Anis Koubaa

Anis Koubaa
Prince Sultan University · Department of Computer Science

PhD

About

357
Publications
229,255
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
9,608
Citations
Introduction
Anis Koubaa is a Professor in Computer Science, Advisor to the Rector, and Leader of the Robotics and Internet of Things Research Lab, in Prince Sultan University. He is also R&D Consultant at Gaitech Robotics in China and Senior Researcher in CISTER/INESC TEC and ISEP-IPP, Porto, Portugal. He has been the Chair of the ACM Chapter in Saudi Arabia since 2014. He is also a Senior Fellow of the Higher Education Academy (HEA) in UK. He is also an ACM Distinguished Speaker.
Additional affiliations
April 2017 - September 2017
Prince Sultan University
Position
  • Professor
April 2017 - present
Prince Sultan University
Position
  • Professor (Full)
August 2012 - present
Prince Sultan University
Position
  • Professor (Associate)

Publications

Publications (357)
Preprint
The growing interest in satellite imagery has triggered the need for efficient mechanisms to extract valuable information from these vast data sources, providing deeper insights. Even though deep learning has shown significant progress in satellite image classification. Nevertheless, in the literature, only a few results can be found on weight init...
Article
Full-text available
In 2022, OpenAI's unveiling of generative AI Large Language Models (LLMs)- ChatGPT, heralded a significant leap forward in human-machine interaction through cutting-edge AI technologies. With its surging popularity, scholars across various fields have begun to delve into the myriad applications of ChatGPT. While existing literature reviews on LLMs...
Article
Full-text available
In recent years, Federated Learning (FL) has gained traction as a privacy-centric approach in medical imaging. This study explores the challenges posed by data heterogeneity on FL algorithms, using the COVIDx CXR-3 dataset as a case study. We contrast the performance of the Federated Averaging (FedAvg) algorithm on non-identically and independently...
Article
Full-text available
Semantic segmentation of Remote Sensing (RS) images involves the classification of each pixel in a satellite image into distinct and non-overlapping regions or segments. This task is crucial in various domains, including land cover classification, autonomous driving, and scene understanding. While deep learning has shown promising results, there is...
Article
Full-text available
The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer protocols, intertwined technologies, security issues, and effective countermeasures. This survey delivers an exhaustive analysis of these protocols, emphasizing the escalating significance of explainable ar...
Preprint
Full-text available
Driver identification is crucial for various applications including automotive security, law enforcement, and the ride-sharing industry, as well as for advanced driver assistance systems, fleet management, and usage-based insurance. Machine learning and deep learning techniques have emerged as promising approaches for accurate identification, yet a...
Preprint
Full-text available
The predominance of English and Latin-based large language models (LLMs) has led to a notable deficit in native Arabic LLMs. This discrepancy is accentuated by the prevalent inclusion of English tokens in existing Arabic models, detracting from their efficacy in processing native Arabic's intricate morphology and syntax. Consequently, there is a th...
Article
Full-text available
In the intricate field of legal studies, the analysis of court decisions is a cornerstone for the effective functioning of the judicial system. The ability to predict court outcomes helps judges during the decision-making process and equips lawyers with invaluable insights, enhancing their strategic approaches to cases. Despite its significance, th...
Article
Clustering is an excellent solution to divide the network into manageable groups to reduce the excessive overhead. However, the number of clusters can lead to MAC contention (in dense clusters) and network disconnection (in sparse clusters) problems. This paper proposes a heuristic and scalable route planning scheme for traffic congestion avoidance...
Preprint
Full-text available
The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer protocols, intertwined technologies, security issues, and effective countermeasures. This survey delivers an exhaustive analysis of these protocols, emphasizing the escalating significance of Explainable Ar...
Article
Full-text available
This paper introduces a novel semicircular distribution obtained by applying the quadratic rank transmutation map to the stereographic semicircular exponential distribution, referred to as the transmuted stereographic semicircular exponential distribution (TSSCED). This newly proposed distribution exhibits enhanced flexibility compared to the basel...
Article
Full-text available
Wireless sensor networks (WSNs), constrained by limited resources, demand routing strategies that prioritize energy efficiency. The tactic of cooperative routing, which leverages the broadcast nature of wireless channels, has garnered attention for its capability to amplify routing efficacy. This manuscript introduces a power-conscious routing appr...
Article
Full-text available
This work presents a highly accurate method for the numerical solution of the advection–diffusion equation of fractional order. In our proposed method, we apply the Laplace transform to handle the time-fractional derivative and utilize the Chebyshev spectral collocation method for spatial discretization. The primary motivation for using the Laplace...
Article
Full-text available
Since the release of ChatGPT, numerous studies have highlighted the remarkable performance of ChatGPT, which often rivals or even surpasses human capabilities in various tasks and domains. However, this paper presents a contrasting perspective by demonstrating an instance where human performance excels in typical tasks suited for ChatGPT, specifica...
Preprint
Full-text available
The Red Palm Weevil (RPW), also known as the palm weevil, is considered among the world's most damaging insect pests of palms. Current detection techniques include the detection of symptoms of RPW using visual or sound inspection and chemical detection of volatile signatures generated by infested palm trees. However, efficient detection of RPW dise...
Article
The Red Palm Weevil (RPW), also known as the palm weevil, is considered among the world's most damaging insect pests of palms. Current detection techniques include the detection of symptoms of RPW using visual or sound inspection and chemical detection of volatile signatures generated by infested palm trees. However, efficient detection of RPW dise...
Preprint
Full-text available
In this paper, we argue that the next generation of robots can be commanded using only Language Models' prompts. Every prompt interrogates separately a specific Robotic Modality via its Modality Language Model (MLM). A central Task Modality mediates the whole communication to execute the robotic mission via a Large Language Model (LLM). This paper...
Preprint
Full-text available
The Red Palm Weevil (RPW) is a highly destructive insect causing economic losses and impacting palm tree farming worldwide. This paper proposes an innovative approach for sustainable palm tree farming by utilizing advanced technologies for the early detection and management of RPW. Our approach combines computer vision, deep learning (DL), the Inte...
Article
The rapid increase in population and transportation resources presents numerous challenges, including traffic congestion and accidents. This paper proposes a smart traffic management (STM) framework that combines the Internet of Vehicles (IoV) and game theory to manage traffic loads at road intersections. The intersection is considered a non-cooper...
Preprint
Full-text available
Advancements in technology have revolutionized communication on social media platforms, where reviews and comments greatly influence product selection. Current opinion mining methods predominantly focus on textual content, overlooking the rich information within customer-posted images, termed here as Multus-Medium. This research introduces an innov...
Article
Full-text available
The flight and control capabilities of uncrewed aerial vehicles (UAVs) have increased significantly with recent research for civilian and commercial applications. As a result, these devices are becoming capable of flying ever greater distances, accomplishing flights beyond line of sight (BVLOS). However, given the need for safety guarantees, these...
Article
Full-text available
Breast cancer is one of the most prevalent causes of death among women across the globe. Early detection is the best strategy for reducing the mortality rate. Currently, mammography is the standard screening modality, which has its shortcomings. To complement this modality, thermal infrared-based Computer-Aided Diagnosis (CADx) tools have been pres...
Preprint
Full-text available
Medical imaging is an essential tool for diagnosing various healthcare diseases and conditions. However, analyzing medical images is a complex and time-consuming task that requires expertise and experience. This article aims to design a decision support system to assist healthcare providers and patients in making decisions about diagnosing, treatin...
Preprint
Full-text available
Since the release of ChatGPT, numerous studies have highlighted the remarkable performance of ChatGPT, which often rivals or even surpasses human capabilities in various tasks and domains. However, this paper presents a contrasting perspective by demonstrating an instance where human performance excels in typical tasks suited for ChatGPT, specifica...
Article
Full-text available
Remote Sensing (RS) images are usually captured at resolutions lower than those required. Deep Learning (DL)-based super-resolution (SR) architectures are typically used to increase the resolution artificially. In this study, we designed a new architecture called TESR (Two-stage approach for Enhancement and super-resolution), leveraging the power o...
Preprint
Full-text available
Image Dehazing aims to remove atmospheric fog or haze from an image. Although the Dehazing models have evolved a lot in recent years, few have precisely tackled the problem of High-Resolution hazy images. For this kind of image, the model needs to work on a downscaled version of the image or on cropped patches from it. In both cases, the accuracy w...
Preprint
Full-text available
Ambient computing is gaining popularity as a major technological advancement for the future. The modern era has witnessed a surge in the advancement in healthcare systems with viable radio frequency (RF) solutions have been proposed for remote and unobtrusive human activity detection (HAD). Specifically, the study investigates the use of Wi-Fi Chan...
Preprint
Full-text available
p>As the echoes of ChatGPT's remarkable success continue to permeate the AI community, its formidable successor, GPT-4, has emerged, showing off a wealth of novel features. In this concise paper, we elucidate the capabilities of GPT-4 and conduct a comparative analysis with its predecessor, ChatGPT, offering insights into their relative strengths a...
Article
Full-text available
Unmanned aerial vehicles (UAVs) equipped with computer vision capabilities have been widely utilized in several remote sensing applications, such as precision agriculture, environmental monitoring, and surveillance. However, the commercial usage of these UAVs in such applications is mostly performed manually, with humans being responsible for data...
Preprint
Full-text available
ChatGPT, a groundbreaking natural language processing technology released just three months ago, has attracted significant attention due to its remarkable capabilities. This AI milestone has urged researchers, industry, decision-makers, and governments to examine this technology, including its implications, threats, and benefits. Despite the short...
Preprint
Full-text available
p>As the echoes of ChatGPT's remarkable success continue to permeate the AI community, its formidable successor, GPT-4, has emerged, showing off a wealth of novel features. In this concise paper, we elucidate the capabilities of GPT-4 and conduct a comparative analysis with its predecessor, ChatGPT, offering insights into their relative strengths a...
Article
Full-text available
Smart healthcare using the cloud and the Internet of Things (IoT) allows for remote patient monitoring, real-time data collection, improved data security, and cost-effective storage and analysis of healthcare data. This paper proposes an information-centric dissemination scheme (ICDS) for smart healthcare services in smart cities. The proposed sche...
Preprint
Full-text available
p>Software-defined networking (SDN) plays a crucial role in the enterprise and wide-area networking. The increasing demand for strict service-level agreement applications on the Internet requires networks to be scalable and resilient in the face of link and switch failure. However, there is a lack of systematic reviews on SDN data plane failure rec...
Preprint
Full-text available
As the echoes of ChatGPT's remarkable success continue to permeate the AI community, its formidable successor, GPT-4, has emerged, showing off a wealth of novel features. In this concise paper, we elucidate the capabilities of GPT-4 and conduct a comparative analysis with its predecessor, ChatGPT, offering insights into their relative strengths and...
Preprint
Full-text available
Smart traffic engineering and intelligent transportation services are in increasing demand from governmental authorities to optimize traffic performance and thus reduce energy costs, increase the drivers' safety and comfort, ensure traffic laws enforcement, and detect traffic violations. In this paper, we address this challenge, and we leverage the...
Article
Full-text available
The Vision Transformer (ViT) architecture has been remarkably successful in image restoration. For a while, Convolutional Neural Networks (CNN) predominated in most computer vision tasks. Now, both CNN and ViT are efficient approaches that demonstrate powerful capabilities to restore a better version of an image given in a low-quality format. In th...
Article
Full-text available
Video streaming-based real-time vehicle identification and license plate recognition systems are challenging to design and deploy in terms of real-time processing on edge, dealing with low image resolution, high noise, and identification. This paper addresses these issues by introducing a novel multi-stage, real-time, deep learning-based vehicle id...
Chapter
The study of control systems in the engineering courses is quite complex, given the difficulty of some teachers in exemplifying and allowing the student to understand how such systems affect the environment. In this context, the STEM methodologies aim to fill this gap between the traditional classes and the student comprehension of the topic throug...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast array of applications and paved the way for a diversity of innovative solutions. Integrating drones with the Internet has led to the emergence of a new paradigm named the Internet...
Article
Full-text available
Software-defined networking (SDN) plays a crucial role in the enterprise and wide-area networking. The increasing demand for strict service-level agreement applications on the Internet requires networks to be scalable and resilient in the face of link and switch failure. However, there is a lack of systematic reviews on SDN data plane failure recov...
Preprint
Full-text available
IoT has enabled the rapid growth of smart remote healthcare applications. These IoT-based remote healthcare applications deliver fast and preventive medical services to patients at risk or with chronic diseases. However, ensuring data security and patient privacy while exchanging sensitive medical data among medical IoT devices is still a significa...
Article
Full-text available
The increasing prevalence of the Industrial Internet of Things (IIoT) in industrial environments amplifies the potential for security breaches and compromises. To monitor IIoT networks, intrusion detection systems (IDS) have been introduced to detect malicious activities within the network flow, in which machine learning (ML) and deep learning (DL)...
Article
Full-text available
ChatGPT, a groundbreaking natural language processing technology released a few months ago, has attracted significant attention due to its remarkable capabilities. This AI milestone has urged researchers, industry, decision-makers, and governments to examine this technology, including its implications, threats, and benefits. Despite the short perio...
Book
Full-text available
Call for Book Chapters – Free Publication in Springer For more information, visit: https://www.riotu-lab.org/dmsrm/ DUE DATES Full-length paper submission: June 15, 2022 Notification of first decision: July 31, 2022 Revised chapter submission: September 30, 2022 Final decision: October 31, 2022 Camera-ready: November 30, 2022
Article
Full-text available
Autonomous robots require control tuning to optimize their performance, such as optimal trajectory tracking. Controllers, such as the Proportional–Integral–Derivative (PID) controller, which are commonly used in robots, are usually tuned by a cumbersome manual process or offline data-driven methods. Both approaches must be repeated if the system co...
Article
Full-text available
Event detection is usually the primary purpose of wireless sensor networks (WSNs). Therefore, it is crucial to determine where and when an event occurs in order to map the event to its spatio-temporal domain. In WSN localization, a few anchor nodes are those aware of their locations via the Global Positioning System (GPS), which is energy-consuming...
Article
Full-text available
Network communications are expanding rapidly in many fields, including telecommunications, the Internet of Things, space, consumer electronics, and the military, with different privacy and security issues at stake in each of these areas. The Internet of Things (IoT) has drawn increased attention from academic and industrial researchers over the las...
Article
Full-text available
Deep learning (DL) has shown outstanding performances in many fields, including remote sensing (RS). DL is turning into an essential tool for the RS research community. Recently, many cloud platforms have been developed to provide access to large-scale computing capacity, consequently permitting the usage of DL architectures as a service. However,...
Chapter
Nowadays, cybercriminals are carrying out many forms of cyberattacks. Malware attacks, in particular, have emerged as one of the most challenging concerns in the cybersecurity area, as well as a key weapon used by cybercriminals. Malware is a term used to describe harmful software. Malware can be used to modify or destroy data on target computers,...
Article
Full-text available
The collaboration between ground and flying robots can take advantage of the capabilities of each system to enhance the performance of robotic applications, including military, healthcare, disaster management, etc. Unfortunately, this cooperation is restricted by the physical constraint that all computation should be performed on robots. The concep...
Article
Full-text available
Smart traffic engineering and intelligent transportation services are in increasing demand from governmental authorities to optimize traffic performance and thus reduce energy costs, increase the drivers' safety and comfort, ensure traffic laws enforcement, and detect traffic violations. In this paper, we address this challenge, and we leverage the...
Article
Full-text available
In recent years, an exponential increase has been witnessed in the population of the urban area worldwide, causing a significant increase in the use of transportation services. The traditional transportation system in metropolitan cities is overwhelmed, leading to many challenges. The Internet-of-Things-(IoT-) based technology has the potential to...
Article
Full-text available
Extensive research has been conducted on healthcare technology and service advancements during the last decade. The Internet of Medical Things (IoMT) has demonstrated the ability to connect various medical apparatus, sensors, and healthcare specialists to ensure the best medical treatment in a distant location. Patient safety has improved, healthca...
Conference Paper
Unmanned Aerial Vehicle (UAV) detection for public safety protection is becoming a critical issue in non-fly zones. There are plenty of attempts of the UAV detection using single stream (day or night vision). In this paper, we propose a new hybrid deep learning model to detect the UAVs in day and night visions with a high detection precision and ac...
Preprint
Full-text available
Deep learning (DL) is being increasingly utilized in healthcare-related fields due to its outstanding efficiency. However, we have to keep the individual health data used by DL models private and secure. Protecting data and preserving the privacy of individuals has become an increasingly prevalent issue. The gap between the DL and privacy communiti...
Preprint
Full-text available
With the number of vehicles continuously increasing, parking monitoring and analysis are becoming a substantial feature of modern cities. In this study, we present a methodology to monitor car parking areas and to analyze their occupancy in real-time. The solution is based on a combination between image analysis and deep learning techniques. It inc...
Article
Full-text available
For many years, mental health has been hidden behind a veil of shame and prejudice. In 2017, studies claimed that 10.7% of the global population suffered from mental health disorders. Recently, people started seeking relaxing treatment through technology, which enhanced and ex- panded mental health care, especially during the COVID-19 pandemic, whe...
Article
Full-text available
Cooperative Vehicular Platooning (Co-VP) is one of the most prominent and challenging applications of Intelligent Traffic Systems. To support such vehicular communications, the ETSI ITS G5 standard specifies event-based communication profiles, triggered by kinematic parameters such as speed. The standard defines a set of threshold values for such t...
Article
Recently, Convolutional Neural Networks (CNNs) have made a great performance for remote sensing image classification. Plant recognition using CNNs is one of the active deep learning research topics due to its added-value in different related fields, especially environmental conservation and natural areas preservation. Automatic recognition of plant...
Article
Full-text available
Deep learning‐based applications for disease detection are essential tools for experts to effectively diagnose diseases at different stages. In this article, a new approach based on an evidence based fusion theory is proposed, allowing the combination of a set of deep learning classifiers to provide more accurate disease detection results. The main...
Article
Full-text available
The whole world is facing a health crisis, that is unique in its kind, due to the COVID-19 pandemic. As the coronavirus continues spreading, researchers are concerned by providing or help provide solutions to save lives and to stop the pandemic outbreak. Among others, artificial intelligence (AI) has been adapted to address the challenges caused by...
Article
Full-text available
The wild animal information collection based on the wireless sensor network (WSN) has an enormous number of applications, as demonstrated in the literature. Yet, it has many problems, such as low information density and high energy consumption ratio. The traditional Internet of Things (IoT) system has characteristics of limited resources and task s...
Article
Full-text available
In this paper, we propose an original deep learning framework for the automated counting and geolocation of palm trees from aerial images using convolutional neural networks. For this purpose, we collected aerial images from two different regions in Saudi Arabia, using two DJI drones, and we built a dataset of around 11,000 instances of palm trees....
Chapter
The development of critical cooperative autonomous vehicle systems is increasingly complex due to the inherent multidimensional problem that encompasses control, communications, and safety. These Cooperating Cyber-Physical Systems (Co-CPS) impose an unprecedented integration between communication, sensing, and actuation actions, alongside the impac...
Chapter
In this paper, a novel passivity-based controller for flexible links robotic mechanisms is proposed. Something that is a substantial contribution to the field is that the dynamic model of two degrees of robotic freedom mechanism is proposed considering, that in this case, a suitable shaping function is implemented in FEM derivations. Along with the...
Chapter
In this paper, the dynamic modeling of a non-holonomic unmanned aerial vehicle UAV with the Euler Lagrange formulation and the design of an energy shaping controller for UAVs is proposed. A 2D unmanned aerial vehicle kinematic model with non-holonomic constraints that satisfy the involutivity properties considers Pfaffian constraints. Then, the unm...
Article
Full-text available
Unmanned aerial systems (UAVs) are dramatically evolving and promoting several civil applications. However, they are still prone to many security issues that threaten public safety. Security becomes even more challenging when they are connected to the Internet as their data stream is exposed to attacks. Unmanned traffic management (UTM) represents...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs) are increasingly being used in many challenging and diversified applications. These applications belong to the civilian and the military fields. To name a few; infrastructure inspection, traffic patrolling, remote sensing, mapping, surveillance, rescuing humans and animals, environment monitoring, and Intelligence, S...
Article
Most applications for small unmanned aerial vehicles (sUAVs) have a critical need for appropriate position and attitude control in environments with extreme external dynamic disturbances such as wind gusts. Moreover, to maximize flight time, UAVs have to operate within strict constraints on payload and under computational efficiency. This article p...
Article
Full-text available
This paper addresses the problem of car detection from aerial images using Convolutional Neural Networks (CNNs). This problem presents additional challenges as compared to car (or any object) detection from ground images because the features of vehicles from aerial images are more difficult to discern. To investigate this issue, we assess the perfo...
Article
Full-text available
Current developments in information technology and increased inclination towards smart cities have led to the initiation of a plethora of features by technology-oriented companies (i.e., car manufacturers) to improve users’ privacy and comfort. The invention of smart vehicle technology paved the way for the excessive use of machine-to-machine techn...
Article
Full-text available
The COVID-19 disease has spread all over the world, representing an intriguing challenge for humanity as a whole. The efficient diagnosis of humans infected by COVID-19 still remains an increasing need worldwide. The chest X-ray imagery represents, among others, one attractive means to detect COVID-19 cases efficiently. Many studies have reported t...
Chapter
Cooperative Vehicular Platooning (CoVP), has been emerging as a challenging Intelligent Traffic Systems application, promising to bring-about several safety and societal benefits. Relying on V2V communications to control such cooperative and automated actions brings several advantages. In this work, we present a Look Ahead PID controller for CoVP t...
Chapter
This paper proposes a robust decentralized asynchronous controller for unmanned aerial vehicle (UAV) swarms with fast convergence topology. The unmanned aerial vehicle’s analyzed mathematicalmodel is a 2D kinematic model that considers the position and attitude in two dimensions. For this purpose, two robust gains are tuned considering the switchin...
Chapter
In this paper, a dynamic PID sliding mode controller for the path following of unmanned aerial vehicles UAV is shown. This strategy consists of dividing the quadrotor UAV dynamics into the position and attitude loop, and by implementing a coordinate transformation, the desired attitude is obtained. First, a dynamic control law is implemented for th...
Article
Choosing the appropriate deployment strategy for any Deep Learning (DL) project in a production environment has always been the most challenging problem for industrial practitioners. There are several conflicting constraints and controversial approaches when it comes to deployment. Among these problems, the deployment on cloud versus the deployment...

Network

Cited By