Nadia Ben Azzouna

Informations générales

Nadia Ben Azzouna
Grade

Maître de conférences

Publications

  • 2025
    Hamida Labidi, Abir Chaabani, Nadia Ben Azzouna

    Hybrid Genetic Algorithm for Solving an Online Vehicle Routing Problem with Time Windows and Heterogeneous Fleet

    This paper proposes a hybrid genetic algorithm to address an online vehicle routing problem with time windows and a heterogeneous fleet, presented at Hybrid Intelligent Systems (HIS 2023)., 2025

    Résumé

    The Vehicle Routing Problem (VRP) is a well-known optimization problem in which we aim traditionally to minimize transportation costs while satisfying customer demands. In fact, most logistics companies use a heterogeneous fleet with varying capacities and costs, presenting a more complex variant known as Rich VRP (RVRP). In this paper, we present a mathematical formulation of the RVRP, considering both hard time windows and dynamically changing requests to be as close as possible to real-life logistics scenarios. To solve this challenging problem, we propose a Hybrid Genetic Algorithm (HGA). The experimental study highlights the out-performance of our proposal when evaluated alongside other algorithms on the same benchmark problems. Additionally, we conduct a sensitivity analysis to illustrate how resilient the algorithm is when problem parameters are altered.

    Ali Abdelghafour Bejaoui, Meriam Jemel, Nadia Ben Azzouna

    Explainable AI Planning:literature review

    Automated planning systems have become indispensable tools in a wide range of applications, from robotics and healthcare to logistics and autonomous systems. However, as these systems grow in complexity, their decision-making processes often become opaque, 2025

    Résumé

    Explainable AI Planning (XAIP) is a pivotal research
    area focused on enhancing the transparency, interpretability,
    and trustworthiness of automated planning systems. This
    paper provides a comprehensive review of XAIP, emphasizing key
    techniques for plan explanation, such as contrastive explanations,
    hierarchical decomposition, and argumentative reasoning frameworks.
    We explore the critical role of argumentation in justifying
    planning decisions and address the challenges of replanning in
    dynamic and uncertain environments, particularly in high-stakes
    domains like healthcare, autonomous systems, and logistics.
    Additionally, we discuss the ethical and practical implications
    of deploying XAIP, highlighting the importance of human-AI
    collaboration, regulatory compliance, and uncertainty handling.
    By examining these aspects, this paper aims to provide a detailed
    understanding of how XAIP can improve the transparency,
    interpretability, and usability of AI planning systems across
    various domains.

    Jihene LATRECH, Zahra Kodia, Nadia Ben Azzouna

    CoD-MaF: toward a Context-Driven Collaborative Filtering using Contextual Biased Matrix Factorization

    International Journal of Data Science and Analytics, 1-18., 2025

    Résumé

    Contextual recommendation has become attainable through the massive amounts of contextual information generated by smartphones and Internet of Things (IoT) devices. The availability of a huge amount of contextual data paves the way for a revolution in recommendation systems. It overcomes the static nature of personalization, which does not allow the discovery of new items and interests, toward a contextualization of the user’s tastes, which are in constant evolution. In this paper, we proposed CoD-MaF, a Context-Driven Collaborative Filtering using Contextual biased Matrix Factorization. Our approach employs feature selection methods to extract the most influential contextual features that will be used to cluster the users using K-means algorithm. The model then performs a collaborative filtering based on matrix factorization with improved contextual biases to suggest relevant personalized recommendations. We highlighted the performance of our method through experiments on four datasets (LDOS-CoMoDa, STS-Travel, IncarMusic and Frappe). Our model enhanced the accuracy of predictions and achieved competitive performance compared to baseline methods in metrics of RMSE and MAE.

    Jihene LATRECH, Zahra Kodia, Nadia Ben Azzouna

    Machine Learning Based Collaborative Filtering Using Jensen-Shannon Divergence for Context-Driven Recommendations

    *, 2025

    Résumé

    This research presents a machine learning-based context-driven collaborative filtering approach with three
    steps: contextual clustering, weighted similarity assessment, and collaborative filtering. User data is clustered
    across 3 aspects, and similarity scores are calculated, dynamically weighted, and aggregated into a normalized
    User-User similarity matrix. Collaborative filtering is then applied to generate contextual recommendations.
    Experiments on the LDOS-CoMoDa dataset demonstrated good performance, with RMSE and MAE rates of
    0.5774 and 0.3333 respectively, outperforming reference approaches.

  • Alia Maaloul, Meriam Jemel, Nadia Ben Azzouna

    Feature selection for Gestational Diabetes Mellitus prediction using XAI based AutoML approach

    International Conference on Decision Aid and Artificial Intelligence 2024 (ICODAI), Tunis, Tunisia, 2024, 2024

    Résumé

    Predicting Gestational Diabetes Mellitus (GDM) is crucial for
    pregnant women to enable regular monitoring of their blood sugar levels and
    adherence to a healthy diet. Early intervention can significantly lower the risk
    of developing this condition. To assess this risk, Machine Learning (ML) and
    Deep Learning techniques are employed. However, traditional ML models often
    face challenges in accurately predicting GDM risk due to the complex
    processing required to optimize their hyperparameters for the best performance.
    This study presents a feature selection for GDM prediction using AutoML-XAI
    techniques (Automatic Machine Learning – eXplainable Artificial Intelligence
    techniques) approach, which aims to automatically predict GDM risk as
    accurate as possible while providing meaningful interpretations of the
    predictive results used in feature selection. The AutoML models generated
    utilize a Kaggle dataset and several combinations of features selected based on
    their scores of importance determinated with XAI techniques such as SHAP

    (Shapley Additive Explanations) and LIME (Local Interpretable Model-
    agnostic Explanations). The proposed approach of autoML and features

    selection with XAI techniques leads to the creation of a precise, efficient, and
    easily interpretable model which surpasses other machine learning models in
    predicting GDM risk without the need for human intervention. The scores of
    importance of features are involved in the feature selection process and
    multiple AutoML models are generated and assessed, with the optimal AutoML
    model being established automatically.

    Rihab Abidi, Nadia Ben Azzouna, Wassim Trojet, Ghaleb Hoblos, Nabil Sahli

    A study of mechanisms and approaches for IoV trust models requirements achievement

    Journal of Supercomputing, 80(3)., 2024

    Résumé

    Intelligent Transportation Systems (ITS) are a promising research area that offers a variety of applications. The objective of these applications is to enhance road safety, to optimize traffic efficiency, and to provide a better driving experience. Yet, the efficiency of ITS applications, such as safety and driver assistance applications, relies essentially on the exchanged data between different entities of the network. Accordingly, trust management models are used to guarantee the quality of the data and to eliminate malicious and selfish nodes to secure vehicular communications. In this paper, we pay a special attention to the requirements of trust management models used in the context of ITS applications. We also dissected the trust model to extract the mechanisms used in the literature to fulfil the identified requirements. Furthermore, we present the most known simulators and evaluation metrics that are used to validate the proposed models. The aim of this study is to provide a global overview of the mechanisms that may be used to fulfil the crucial requirements of trust management models. For this purpose, we employed a systematic mapping study, through which we carefully analysed 60 selected articles. Through our analysis, five main requirements were identified: scalability, accuracy, robustness, privacy preservation, appropriate response time. Different mechanisms and techniques were applied to meet with the identified requirements. Two main findings are reported: (1) The accuracy and robustness requirements are the most considered requirements. On the other hand, the privacy requirement is the least covered by the publications, (2) the majority of the reviewed papers focus on addressing two or three requirements at most. A little number of publications covered all the requirements. Based on the identified research gaps, we highlight some future directions that may be investigated. We provide general recommendations that may serve as a guideline for researchers who want to design trust models that fulfil certain requirements.

    Malek Lachheb, Rihab Abidi, Nadia Ben Azzouna, Nabil Sahli

    Infrastructure-Based Communication Trust Model for Intelligent Transportation Systems.

    In VEHITS (pp. 513-521)., 2024

    Résumé

    Intelligent Transportation Systems (ITS) aim to enhance traffic management through Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I) and Infrastructure-to-Infrastructure (I2I) communications. However, the wireless medium and dynamic nature of these networks expose them to security threats from faulty nodes or malicious attacks. While cryptography-based mechanisms provide security against outsider attacks, the network remains vulnerable to attacks from legitimate but malicious nodes. Trust models have hence been proposed to evaluate node and data credibility to make informed security decisions. Existing models are either vehicle-centric with limited stability due to mobility or infrastructure-based with risks of single points of failure. This paper proposes a self-organizing, infrastructure-based trust model for securing ITS communication leveraging Smart Roadside Signs (SRSs). The model introduces a trust-based clustering algorithm using a fuzzy-based Dempster Shafer Theory (DST). This eliminates dependence on external trusted authorities while enhancing stability through infrastructure oversight. The decentralized trust formation and adaptive clustering balance security assurance with scalability. The results of the simulations show that our model is resilient against on-off attack, packet drop attack, jamming attack, bad-mouthing attack and collusion attack.
    Laibidi Hamida, Abir Chaabani, Nadia Ben Azzouna, Hassine Khaled

    Hybrid genetic algorithm for solving an online vehicle routing problem with time windows and heterogeneous fleet

    23rd International Conference on Hybrid Intelligent Systems (HIS'23), 437-446, Springer Nature Switzerland, 2024

    Résumé

    The Vehicle Routing Problem (VRP) is a well-known optimization problem in which we aim traditionally to minimize transportation costs while satisfying customer demands. In fact, most logistics companies use a heterogeneous fleet with varying capacities and costs, presenting a more complex variant known as Rich VRP (RVRP). In this paper, we present a mathematical formulation of the RVRP, considering both hard time windows and dynamically changing requests to be as close as possible to real-life logistics scenarios. To solve this challenging problem, we propose a Hybrid Genetic Algorithm (HGA). The experimental study highlights the out-performance of our proposal when evaluated alongside other algorithms on the same benchmark problems. Additionally, we conduct a sensitivity analysis to illustrate how resilient the algorithm is when problem parameters are altered.

    Moez Elarfaoui, Nadia Ben Azzouna

    CLUSTERING BASED ON HYBRIDIZATION OF GENETIC ALGORITHM AND IMPROVED K-MEANS (GA-IKM) IN AN IOT NETWORK

    International Journal of Wireless & Mobile Networks (IJWMN), Vol.16, No.6, December 2024, 2024

    Résumé

    The continuous development of Internet infrastructures and the evolution of digital electronics, particularly Nano-computers, are making the Internet of Things (IoT) emergent. Despite the progress, these IoT objects suffer from a crucial problem which is their limited power supply. IoT objects are often deployed as an ad-hoc network. To minimize their consumption of electrical energy, clustering techniques are used. In this paper, a centralized clustering algorithm with single-hop routing based on a genetic algorithm and Improved k-means is proposed. The proposed approach is compared with the LEACH, K-means and OK-means algorithms. Simulation results show that the proposed algorithm performs well in terms of network lifetime and energy consumption.

    Alia Maaloul, Meriam Jemel, Nadia Ben Azzouna

    XAI based feature selection for gestational diabetes Mellitus prediction

    10th International Conference on Control, Decision and Information Technologies (CoDIT), Vallette, Malta, 2024, pp. 1939-1944, 2024

    Résumé

    Gestational Diabetes Mellitus (GDM) is a type of diabetes that develops during pregnancy. It is important for pregnant women to monitor their blood sugar levels regularly and follow a healthy diet. However, early intervention can greatly reduce risk of this type of diabetes. Machine Learning and Deep Learning techniques are utilized to predict this risk based on an individual's symptoms, lifestyle, and medical history. By identifying key features such as age, insulin, body mass index, and glucose levels, machine learning models such as Random Forest and XGBoost are used in this research work to classify patients at risk of a gestational diabetes. In addition, we propose an explainable feature selection approach to improve the accuracy of machine learning models for GDM prediction. This method involves iteratively eliminating features that exhibit a negative contribution as determined by the SHAP (Shapley Additive explanations) feature attribution explanations for the model’s predictions

    Meriam Jemel, Alia Maaloul, Nadia Ben Azzouna

    XAI based feature selection for gestational diabetes Mellitus prediction

    CoDIT 2024: 1939-1944, 2024

    Résumé

    Gestational Diabetes Mellitus (GDM) is a type of diabetes that develops during pregnancy. It is important for pregnant women to monitor their blood sugar levels regularly and follow a healthy diet. However, early intervention can greatly reduce risk of this type of diabetes. Machine Learning and Deep Learning techniques are utilized to predict this risk based on an individual's symptoms, lifestyle, and medical history. By identifying key features such as age, insulin, body mass index, and glucose levels, machine learning models such as Random Forest and XGBoost are used in this research work to classify patients at risk of a gestational diabetes. In addition, we propose an explainable feature selection approach to improve the accuracy of machine learning models for GDM prediction. This method involves iteratively eliminating features that exhibit a negative contribution as determined by the SHAP (Shapley Additive explanations) feature attribution explanations for the model’s predictions.

    Wiem Ben Ghozzi, Zahra Kodia, Nadia Ben Azzouna

    Fatigue Detection for the Elderly Using Machine Learning Techniques

    10th International Conference on Control, Decision and Information Technologies (CoDIT), Vallette, Malta, 2024, pp. 2055-2060, doi: 10.1109/CoDIT62066.2024.10708516., 2024

    Résumé

    Elderly fatigue, a critical issue affecting the health and well-being of the aging population worldwide, presents as a substantial decline in physical and mental activity levels. This widespread condition reduces the quality of life and introduces significant hazards, such as increased accidents and cognitive deterioration. Therefore, this study proposed a model to detect fatigue in the elderly with satisfactory accuracy. In our contribution, we use video and image processing through a video in order to detect the elderly’s face recognition in each frame. The model identifies facial landmarks on the detected face and calculates the Eye Aspect Ratio (EAR), Eye Fixation, Eye Gaze Direction, Mouth Aspect Ratio (MAR), and 3D head pose. Among the various methods evaluated in our study, the Extra Trees algorithm outperformed all others machine learning methods, achieving the highest results with a sensitivity of 98.24%, specificity of 98.35%, and an accuracy of 98.29%.

    Hamdi Ouechtati, Nadia Ben Azzouna

    Towards an Adaptive Trust Management Model Based on ANFIS in the SIoT

    SECRYPT 2024: 710-715, 2024

    Résumé

    The integration of social networking concepts into the IoT environment has led to the Social Internet of Things
    (SIoT) paradigm which enables connected devices and people to facilitate information sharing, interact, and
    enable a variety of attractive applications. However, with this emerging paradigm, people feel cautious and
    wary. They worry about violating their privacy and revealing their data. Without trustworthy mechanisms to
    guarantee the reliability of user’s communications and interactions, the SIoT will not reach enough popularity
    to be considered as a cutting-edge technology. Accordingly, trust management becomes a major challenge
    to improve security and provide qualified services. Therefore, we overcome these issues through proposing
    an adaptive trust management model based on Adaptive Neuro-Fuzzy Inference System (ANFIS) in order to
    estimate the trust level of objects in the Social Internet of Things. We formalized and implemented a new trust
    management model built ANFIS, to analyze different trust parameters, estimate the trust level of objects and
    distinguish malicious behavior from benign behaviors. Experimentation made on a real data set proves the
    performance and the resilience of our trust management model.

    Jihene LATRECH, Zahra Kodia, Nadia Ben Azzouna

    CoDFi-DL: a hybrid recommender system combining enhanced collaborative and demographic filtering based on deep learning.

    Journal of Supercomputing, 80(1), 2024

    Résumé

    The cold start problem has always been a major challenge for recommender systems. It arises when the system lacks rating records for new users or items. Addressing the challenge of providing personalized recommendations in the cold start scenario is crucial. This research proposes a new hybrid recommender system named CoDFi-DL which combines demographic and enhanced collaborative filtering. The demographic filtering is performed through a deep neural network (DNN) and used to solve the new user cold start problem. The enhanced collaborative filtering component of our model focuses on delivering personalized recommendations through a neighborhood-based method. The major contribution in this research is the DNN-based demographic filtering which overcomes the new user cold start problem and enhances the collaborative filtering process. Our system significantly improves the relevancy of the recommendation task and thus provides personalized recommended items to cold users. To evaluate the effectiveness of our approach, we conducted experiments on real multi-label datasets, 1M and 100K MovieLens. CoDFi-DL recommender system showed higher performance in comparison with baseline methods, achieving lower RMSE rates of 0.5710 on the 1M MovieLens dataset and 0.6127 on the 100K MovieLens dataset.

    Jihene LATRECH, Zahra Kodia, Nadia Ben Azzouna

    Twit-CoFiD: a hybrid recommender system based on tweet sentiment analysis

    Social Network Analysis and Mining, 14(1), 123., 2024

    Résumé

    Internet users are overwhelmed by the vast number of services and products to choose from. This data deluge has led to the need for recommender systems. Simultaneously, the explosion of interactions on social networks is constantly increasing. These interactions produce a large amount of content that incites organizations and individuals to exploit it as a support for decision making. In our research, we propose, Twit-CoFiD, a hybrid recommender system based on tweet sentiment analysis which performs a demographic filtering to use its outputs in an enhanced collaborative filtering enriched with a sentiment analysis component. The demographic filtering, based on a Deep Neural Network (DNN), allows to overcome the cold start problem. The sentiment analysis of Twitter data combined with the enhanced collaborative filtering makes recommendations more relevant and personalized. Experiments were conducted on 1M and 100K Movielens datasets. Our system was compared to other existing methods in terms of predictive accuracy, assessed using Root Mean Square Error (RMSE) and Mean Absolute Error (MAE) metrics. It yielded improved results, achieving lower RMSE and MAE rates of 0.4474 and 0.3186 on 100K Movielens dataset and of 0.3609 and 0.3315 on 1M Movielens dataset.

    Jihene LATRECH, Zahra Kodia, Nadia Ben Azzouna

    Context-based Collaborative Filtering: K-Means Clustering and Contextual Matrix Factorization*

    In 2024 10th International Conference on Control, Decision and Information Technologies (CoDIT) (pp. 1-5). IEEE., 2024

    Résumé

    The rapid expansion of contextual information from smartphones and Internet of Things (IoT) devices paved the way for Context-Aware Recommendation Systems (CARS). This abundance of contextual data heralds a transformative era for traditional recommendation systems. In alignment with this trend, we propose a novel model which provides personalized recommendations based on context. Our approach uses K-means algorithm to cluster users based on contextual features. Then, the model performs collaborative filtering based on matrix factorization with enhanced contextual biases to provide relevant recommendations. We demonstrated the performance of our method through experiments conducted on the movie recommender dataset LDOS-CoMoDa. The experimental results showed the effective performance of our proposal compared to reference methods, achieving an RMSE of 0.7416 and an MAE of 0.6183.

  • Ilhem Souissi, Rihab Abidi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Said

    ECOTRUST: A novel model for Energy COnsumption TRUST assurance in electric vehicular networks

    Ad Hoc Networks, 149, 103246., 2023

    Résumé

    Electric Vehicles (EVs) emerged new kinds of applications that strongly depend upon the energy information such as identifying the optimal path towards the vehicle’s destination where the EV maximizes the recovered electrical power, displaying the energetic map that provides an overview about the required energy consumption on each lane, etc. The quality of these applications relies on the reliability of the vehicle-related information (e.g. location, energy consumption). EVs may provide wrong energy information due to sensors’ failure, selfish or malicious reasons. To this aim, a fuzzy-based energy consumption trust (ECOTRUST) model is proposed herein to evaluate the quality of energy information based on two fuzzy inference systems: Instant Energy Trust (IEN-Trust) and Total Energy Trust (TEN-Trust) systems. IEN-TRUST relies on a series of plausibility checks to evaluate the coherence between the reported energy information and other parameters (slope degree, speed and acceleration rate) while TEN-TRUST relies on the similarity between neighbouring vehicles. The performance of the ECOTRUST model is evaluated in terms of the system’s robustness and accuracy under different traffic intensities. We varied the traffic volume and the percentage of malicious vehicles and their behaviours. Results show that IEN-TRUST is resilient to false messages with/without the collusion attack. However, it is unable to deal with complex behaviours of malicious vehicles (e.g. on-off attack, bush telegraph). TEN-TRUST was proposed to deal with the latter issue. Simulation results show that it can accurately deal with complex behaviours in different traffic volumes.
    Rihab Abidi, Nabil Sahli, Wassim Trojet, Nadia Ben Azzouna, Ghaleb Hoblos

    An Infrastructure-Based Trust Management Framework for Cooperative ITS.

    In VEHITS (pp. 329-336)., 2023

    Résumé

    Intelligent Transportation Systems (ITSs) have been exploited by developed countries to enhance the quality of transportation services. However, these systems are still facing major bottlenecks to be addressed such as the data density, precision and reliability of perceived data and computational feasibility of the nodes. Trust management is a mechanism applied to secure the vehicular networks. However, most of the proposed trust models that are applied to Vehicular Ad-hoc NETwork (VANET) do not address all the aforementioned challenges of ITS. In this paper, we present a comprehensive framework of trust management specifically designed for ITS applications. The proposed framework is an infrastructure-based solution that relies on Smart Road Signs (SRSs) to assess the trustworthiness of traffic data and nodes of the network. The idea of the framework is to use autonomous SRSss that are able to collect raw data and evaluate it in order to alert the drivers with reliable traffic information in real time. We adopt a hierarchical architecture that exploits a two-level trust evaluation to ensure accuracy, scalability, security and high reactivity of ITS applications. A discussion of the framework and its strengths is presented.
    Rihab Abidi, Nabil Sahli, Nadia Ben Azzouna, Wassim Trojet, Ghaleb Hoblos

    Monitoring Traffic Congestion Using Trust-Based Smart Road Signs

    In: Klein, C., Jarke, M., Ploeg, J., Berns, K., Vinel, A., Gusikhin, O. (eds) Smart Cities, Green Technologies, and Intelligent Transport Systems. SMARTGREENS VEHITS 2023 2023. Communications in Computer and Information Science, vol 1989. Springer, Cham., 2023

    Résumé

    The evolution of Intelligent Transportation Systems (ITSs) enabled the emergence of traffic management applications, with the aim to enhance the traffic flow and ease the congestion by monitoring the traffic. However, the efficiency of these applications resides on the accuracy of the shared traffic information. Accordingly, trust management models are applied to secure the Vehicular Ad-hoc NETwork (VANET) and to assess the reliability of the data shared within the vehicular network. In this paper, we propose a proof-of-concept of the trust framework proposed in . The main objective is to observe the utility of applying trust management models to the intelligent transportation systems. The simulation results show that deploying trust-based Smart Road Signs (SRSs) helps to alleviate the traffic congestion around junctions by displaying the traffic state to users and offering them the opportunity to take alternative roads.
    Hasanain F. Hashim, Meriam Jemel, Nadia Ben Azzouna

    Dynamic Threasholding GA-based ECG feature selection in cardiovascular disease diagnosis

    Iraqi Journal for Computers and Informatics. Vol. 49 No. 2, 2023, 2023

    Résumé

    Electrocardiogram (ECG) data are usually used to diagnose cardiovascular disease (CVD) with the help of a revolutionary algorithm. Feature selection is a crucial step in the development of accurate and reliable diagnostic models for CVDs. This research introduces the dynamic threshold genetic algorithm (DTGA) algorithm, a type of genetic algorithm that is used for optimization problems and discusses its use in the context of feature selection. This research reveals the success of DTGA in selecting relevant ECG features that ultimately enhance accuracy and efficiency in the diagnosis of CVD. This work also proves the benefits of employing DTGA in clinical practice, including a reduction in the amount of time spent diagnosing patients and an increase in the precision with which individuals who are at risk of CVD can be identified.

    Hasanain F. Hashim, Meriam Jemel, Nadia Ben Azzouna

    Optimization of Multiple Scaling Factors for ECG Steganography Using Dynamic Thresholding GA

    International Journal of Intelligent Systems and Applications in Engineering, 11(4), 01–10, 2023, 2023

    Résumé

    Protecting patient data has become a top priority for healthcare providers in the digital age. ECG steganography is a technique for concealing electrocardiogram (ECG) signals during Internet transmission along with other medical data. This strategy aims to recover all embedded patient data while minimizing degradation of the cover signal caused by embedding. Quantization techniques make it possible to include patient information in the ECG signal, and it has been discovered that multiple scaling factors (MSFs) provide a superior trade-off than uniform single scaling factors. In this paper, we present a novel contribution to the field: a discrete wavelet transforms and singular value decomposition-based dynamic Thresholding GA (DTGA)-based ECG steganography scheme. Using the MITIH database, we demonstrate the efficacy of this method, and our findings corroborate that DTGA significantly improves data security.

    Hamida Labidi, Nadia Ben Azzouna, Khaled Hassine, Mohamed Salah Gouider

    An improved genetic algorithm for solving the multi-objective vehicle routing problem with environmental considerations

    This paper presents an improved genetic algorithm for addressing the multi-objective vehicle routing problem with environmental considerations, published at KES 2023., 2023

    Résumé

    In recent years, the negative impacts of neglecting the environment, particularly global warming caused by greenhouse gases, have gained attention. Many countries and organizations are taking steps to reduce their greenhouse gas emissions and promote sustainable practices. In this paper, we aim to address the gap in the classical Vehicle Routing Problem (VRP) by taking into consideration the environmental effects of vehicles. To find a balance between cost-efficiency and environmental impact, we propose a Hybrid Genetic Algorithm (HGA) to address the Dynamic Vehicle Routing Problem with Time Windows (DVRPTW) and a heterogeneous fleet, taking into account new orders that arrive dynamically during the routing process. This approach takes into consideration the environmental effects of the solutions by optimizing the number and type/size of vehicles used to fulfill both static and dynamic orders. The goal is to provide a solution that is both cost-effective and environmentally friendly, addressing the issue of over-exploitation of energy and atmospheric pollution that threaten our ecological environment. Computational results prove that the hybridization of a genetic algorithm with a greedy algorithm can find high-quality solutions in a reasonable run time.

    Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said

    A fuzzy logic-based model for filtering dishonest recommendations in the Social Internet of Things

    Journal of Ambient Intelligence and Humanized Computing, 14(5), 6181-6200., 2023

    Résumé

    In the recent year, Internet of Things (IoT) has been adopted in several real-world applications such as smart transportation, smart city, retail, agriculture, smart factory, etc. to make human life more reliable. The integration of social networking concepts into the IoT led to the rise of a new paradigm: the Social Internet of Things (SIoT). In the SIoT environment, the objects are capable of establishing in an autonomous way many social relationships anywhere and anytime with other trusted objects. However, in such environment, objects may provide dishonest recommendations due to malicious reasons such as bad mouthing, ballot stuffing, random opinion, etc. In order to cater these challenges, we propose a new fuzzy logic-based model to filter dishonest recommendations and estimate their trust level based on (1) their values and sending time and the place coordinates and (2) the social relationship parameters of the recommenders. Results prove that our proposed approach is able to detect 100% of the fake Sybil attack and achieves 100% of Recognition Proportion, Sensitivity, Specificity, Accuracy and F1 score and gets 0% of False Negative and False Positive Proportions in presence of up to 90% dishonest recommendations.

  • Ilhem Souissi, Nadia Ben Azzouna, Rihab Abidi, Tahar Berradia, Lamjed Ben Said

    SP-TRUST: a trust management model for speed trust in vehicular networks

    International Journal of Computers and Applications, 44(11), 1065-1073., 2022

    Résumé

    Information security mechanisms are crucial for Vehicular Ad-hoc NETworks (VANET) applications in order to preserve their robustness. The efficiency of these applications relies on the reliability of the used information, especially the vehicle-related information such as location and speed. Trust management models are crucial to evaluate the quality of the used information. Accordingly, we focus in this paper on the assessment of speed information to detect the malicious vehicles using a fuzzy-based model (SP-TRUST). The proposed model relies on two fuzzy inference systems. The first one evaluates the speed trust based on traffic rules (inter-vehicle distance) while considering the road topology (angle deviation) and the traffic state (density). The correlation between these parameters and the speed value is assessed. The second inference system assesses the speed trust based on the behavior of neighbor vehicles using the median speed of vehicles. Simulations were carried out to evaluate the robustness and the scalability of SP-TRUST model. The results of the experimental studies proved that the model performs well in detecting different behaviors of malicious vehicles in different scenarios, especially when the percentage of malicious vehicles is lower than 50%.

  • Rihab Abidi, Nadia Ben Azzouna

    abidi rihab Self-adaptive trust management model for social IoT services

    In 2021 International Symposium on Networks, Computers and Communications (ISNCC) (pp. 1-7). IEEE., 2021

    Résumé

    The paradigm of Social Internet of Things (SIoT) incorporates the concepts of social networking in the Internet of Things (IoT). The idea of SIoT is to allow objects to autonomously establish social relationships, which may facilitate network navigability and the discovery of information and services. The characteristics of the IoT such as the heterogeneity and the dynamicity of the network and the social relationships between devices lead to several challenges including how to build a reliable network. In this paper, we propose an adaptive trust management model that helps nodes seeking trusted service providers. The trustworthiness of a service provider is assessed on the basis of its past experiences with the requestor and of the recommendations of the requester’s neighbors. In our trust model, the trust parameters evolve dynamically in response to the change of the network context, the type of the demanded service and the nature of the relationships between the different nodes. The experiment results show that our proposed model achieves high accuracy and it is proved to be resilient against common attacks.

  • Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira

    RPMInter-work: a multi-agent approach for planning the task-role assignments in inter-organisational workflow

    Enterprise Information Systems, 14(5), 611–640., 2019

    Résumé

    Workflow management is a core component of modern Enterprise Information Systems (EISs) infrastructure that automates the execution of critical business processes. One of the particular interests of the security community is how to ensure the completion of the workflow execution in the presence of authorisation constraints. These constraints present some restrictions on the users or the roles that are authorised to execute the workflow tasks. The goal is to enforce the legal assignments of access privileges to the executors of the workflow tasks. Despite the variety of approaches proposed in this context, an approach dedicated to the inter-organisational workflows is still missing. In this paper, we take a step towards this goal by proposing a multi-agent-based model, named RPMInter-Work (task-Role assignment Planning Model for Inter-organisational Workflow). Our approach aims to perform the planning of the task-role assignments in inter-organisational workflow in presence of authorisation constraints that are related to task-role assignments. In our research work, this planning problem is formulated as a DisCSP (Distributed Constraint Satisfaction Problem). Our proposed contribution is based on the requirements of inter-organisational workflows, in particular, the autonomy of the participating organisations and the respect of their privacy. A prototype of RPMInter-Work is implemented using JADE (Java Agent DEvelopment) platform and some evaluation results of this prototype are exposed in this paper.

    Nadia Ben Azzouna, Khaled Ghedira

    RPMInterwork: A multi-agent approach for planning task-role assignments in inter-organizational workflow

    Enterprise Information Systems, 14(5), 611–640., 2019, 2019

    Résumé

    Workflow management is a core component of modern Enterprise Information Systems (EISs) infrastructure that automates the execution of critical business processes. One of the particular interests of the security community is how to ensure the completion of the workflow execution in the presence of authorisation constraints. These constraints present some restrictions on the users or the roles that are authorised to execute the workflow tasks. The goal is to enforce the legal assignments of access privileges to the executors of the workflow tasks. Despite the variety of approaches proposed in this context, an approach dedicated to the inter-organisational workflows is still missing. In this paper, we take a step towards this goal by proposing a multi-agent-based model, named RPMInter-Work (task-Role assignment Planning Model for Inter-organisational Workflow). Our approach aims to perform the planning of the task-role assignments in inter-organisational workflow in presence of authorisation constraints that are related to task-role assignments. In our research work, this planning problem is formulated as a DisCSP (Distributed Constraint Satisfaction Problem). Our proposed contribution is based on the requirements of inter-organisational workflows, in particular, the autonomy of the participating organisations and the respect of their privacy. A prototype of RPMInter-Work is implemented using JADE (Java Agent DEvelopment) platform and some evaluation results of this prototype are exposed in this paper.

    Nadia Ben Azzouna, Khaled Ghedira

    RPMInter-work: a multi-agent approach for planning the task-role assignments in inter-organisational workflow

    Enterprise Information Systems, 14(5), 611–640., 2019, 2019

    Résumé

    Workflow management is a core component of modern Enterprise Information Systems (EISs) infrastructure that automates the execution of critical business processes. One of the particular interests of the security community is how to ensure the completion of the workflow execution in the presence of authorisation constraints. These constraints present some restrictions on the users or the roles that are authorised to execute the workflow tasks. The goal is to enforce the legal assignments of access privileges to the executors of the workflow tasks. Despite the variety of approaches proposed in this context, an approach dedicated to the inter-organisational workflows is still missing. In this paper, we take a step towards this goal by proposing a multi-agent-based model, named RPMInter-Work (task-Role assignment Planning Model for Inter-organisational Workflow). Our approach aims to perform the planning of the task-role assignments in inter-organisational workflow in presence of authorisation constraints that are related to task-role assignments. In our research work, this planning problem is formulated as a DisCSP (Distributed Constraint Satisfaction Problem). Our proposed contribution is based on the requirements of inter-organisational workflows, in particular, the autonomy of the participating organisations and the respect of their privacy. A prototype of RPMInter-Work is implemented using JADE (Java Agent DEvelopment) platform and some evaluation results of this prototype are exposed in this paper.

    Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira

    RPMInterwork: A multi-agent approach for planning task-role assignments in inter-organizational workflow

    the Journal of Enterprise Information Systems, Taylor & Francis, 2019, 2019

    Résumé

    Workflow management is a core component of modern Enterprise Information Systems (EISs) infrastructure that automates the execution of critical business processes. One of the particular interests of the security community is how to ensure the completion of the workflow execution in the presence of authorisation constraints. These constraints present some restrictions on the users or the roles that are authorised to execute the workflow tasks. The goal is to enforce the legal assignments of access privileges to the executors of the workflow tasks. Despite the variety of approaches proposed in this context, an approach dedicated to the inter-organisational workflows is still missing. In this paper, we take a step towards this goal by proposing a multi-agent-based model, named RPMInter-Work (task-Role assignment Planning Model for Inter-organisational Workflow). Our approach aims to perform the planning of the task-role assignments in inter-organisational workflow in presence of authorisation constraints that are related to task-role assignments. In our research work, this planning problem is formulated as a DisCSP (Distributed Constraint Satisfaction Problem). Our proposed contribution is based on the requirements of inter-organisational workflows, in particular, the autonomy of the participating organisations and the respect of their privacy. A prototype of RPMInter-Work is implemented using JADE (Java Agent DEvelopment) platform and some evaluation results of this prototype are exposed in this paper.

    Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said

    A fuzzy logic based trust-ABAC model for the Internet of Things

    In International Conference on Advanced Information Networking and Applications (pp. 1157-1168). Cham: Springer International Publishing., 2019

    Résumé

    The Internet of Things (IoT) integrates a large amount of everyday life devices from heterogeneous network environments, bringing a great challenge into security and reliability management. In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. In this paper, we present Fuzzy logic based Trust-ABAC model, an access control model for the Internet of Things. Our model for the IoT is an improvement of our previous work Trust-ABAC by a new Fuzzy logic-based model in which we consider an evaluation of trust based on recommendations and social relationship that can deal effectively with certain types of malicious behavior that intend to mislead other nodes. Results prove the performance of the proposed model and its capabilities to detect the collision and singular attacks with high precision.

  • Hamdi Ouechtati, Nadia Ben Azzouna, Lamjed Ben Said

    Towards a self-adaptive access control middleware for the Internet of Things

    In 2018 International Conference on Information Networking (ICOIN) (pp. 545-550). IEEE., 2018

    Résumé

    In order to cope with certain challenges posed by IoT environment and device capacity, a Self-Adaptive access control model is needed to resolve security and privacy issues. The use of complex encryption algorithms is infeasible due to the volatile nature of IoT environment and pervasive devices with limited resources. In this paper, we propose an access control middleware for the Internet of Things. The latter is an extension of the ABAC model in order to take into account the subject behavior and the trust value in the decision making process. In this work, we introduce a dynamic adaptation process of access control rules based on the risk value, the policies and rule sets which can effectively improve the security of IoT applications and produce more efficient access control mechanisms for the Internet of Things.

  • Hamdi Ouechtati, Nadia Ben Azzouna

    Trust-abac towards an access control system for the internet of things

    In International Conference on Green, Pervasive, and Cloud Computing (pp. 75-89). Cham: Springer International Publishing., 2017

    Résumé

    In order to cope with certain challenges posed by device capacity and the nature of IoT networks, a lightweight access control model is needed to resolve security and privacy issues. The use of complex encryption algorithms is infeasible due to the volatile nature of IoT environment and pervasive devices with limited resources. In this paper, we present the Trust-ABAC, an access control model for the Internet of Things, in which a coupling between the access control based on attributes and the trust concept is done. We evaluated the performance of Trust-ABAC through an experiment based on a simulation. We used the OMNeT++ simulator to show the efficiency of our model in terms of power consumption, response time and the average number of messages generated by an access request. The obtained results of simulation prove the good scalability of our Trust-ABAC model.

  • Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira

    ECA rules for controlling authorisation plan to satisfy dynamic constraints.

    . In Proceedings of the 13th Annual Conference on Privacy, Security and Trust (PST 2015), November 26-28 2015, Aksaray, Turkey, pages 133-138, IEEE Computer Society, 2015, 2015

    Résumé

    The workflow satisfiability problem has been studied by researchers in the security community using various approaches. The goal is to ensure that the user/role is authorised to execute the current task and that this permission doesn't prevent the remaining tasks in the workflow instance to be achieved. A valid authorisation plan consists in affecting authorised roles and users to workflow tasks in such a way that all the authorisation constraints are satisfied. Previous works are interested in workflow satisfiability problem by considering intra-instance constraints, i.e. constraints which are applied to a single instance. However, inter-instance constraints which are specified over multiple workflow instances are also paramount to mitigate the security frauds. In this paper, we present how ECA (Event-Condition-Action) paradigm and agent technology can be exploited to control authorisation plan in order to meet dynamic constraints, namely intra-instance and inter-instance constraints. We present a specification of a set of ECA rules that aim to achieve this goal. A prototype implementation of our proposed approach is also provided in this paper.

  • Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira

    A novel approach for dynamic authorisation planning in constrained workow systems

    In the 6th International Conference on Security of Information and Networks (SIN 2013), July 21-23 2013, Izmir, Turkey, pages 388-391, ACM, 2013., 2013

    Résumé

    In this paper we present a specification of the most common static and dynamic workflow authorisation constraints. We propose an authorisation model that includes a planning phase, an execution phase and an adjustment phase. In addition, we focus on how the problems of role-task assignment and user-task assignment are respectively translated into CSP (Constraint Satisfaction Problem) and DyCSP (Dynamic constraint Satisfaction Problem) and solved using the explanation concept. In case of an inconsistent assignment problem, we propose to restore problem consistency based upon inconsistency explanation.

    Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira

    Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints

    In the 6th International Conference on Security of Information and Networks (SIN 2013), July 21-23 2013, Izmir, Turkey, pages 440-443, ACM, 2013., 2013

    Résumé

    Role-Based Access Control (RBAC) model has been developed as an alternative to traditional approaches to handle access control in workflow systems. Accordingly, authorisation constraints must be defined to enforce the legal assignment of access privileges to roles and roles to users. The authorisation planning ensures that there is at least one way to complete the workflow instance without breaching any of the authorisation constraints. Authorisation planning with considering intra-instance constraints has been discussed in the research literature. However, the inter-instance constraints also need to be considered to mitigate the security fraud. In this paper, a novel authorisation system that incorporates intra-instance and inter-instance constraints is proposed. It includes the planning phase, the execution phase, and the adjustment phase. It is in charge of generating user/role assignment plans, verifying them and eventually updating them to take into account the dynamic (intra-instance and inter-instance) constraints. Besides, grounded upon agent technology and publish-subscribe communication model, a mechanism for the consideration of dynamic constraints (intra-instance and inter-intance) to generate valid assignment plans is demonstrated.

  • Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira

    Towards a scalable and dynamic access control system for web services

    In Proceedings of the 8th International conference on Web Information Systems and Technologies(WEBIST 2012), April 18 -21 2012,Porto, Portugal, pages 161-166, 2012., 2012

    Résumé

    Web services are vulnerable to different types of security attacks. The problem of secure access to web-based
    applications is becoming increasingly complex. Management complexity arises because of the scalability
    considerations such as the large number of web services users and their invocations and the fact that the
    access control system should take into account the context. In this paper we describe the architecture of
    our TDRBAC (Trust and Dynamic Role Based Access Control) model which is implemented using agent
    technology. In fact, this technology fulfills several requirements of web service’s access control by providing
    both context awareness and scalability. In order to verify the scalability of the proposed solution, we expose
    some experimental results from a prototype implemented using JADE (Java Agent DEvelopment) platform.
    The performance tests show that our TDRBAC multi-agent based system meets the scaling requirements of
    large distributed services.

  • Meriam Jemel, Nadia Ben Azzouna, Khaled Ghedira

    Towards a dynamic access control model for e-government web services

    In Proceedings of the 2010 IEEE Asia-Pacific Services Computing Conference (APSCC'10), December 6-10 2010, Hangzhou, China, pages 433-440, IEEE Computer Society, 2010

    Résumé

    The need of interoperable e-government services is addressed through the use of web services where sensitive services need to be granted to only authorized subjects from different organizations. In this paper, we propose a Trust and Dynamic Role Based Access Control model (TDRBAC) which deals with the specific requirements of e-government services. It effectively enhances the access control level since it is based on the trust level notion. The trust level evaluation is based on contextual attributes to assign to user role the appropriate view during the active session. The TDRBAC model is sensitive to the internal or external arisen events and it incorporates them in the access decision which makes it suitable for e-government dynamic environment.

  • Nadia Ben Azzouna, Fabrice Guillemin

    Experimental analysis of the impact of peer‐to‐peer applications on traffic in commercial IP networks

    European Transactions on Telecommunications, 15: 511-522., 2004

    Résumé

    To evaluate the impact of peer-to-peer (P2P) applications on traffic in wide area networks, we analyze measurements from a high speed IP backbone link carrying TCP traffic towards several ADSL areas. The first observations are that the prevalent part of traffic is due to P2P applications (almost 80% of total traffic) and that the usage of network becomes symmetric in the sense that customers are not only clients but also servers. This latter point is observed by the significant proportion of long flows mainly composed of ACK segments. When analyzing the bit rate created by long flows, it turns out that the TCP connections due to P2P applications have a rather small bit rate and that there is no evidence for long range dependence. These facts are intimately related to the way P2P protocols are running. We separately analyze signaling traffic and data traffic. It turns out that by adopting a suitable level of aggregation, global traffic can be described by means of usual tele-traffic models based on M/G/∞ queues with Weibullian service times.

    Nadia Ben Azzouna, Fabrice Guillemin

    Charcteristic of ip traffic in commercial wide area networks

    Proceedings of the International Conference on Computing, Communcations and Control Technologies (CCCT’2004), Austin, Texas (TX), 2004

    Résumé

    Measurements from an Internet backbone link carrying TCP traf
    f
    ic towards different ADSL areas are analyzed in this paper. For
    traffic analysis, we adopt a flow-based approach and the popular
    mice/elephants dichotomy. The originality of the experimental
    data reported in this paper, when compared with previous mea
    surements from very high speed backbone links, is in that com
    mercial traffic comprises a significant percentage due to peer-to
    peer applications. This kind of traffic exhibits some remarkable
    properties in terms of mice, elephants and bit rates, which are
    thoroughly described in this paper. Mice due to p2p protocols and
    mice due to classical Internet applications such as HTTP, ftp, etc.
    are analyzed separately. It turns out that by adopting a suitable
    level of aggregation, global traffic can be described by means of
    usual tele-traffic models based on M/G/∞ queues with Weibul
    lian service times. The global bit rate can be approximated by the
    superposition of Gaussian processes perturbed by a white noise
    and does not exhibit long range dependence.

    Walid Saddi, Nadia Ben Azzouna, Fabrice Guillemin

    IP Traffic Classification via Blind Source Separation Based on Jacobi Algorithm

    Freire, M.M., Chemouil, P., Lorenz, P., Gravey, A. (eds) Universal Multiservice Networks. ECUMN 2004. Lecture Notes in Computer Science, vol 3262. Springer, Berlin, Heidelberg., 2004

    Résumé

    By distinguishing long and short TCP flows, we address in this paper the problem of efficiently computing the characteristics of long flows. Instead of using time consuming off-line flow classification procedures, we investigate how flow characteristics could directly be inferred from traffic measurements by means of digital signal processing techniques. The proposed approach consists of classifying on the fly packets according to their size in order to construct two signals, one associated with short flows and the other with long flows. Since these two signals have intertwined spectral characteristics, we use a blind source separation technique in order to reconstruct the original spectral densities of short and long flow sources. The method is applied to a real traffic trace captured on a link of the France Telecom IP backbone network and proves efficient to recover the characteristics of long and short flows.

  • Nadia Ben Azzouna, Fabrice Guillemin

    Analysis of ADSL traffic on an IP backbone link

    GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489), 2003

    Résumé

    Measurements from an Internet backbone link carrying TCP traffic towards different ADSL areas are analyzed. For traffic analysis, we adopt a flow based approach and the popular mice/elephants dichotomy, where mice refer to short traffic transfers and elephants to long transfers. The originality of the reported experimental data, when compared with previous measurements from very high speed backbone links, is that the commercial traffic includes a significant part generated by peer-to-peer applications. This kind of traffic exhibits some remarkable properties in terms of mice and elephants, as we describe. It turns out that by adopting a suitable level of aggregation, the bit rate of mice can be described by means of a Gaussian process. The bit rate of elephants is smoother than that of mice and can also be well approximated by a Gaussian process.

Projets