Turabian StyleJacques Bou Abdo; Rabih Jreish; Jacques Demerjian. 2018. "Extended optimisation mechanism for radio resource allocation in multicast mobile networks." International Journal of Mobile Network Design and Innovation 8, no. 3: 157.
Jacques Bou Abdo; Jacques Demerjian. Evaluation of mobile cloud architectures. Pervasive and Mobile Computing 2017, 39, 284 -303.
AMA StyleJacques Bou Abdo, Jacques Demerjian. Evaluation of mobile cloud architectures. Pervasive and Mobile Computing. 2017; 39 ():284-303.
Chicago/Turabian StyleJacques Bou Abdo; Jacques Demerjian. 2017. "Evaluation of mobile cloud architectures." Pervasive and Mobile Computing 39, no. : 284-303.
Crowdsourcing mobile applications are of increasing importance due to their suitability in providing personalized and better matching replies. The competitive edge of crowdsourcing is twofold; the requestors can achieve better and/or cheaper responses while the crowd contributors can achieve extra money by utilizing their free time or resources. Crowdsourcing location-based services inherit the querying mechanism from their legacy predecessors and this is where the threat lies. In this paper, we are going to show that none of the advanced privacy notions found in the literature except for K -anonymity is suitable for crowdsourced location-based services. In addition, we are going to prove mathematically, using an attack we developed, that K -anonymity does not satisfy the privacy level needed by such services. To respond to this emerging threat, we will propose a new concept, totally different from existing resource consuming privacy notions, to handle user privacy using Mobile Cloud Computing.
Jacques Bou Abdo; Thomas Bourgeau; Jacques Demerjian; Hakima Chaouchi. Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing. Mobile Information Systems 2016, 2016, 1 -13.
AMA StyleJacques Bou Abdo, Thomas Bourgeau, Jacques Demerjian, Hakima Chaouchi. Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing. Mobile Information Systems. 2016; 2016 ():1-13.
Chicago/Turabian StyleJacques Bou Abdo; Thomas Bourgeau; Jacques Demerjian; Hakima Chaouchi. 2016. "Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing." Mobile Information Systems 2016, no. : 1-13.
This chapter presents emerging wireless technologies applied to the domain of healthcare, which has been identified as a very important domain of increasing interest to researchers. The chapter also provides an overview of the security issues related to these emerging technologies and networks.
Jacques Bou Abdo; Hakima Chaouchi; Jacques Demerjian. Security in Emerging 4G Networks. Computer Communications and Networks 2013, 243 -272.
AMA StyleJacques Bou Abdo, Hakima Chaouchi, Jacques Demerjian. Security in Emerging 4G Networks. Computer Communications and Networks. 2013; ():243-272.
Chicago/Turabian StyleJacques Bou Abdo; Hakima Chaouchi; Jacques Demerjian. 2013. "Security in Emerging 4G Networks." Computer Communications and Networks , no. : 243-272.