Mohamed Benmohammed

According to our database1, Mohamed Benmohammed authored at least 68 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Boosting speech recognition performance: a robust and accurate ensemble method based on HMMs.
Int. J. Intell. Syst. Technol. Appl., 2024

2023
BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Individual Processing of Phishing Emails: Towards a Phishing Detection Framework.
Int. J. Secur. Priv. Pervasive Comput., 2022

2020
Pruned improved eight-point approximate DCT for image encoding in visual sensor networks requiring only ten additions.
J. Real Time Image Process., 2020

Comparison of scalar point multiplication algorithms in a low resource device.
J. King Saud Univ. Comput. Inf. Sci., 2020

An Ultra-Fast Method for Clustering of Big Genomic Data.
Int. J. Appl. Metaheuristic Comput., 2020

ArA*summarizer: An Arabic text summarization system based on subtopic segmentation and using an A* algorithm for reduction.
Expert Syst. J. Knowl. Eng., 2020

Android Malware Detection using Convolutional Deep Neural Networks.
Proceedings of the 4th International Conference on Advanced Aspects of Software Engineering, 2020

2019
A Novel Load Balancing Scheduling Algorithm for Wireless Sensor Networks.
J. Netw. Syst. Manag., 2019

Comparative analysis of hierarchical cluster protocols for wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2019

2018
Using Screen Brightness to Improve Security in Mobile Social Network Access.
IEEE Trans. Dependable Secur. Comput., 2018

A new hybrid framework based on Hidden Markov models and K-nearest neighbors for speech recognition.
Int. J. Speech Technol., 2018

Normalisation of handwriting speed for online Arabic characters recognition.
Int. J. Comput. Vis. Robotics, 2018

An automatic natural feature selection system for indoor tracking - application to Alzheimer patient support.
Int. J. Comput. Vis. Robotics, 2018

Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks.
Int. J. Commun. Networks Distributed Syst., 2018

Automatic adaptation of SIFT for robust facial recognition in uncontrolled lighting conditions.
IET Comput. Vis., 2018

Dynamic Time Warping Inside a Genetic Algorithm for Automatic Speech Recognition.
Proceedings of the Modelling and Implementation of Complex Systems, 2018

Distributed solution of scalar multiplication on elliptic curves over <i>F<sub>p</sub></i> for resource-constrained networks.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

Comparison of Scalar Multiplication Algorithms in a Low Resource Device.
Proceedings of the 3rd International Conference on Advanced Aspects of Software Engineering, 2018

2017
RFID Authentication Protocols Based on Error-Correcting Codes: A Survey.
Wirel. Pers. Commun., 2017

Multiple illuminant estimation from the covariance of colors.
J. Vis. Commun. Image Represent., 2017

Two Rounds Based LEACH: A Variant of Low Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks.
Int. J. Inf. Syst. Soc. Chang., 2017

A novel quantum distributed key management protocol for ring-organised group.
Int. J. Inf. Comput. Secur., 2017

Analysis of hybrid router-assisted reliable multicast protocols in lossy networks.
Int. Arab J. Inf. Technol., 2017

2016
Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis.
J. Inf. Process. Syst., 2016

Color wheel pin: Usable and resilient ATM authentication.
J. High Speed Networks, 2016

Using adaptive clustering scheme with load balancing to enhance energy efficiency and reliability in delay tolerant with QoS in large-scale mobile wireless sensor networks.
Int. J. Pervasive Comput. Commun., 2016

Robust SIFT for dark face images recogntition.
Proceedings of the International Symposium on Signal, Image, Video and Communications, 2016

Using Mel Frequency Cepstral Coefficient method for online Arabic characters handwriting recognition.
Proceedings of the 5th International Conference on Multimedia Computing and Systems, 2016

A Partitional Approach for Genomic-Data Clustering Combined with K-Means Algorithm.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

2015
Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem.
Int. J. Netw. Secur., 2015

Spike-Time Dependant Plasticity in a Spiking Neural Network for Robot Path Planning.
Proceedings of the Special Tracks and Workshops at the 11th International Conference on Artificial Intelligence Applications and Innovations (AIAI 2015), 2015

A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

A data-clustering approach based on artificial ant colonies with control of emergence combined with K-Means approach.
Proceedings of the IPAC '15: International Conference on Intelligent Information Processing, 2015

Weaknesses in Two RFID Authentication Protocols.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Ridge frequency estimation for Low-Quality Fingerprint Images enhancement using Delaunay Triangulation.
Int. J. Pattern Recognit. Artif. Intell., 2014

Ontology and protocol secure for SCADA.
Int. J. Metadata Semant. Ontologies, 2014

Probabilistic Modeling for Detection and Gender Classification.
Int. J. Comput. Vis. Image Process., 2014

Synchronous receiver initiated MAC protocol for long-lived sensor networks.
Comput. Electr. Eng., 2014

2013
A Novel Energy Efficient and Lifetime Maximization Routing Protocol in Wireless Sensor Networks.
Wirel. Pers. Commun., 2013

Hybrid Simulation Based Approach for Embedded Systems Reliability Analysis.
Int. J. Embed. Real Time Commun. Syst., 2013

Viewpoint invariant model for face detection.
Int. J. Comput. Vis. Robotics, 2013

Viewpoint invariant gender recognition.
Int. J. Appl. Pattern Recognit., 2013

Towards a Good ABS Design for more Reliable Vehicles on the Roads.
CoRR, 2013

Algebraic Replay Attacks on Authentication in RFID Protocols.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

2012
An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System
CoRR, 2012

Viewpoint Invariant Face Detection.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Security Ontology for Semantic SCADA.
Proceedings of the 4th International conference on Web and Information Technologies, 2012

S-TDMA: A New MAC Protocol for Wireless Sensor Networks.
Proceedings of the 16th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2012

Securing Encryption Key Distribution in WLAN via QKD.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Simulated Annealing for Maximizing the Lifetime of Sensor Networks under Opportunistic Routing.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

2011
Self-organization and topology's control for mobile ad-hoc networks.
Int. Arab J. Inf. Technol., 2011

Generic Face Invariant Model for Face Detection.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Improved Fingerprint Enhancement Performance via GPU Programming.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Conception et Vérification d'un Protocole d'Authentification de Systéme Combiné RFID-Biométrique.
Proceedings of the Third International Conference on Computer Science and its Applications (CIIA'11), 2011

2010
Using UML as a Front-end for StreamIt Programs Verification and Generation.
J. Multim., 2010

A New Approach Based on Modelled Traces to Compute Collaborative and Individual Indicators Human Interaction.
Proceedings of the ICALT 2010, 2010

2009
UML for Modelling and Performance Estimation of Embedded Systems.
J. Object Technol., 2009

UML2.0 Profiles for Embedded Systems and Systems On a Chip (SOCs).
J. Object Technol., 2009

UML Modeling and Formal Verification of Control/Data Driven Embedded Systems.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009

Étude Comparative des Algorithmes de Segmentation Thématique Pour la Langue Arabe.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

La Théorie de la Résonance Adaptative et les Moments de Zernike pour la Reconnaissance de Mots Arabes Manuscrits.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

2008
EERP: energy-efficient routing protocol for wireless sensor networks.
Proceedings of the 8th international conference on New technologies in distributed systems, 2008

A Scalable Proof Methodology for RISC Processor Designs: A Functional Approach.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

UML profile for estimating application Worst Case Execution Time on System-on-Chip.
Proceedings of the 2008 IEEE International Symposium on System-on-Chip, 2008

2007
A Methodology for the Formal Verification of RISC Microprocessors A Functional Approach.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2001
On Designing a Systolic Network for the Resolution of Linear Systems Using the " Gauss-Seidel " Method.
Proceedings of the 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 2001

2000
The application of high-level synthesis techniques for the generation of pipelined reprogrammable microcontrollers.
Proceedings of the 2000 7th IEEE International Conference on Electronics, 2000


  Loading...