IJCSIS Papers by Dr. Mohamed Tounsi
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Steganography is the art of secret communication and steganalysis is the art of detecting the hid... more Steganography is the art of secret communication and steganalysis is the art of detecting the hidden messages embedded in digital media covers. One of the covers that is gaining interest in the field is video. Presently, the global IP video traffic forms the major part of all consumer Internet traffic. It is also gaining attention in the field of digital forensics and homeland security in which threats of covert communications hold serious consequences. Thus, steganography technicians will prefer video to other types of covers like audio files, still images, or texts. Moreover, video steganography will be of more interest because it provides more concealing capacity. Contrariwise, investigation in video steganalysis methods does not seem to follow the momentum even if law enforcement agencies and governments around the world support and encourage investigation in this field. In this paper, the authors review the most important methods used so far in video steganalysis and sketch the future trends. To the best of the authors' knowledge this is the most comprehensive review of video steganalysis produced so far.
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

One of the most important issues in the wireless sensor networks (WSNs) is nodes energy. The rout... more One of the most important issues in the wireless sensor networks (WSNs) is nodes energy. The routing protocols as well as nodes management are considered as the key elements to improve a network's lifetime. In this research, we have suggested a dynamic heuristic for new nodes selection that manages efficiently the active nodes using a Tabu Node Selection coupled with minimum spanning tree routing protocol (TNS). Minimizing the total energy consumption in WSN, is not enough alone, since some nodes drain their energy faster than others, and may cause network failure. To balance the energy consumption, our strategy is to identify nodes with high-energy depletion and balance data routing on their neighbours. This approach performs nodes energy balancing, by creating lists of Tabu nodes (periodically inactive nodes). Such a scheme will prevent the most used nodes, such as nodes close to the base station to see their energy drain. The nodes in the Tabu lists will dynamically be active according to the energy level of nodes surrounding them. Our new dynamic heuristic has proven to outperform other nodes management approach which does not use Tabu search. The experiments show that Tabu list combined with Minimum Spanning Tree routing protocol extend drastically the network lifetime by balancing optimally the nodes energy.

In Wireless Sensor Networks (WSN), sensor node energy is important for maximizing the network lif... more In Wireless Sensor Networks (WSN), sensor node energy is important for maximizing the network lifetime as well as performing sensing and communicating data. Most existing optimization solution for enhancing network lifetime considers only one objective, while the WSNs problems are by nature multi-objectives optimization one. To address this lack of representation, we propose a Multi-Objective Protocol (MOP) that uses Mixed Integer Linear Programming (MILP) optimization approach for increasing network lifetime and residual energy. Sets of MILP are solved locally within each set of nodes covering a specific target. Thus, the energy is saved locally within same coverage nodes. The objectives considered in this paper include maximizing network residual energy and connectivity for neighbor nodes. The nodes that are put inactive, are those which are mostly used during routing, and having less connectivity with their neighbors by solving locally MILP at each round. From the simulation results we showed that, our proposed model provides efficient and accurate decisions for network lifetime and increasing residual energy compared to other Multi-objective models.
Papers by Dr. Mohamed Tounsi

Cogent Engineering , 2021
One of the most important issues in the wireless sensor networks (WSNs) is nodes energy. The rout... more One of the most important issues in the wireless sensor networks (WSNs) is nodes energy. The routing protocols as well as nodes management are considered as the key elements to improve a network’s lifetime. In this research, we have suggested a dynamic heuristic for new nodes selection that manages efficiently the active nodes using a Tabu Node Selection coupled with minimum spanning tree routing protocol (TNS). Minimizing the total energy consumption in WSN, is not enough alone, since some nodes drain their energy faster than others, and may cause network failure. To balance the energy consumption, our strategy is to identify nodes with high-energy depletion and balance data routing on their neighbours. This approach performs nodes energy balancing, by creating lists of Tabu nodes (periodically inactive nodes). Such a scheme will prevent the most used nodes, such as nodes close to the base station to see their energy drain. The nodes in the Tabu lists will dynamically be active according to the energy level of nodes surrounding them. Our new dynamic heuristic has proven to outperform other nodes management approach which does not use Tabu search. The experiments show that Tabu list combined with Minimum Spanning Tree routing protocol extend drastically the network lifetime by balancing optimally the nodes energy.

Sensors , 2022
The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network... more The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to insecure communication, traffic congestion, security, and privacy issues in vehicular networks (VNs). In addition, detecting malicious IVs, data integration, and data validation are major issues in VNs that affect network performance. A blockchain-based model for secure communication and malicious IV detection is proposed to address the above issues. In addition, this system also addresses data integration and transaction validation using an encryption scheme for secure communication. A multi-chain concept separates the legitimate and malicious data into two chains: the Integrity chain (I-chain) and Fraud chain (F-chain). This multi-chain mechanism solves the storage problem and reduces the computing power. The integration of blockchain in the proposed model provides privacy, network security, transparency, and immutability. To address the storage issue, the InterPlanetary File System (IPFS) is integrated with Certificate Authority (CA). A reputation mechanism is introduced to detect malicious IVs in the network based on ratings. This reputation mechanism is also used to prevent Sybil attack. The evaluation of the proposed work is based on the cost of smart contracts and computation time. Furthermore, two attacker models are presented to prevent the selfish mining attack and the Sybil attack. Finally, a security analysis of the proposed smart contracts with their security vulnerabilities is also presented.

Actuators, 2022
This paper presents a fault tolerant scheme employing adaptive non-singular fixed-time terminal s... more This paper presents a fault tolerant scheme employing adaptive non-singular fixed-time terminal sliding mode control (AFxNTSM) for the application of robotic manipulators under uncertainties, external disturbances, and actuator faults. To begin, non-singular fixed-time terminal sliding mode control (FxNTSM) is put forth. This control method uses non-singular terminal sliding mode control to quickly reach fixed-time convergence, accomplish satisfactory performance in tracking, and produce non-singular and non-chatter control inputs. Then, without knowing the upper bounds beforehand, AFxNTSM is used as a reliable fault tolerant control (FTC) to estimate actuator faults and unknown dynamics. The fixed-time stability of the closed-loop system is established by the theory of Lyapunov analysis. The computer simulation results of the position tracking, control inputs, and adaptive parameters are presented to verify and illustrate the performance of the proposed strategy.

Entropy, 2022
In this investigation, the adaptive fractional-order non-singular fixed-time terminal sliding mod... more In this investigation, the adaptive fractional-order non-singular fixed-time terminal sliding mode (AFoFxNTSM) control for the uncertain dynamics of robotic manipulators with external disturbances is introduced. The idea of fractional-order non-singular fixed-time terminal sliding mode (FoFxNTSM) control is presented as the initial step. This approach, which combines the benefits of a fractional-order parameter with the advantages of NTSM, gives rapid fixed-time convergence, non-singularity, and chatter-free control inputs. After that, an adaptive control strategy is merged with the FoFxNTSM, and the resulting model is given the label AFoFxNTSM. This is done in order to account for the unknown dynamics of the system, which are caused by uncertainties and bounded external disturbances. The Lyapunov analysis reveals how stable the closed-loop system is over a fixed time. The pertinent simulation results are offered here for the purposes of evaluating and illustrating the performance of the suggested scheme applied on a PUMA 560 robot.

International Journal of Sociotechnology and Knowledge Development (IJSKD) 15(1), 2023
Colon cancer is one of the world's three most deadly and severe cancers. As with any cancer, the ... more Colon cancer is one of the world's three most deadly and severe cancers. As with any cancer, the key priority is early detection. Deep learning (DL) applications have recently gained popularity in medical image analysis due to the success they have achieved in the early detection and screening of cancerous tissues or organs. This paper aims to explore the potential of deep learning techniques for colon cancer classification. This research will aid in the early prediction of colon cancer in order to provide effective treatment in the most timely manner. In this exploratory study, many deep learning optimizers were investigated, including stochastic gradient descent (SGD), Adamax, AdaDelta, root mean square prop (RMSprop), adaptive moment estimation (Adam), and the Nesterov and Adam optimizer (Nadam). According to the empirical results, the CNN-Adam technique produced the highest accuracy with an average score of 82% when compared to other models for four colon cancer datasets. Similarly, Dataset_1 produced better results, with CNN-Adam, CNN-RMSprop, and CNN-Adadelta achieving accuracy scores of 0.95, 0.76, and 0.96, respectively.

Actuators , 2023
In this paper, two new versions of modified active disturbance rejection control (MADRC) are prop... more In this paper, two new versions of modified active disturbance rejection control (MADRC) are proposed to stabilize a nonlinear quadruple tank system and control the water levels of the lower two tanks in the presence of exogenous disturbances, parameter uncertainties, and parallel varying input set-points. The first proposed scheme is configured from the combination of a modified tracking differentiator (TD), modified super twisting sliding mode (STC-SM), and modified nonlinear extended state observer (NLESO), while the second proposed scheme is obtained by aggregating another modified TD, a modified nonlinear state error feedback (MNLSEF), and a fal-function-based ESO. The MADRC schemes with a nonlinear quadruple tank system are investigated by running simulations in the MATLAB/SIMULINK environment and several comparison experiments are conducted to validate the effectiveness of the proposed control schemes. Furthermore, the genetic algorithm (GA) is used as a tuning algorithm to parametrize the proposed MADRC schemes with the integral time absolute error (ITAE), integral square of the control signal (ISU), and integral absolute of the control signal (IAU) as an output performance index (OPI). Finally, the simulation results show the robustness of the proposed schemes with a noticeable reduction in the OPI.

Sustainability , 2023
The presence of a high ripple in the inductor current of a DC-DC converter in a photovoltaic conv... more The presence of a high ripple in the inductor current of a DC-DC converter in a photovoltaic converter chain leads to a considerable decrease in the energy efficiency of the converter. To solve this problem, we consider a current-mode control and for economic reasons we used a single inductor current sensor with a low-pass filter. The purpose of the low-pass filter is to minimize the effect of ripple in the inductor current by taking only the DC component of the signal at the output of the sensor for tracking the maximum power point. The objective of this paper is therefore to study the stability of the photovoltaic system as a function of the filter frequency while maintaining a good power level. First, we propose a general modeling of the whole system by linearizing the PV around the maximum power point. Floquet theory is used to determine analytically the stability of the overall system. The fourth-order Runge–Kutta method is used to plot bifurcation diagrams and Lyapunov exponents in MATLAB/SIMULINK when the filter frequency varies in a limited range and the ramp amplitude is taken as a control parameter. Secondly, the PSIM software is used to design the device and validate the results obtained in MATLAB/SIMULINK. The results depicted in MATLAB/SIMULINK are in perfect agreement with those obtained in PSIM. We found that not only is the energy level maintained at the maximum power level of
Fractal Fract. , 2023
The results of this research provide fixed-time fractional-order control for Euler–Lagrange syste... more The results of this research provide fixed-time fractional-order control for Euler–Lagrange systems that are subject to external disturbances. The first step in the process of developing a new system involves the introduction of a method known as fractional-order fixed-time non-singular terminal sliding mode control (FoFtNTSM). The advantages of fractional-order calculus and NTSM are brought together in this system, which result in rapid convergence, fixed-time stability, and smooth control inputs. Lyapunov analysis reveals whether the closed-loop system is stable over the duration of the time period specified. The performance of the suggested method when applied to the dynamics of the Euler–Lagrange system is evaluated and demonstrated with the help of computer simulations.

Fractal Fract, 7(10), 712, 2023
This paper presents an adaptive fixed-time fractional integral control for externally disturbed E... more This paper presents an adaptive fixed-time fractional integral control for externally disturbed Euler–Lagrange systems. In the first step of the control design, the approach of fractional-order fixed-time integral nonsingular terminal sliding mode control (FoIFxTSM) is introduced. This scheme combines the benefits of fractional calculus with integral sliding mode control, resulting in fast convergence, smooth nonsingular control inputs, and fixed-time stability. By integrating an adaptive scheme, the proposed method is used to control the dynamical system in the presence of uncertainty and external perturbations. The findings of the fixed-time stability using Lyapunov analyses are provided for the closed-loop system. The simulation results are compared with the adaptive fractional-order sliding mode control scheme, and they show the better tracking and convergence performance of the proposed method.
Keywords: adaptive integral sliding mode control; fixed-time convergence; Euler–Lagrange system; fractional-order control

A comprehensive review of video steganalysis
Iet Image Processing, Jul 5, 2022
Steganography is the art of secret communication and steganalysis is the art of detecting the hid... more Steganography is the art of secret communication and steganalysis is the art of detecting the hidden messages embedded in digital media covers. One of the covers that is gaining interest in the field is video. Presently, the global IP video traffic forms the major part of all consumer Internet traffic. It is also gaining attention in the field of digital forensics and homeland security in which threats of covert communications hold serious consequences. Thus, steganography technicians will prefer video to other types of covers like audio files, still images or texts. Moreover, video steganography will be of more interest because it provides more concealing capacity. Contrariwise, investigation in video steganalysis methods does not seem to follow the momentum even if law enforcement agencies and governments around the world support and encourage investigation in this field. In this paper, we review the most important methods used so far in video steganalysis and sketch the future trends. To the best of our knowledge this is the most comprehensive review of video steganalysis produced so far.

Actuators, 2022
This paper presents a fault tolerant scheme employing adaptive non-singular fixed-time terminal s... more This paper presents a fault tolerant scheme employing adaptive non-singular fixed-time terminal sliding mode control (AFxNTSM) for the application of robotic manipulators under uncertainties, external disturbances, and actuator faults. To begin, non-singular fixed-time terminal sliding mode control (FxNTSM) is put forth. This control method uses non-singular terminal sliding mode control to quickly reach fixed-time convergence, accomplish satisfactory performance in tracking, and produce non-singular and non-chatter control inputs. Then, without knowing the upper bounds beforehand, AFxNTSM is used as a reliable fault tolerant control (FTC) to estimate actuator faults and unknown dynamics. The fixed-time stability of the closed-loop system is established by the theory of Lyapunov analysis. The computer simulation results of the position tracking, control inputs, and adaptive parameters are presented to verify and illustrate the performance of the proposed strategy.
Keywords: robotic manipulators; fixed-time sliding mode control; fault tolerant control; actuator faults

IET Image Processing, 2022
Steganography is the art of secret communication and steganalysis is the art of detecting the hid... more Steganography is the art of secret communication and steganalysis is the art of detecting the hidden messages embedded in digital media covers. One of the covers that is gaining interest in the field is video. Presently, the global IP video traffic forms the major part of all consumer Internet traffic. It is also gaining attention in the field of digital forensics and homeland security in which threats of covert communications hold serious consequences. Thus, steganography technicians will prefer video to other types of covers like audio files, still images or texts. Moreover, video steganography will be of more interest because it provides more concealing capacity. Contrariwise, investigation in video steganalysis methods does not seem to follow the momentum even if law enforcement agencies and governments around the world support and encourage investigation in this field. In this paper, we review the most important methods used so far in video steganalysis and sketch the future trends. To the best of our knowledge this is the most comprehensive review of video steganalysis produced so far.

Sensors, 2022
The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network... more The exponential growth of intelligent vehicles(IVs) development has resulted in a complex network. As the number of IVs in a network increases, so does the number of connections. As a result, a great deal of data is generated. This complexity leads to insecure communication, traffic congestion, security, and privacy issues in vehicular networks (VNs). In addition, detecting malicious IVs, data integration, and data validation are major issues in VNs that affect network performance. A blockchain-based model for secure communication and malicious IV detection is proposed to address the above issues. In addition, this system also addresses data integration and transaction validation using an encryption scheme for secure communication. A multi-chain concept separates the legitimate and malicious data into two chains: the Integrity chain (I-chain) and Fraud chain (F-chain). This multi-chain mechanism solves the storage problem and reduces the computing power. The integration of blockchain in the proposed model provides privacy, network security, transparency, and immutability. To address the storage issue, the InterPlanetary File System (IPFS) is integrated with Certificate Authority (CA). A reputation mechanism is introduced to detect malicious IVs in the network based on ratings. This reputation mechanism is also used to prevent Sybil attack. The evaluation of the proposed work is based on the cost of smart contracts and computation time. Furthermore, two attacker models are presented to prevent the selfish mining attack and the Sybil attack. Finally, a security analysis of the proposed smart contracts with their security vulnerabilities is also presented.
Keywords: certificate authority; intelligent vehicles; InterPlanetary File System; vehicular network

Cogent, 2021
One of the most important issues in the wireless sensor networks (WSNs) is nodes energy. The rout... more One of the most important issues in the wireless sensor networks (WSNs) is nodes energy. The routing protocols as well as nodes management are considered as the key elements to improve a network's lifetime. In this research, we have suggested a dynamic heuristic for new nodes selection that manages efficiently the active nodes using a Tabu Node Selection coupled with minimum spanning tree routing protocol (TNS). Minimizing the total energy consumption in WSN, is not enough alone, since some nodes drain their energy faster than others, and may cause network failure. To balance the energy consumption, our strategy is to identify nodes with high-energy depletion and balance data routing on their neighbours. This approach performs nodes energy balancing, by creating lists of Tabu nodes (periodically inactive nodes). Such a scheme will prevent the most used nodes, such as nodes close to the base station to see their energy drain. The nodes in the Tabu lists will dynamically be active according to the energy level of nodes surrounding them. Our new dynamic heuristic has proven to outperform other nodes management approach which does not use Tabu search. The experiments show that Tabu list combined with Minimum Spanning Tree routing protocol extend drastically the network lifetime by balancing optimally the nodes energy.

Communications and Network, 9, 54-70. doi: 10.4236/cn.2017.91003., 2017
In recent years, we have seen an increasing interest in developing and designing Wireless Sensor ... more In recent years, we have seen an increasing interest in developing and designing Wireless Sensor Networks (WSNs). WSNs consist of large number of nodes, with wireless communications and computation abilities that can be used in variety of domains. It has been used in areas that have direct contact with monitoring and gathering data, to name few, health monitoring, military surveillance, geological monitoring (Earthquakes, Volcanoes, Tsunami), agriculture control and many more. However, the design and implementation of WSNs face many challenges, due to the power limitation of sensor nodes, deployment and localization, data routing and data aggregation, data security, limited bandwidth, storage capacity and network management. It is known that Operation Research (OR) has been widely used in different areas to solve optimization problems; such as improving network performance and maximizing lifetime of system. In this survey, we present the most recent OR based techniques applied to solve different WSNs problems: the node scheduling problem, energy management problems, nodes allocating issues and other WSNs related complex problems. Different Operational Research techniques are presented and discussed in details here, including graph theory based techniques, linear programing and mixed integer programming related approaches.
Uploads
IJCSIS Papers by Dr. Mohamed Tounsi
Papers by Dr. Mohamed Tounsi
Keywords: adaptive integral sliding mode control; fixed-time convergence; Euler–Lagrange system; fractional-order control
Keywords: robotic manipulators; fixed-time sliding mode control; fault tolerant control; actuator faults
Keywords: certificate authority; intelligent vehicles; InterPlanetary File System; vehicular network
Keywords: adaptive integral sliding mode control; fixed-time convergence; Euler–Lagrange system; fractional-order control
Keywords: robotic manipulators; fixed-time sliding mode control; fault tolerant control; actuator faults
Keywords: certificate authority; intelligent vehicles; InterPlanetary File System; vehicular network