Mohamed Benmohammed

According to our database1, Mohamed Benmohammed
  • authored at least 42 papers between 2001 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
RFID Authentication Protocols Based on Error-Correcting Codes: A Survey.
Wireless Personal Communications, 2017

Multiple illuminant estimation from the covariance of colors.
J. Visual Communication and Image Representation, 2017

Two Rounds Based LEACH: A Variant of Low Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks.
IJISSC, 2017

A novel quantum distributed key management protocol for ring-organised group.
IJICS, 2017

Analysis of hybrid router-assisted reliable multicast protocols in lossy networks.
Int. Arab J. Inf. Technol., 2017

2016
Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis.
JIPS, 2016

Color wheel pin: Usable and resilient ATM authentication.
J. High Speed Networks, 2016

Using adaptive clustering scheme with load balancing to enhance energy efficiency and reliability in delay tolerant with QoS in large-scale mobile wireless sensor networks.
Int. J. Pervasive Computing and Communications, 2016

A Partitional Approach for Genomic-Data Clustering Combined with K-Means Algorithm.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

2015
Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem.
I. J. Network Security, 2015

Spike-Time Dependant Plasticity in a Spiking Neural Network for Robot Path Planning.
Proceedings of the Special Tracks and Workshops at the 11th International Conference on Artificial Intelligence Applications and Innovations (AIAI 2015), 2015

A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Weaknesses in Two RFID Authentication Protocols.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Ridge frequency estimation for Low-Quality Fingerprint Images enhancement using Delaunay Triangulation.
IJPRAI, 2014

Ontology and protocol secure for SCADA.
IJMSO, 2014

Probabilistic Modeling for Detection and Gender Classification.
IJCVIP, 2014

Synchronous receiver initiated MAC protocol for long-lived sensor networks.
Computers & Electrical Engineering, 2014

2013
A Novel Energy Efficient and Lifetime Maximization Routing Protocol in Wireless Sensor Networks.
Wireless Personal Communications, 2013

Hybrid Simulation Based Approach for Embedded Systems Reliability Analysis.
IJERTCS, 2013

Viewpoint invariant model for face detection.
IJCVR, 2013

Viewpoint invariant gender recognition.
IJAPR, 2013

Towards a Good ABS Design for more Reliable Vehicles on the Roads.
CoRR, 2013

2012
An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System
CoRR, 2012

Viewpoint Invariant Face Detection.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Security Ontology for Semantic SCADA.
Proceedings of the 4th International conference on Web and Information Technologies, 2012

S-TDMA: A New MAC Protocol for Wireless Sensor Networks.
Proceedings of the 16th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2012

Securing Encryption Key Distribution in WLAN via QKD.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Simulated Annealing for Maximizing the Lifetime of Sensor Networks under Opportunistic Routing.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

2011
Self-organization and topology's control for mobile ad-hoc networks.
Int. Arab J. Inf. Technol., 2011

Generic Face Invariant Model for Face Detection.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Improved Fingerprint Enhancement Performance via GPU Programming.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Conception et Vérification d'un Protocole d'Authentification de Systéme Combiné RFID-Biométrique.
Proceedings of the Third International Conference on Computer Science and its Applications (CIIA'11), 2011

2010
Using UML as a Front-end for StreamIt Programs Verification and Generation.
Journal of Multimedia, 2010

A New Approach Based on Modelled Traces to Compute Collaborative and Individual Indicators Human Interaction.
Proceedings of the ICALT 2010, 2010

2009
UML for Modelling and Performance Estimation of Embedded Systems.
Journal of Object Technology, 2009

UML2.0 Profiles for Embedded Systems and Systems On a Chip (SOCs).
Journal of Object Technology, 2009

UML Modeling and Formal Verification of Control/Data Driven Embedded Systems.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009

Étude Comparative des Algorithmes de Segmentation Thématique Pour la Langue Arabe.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

La Théorie de la Résonance Adaptative et les Moments de Zernike pour la Reconnaissance de Mots Arabes Manuscrits.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

2008
A Scalable Proof Methodology for RISC Processor Designs: A Functional Approach.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

2007
A Methodology for the Formal Verification of RISC Microprocessors A Functional Approach.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2001
On Designing a Systolic Network for the Resolution of Linear Systems Using the " Gauss-Seidel " Method.
Proceedings of the 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 2001


  Loading...