Mohamed Benmohammed

According to our database1, Mohamed Benmohammed authored at least 47 papers between 2001 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Using Screen Brightness to Improve Security in Mobile Social Network Access.
IEEE Trans. Dependable Sec. Comput., 2018

A new hybrid framework based on Hidden Markov models and K-nearest neighbors for speech recognition.
I. J. Speech Technology, 2018

An automatic natural feature selection system for indoor tracking - application to Alzheimer patient support.
IJCVR, 2018

Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks.
IJCNDS, 2018

Automatic adaptation of SIFT for robust facial recognition in uncontrolled lighting conditions.
IET Computer Vision, 2018

Distributed solution of scalar multiplication on elliptic curves over Fp for resource-constrained networks.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

RFID Authentication Protocols Based on Error-Correcting Codes: A Survey.
Wireless Personal Communications, 2017

Multiple illuminant estimation from the covariance of colors.
J. Visual Communication and Image Representation, 2017

Two Rounds Based LEACH: A Variant of Low Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks.
IJISSC, 2017

A novel quantum distributed key management protocol for ring-organised group.
IJICS, 2017

Analysis of hybrid router-assisted reliable multicast protocols in lossy networks.
Int. Arab J. Inf. Technol., 2017

Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis.
JIPS, 2016

Color wheel pin: Usable and resilient ATM authentication.
J. High Speed Networks, 2016

Using adaptive clustering scheme with load balancing to enhance energy efficiency and reliability in delay tolerant with QoS in large-scale mobile wireless sensor networks.
Int. J. Pervasive Computing and Communications, 2016

Robust SIFT for dark face images recogntition.
Proceedings of the International Symposium on Signal, Image, Video and Communications, 2016

A Partitional Approach for Genomic-Data Clustering Combined with K-Means Algorithm.
Proceedings of the 2016 IEEE Intl Conference on Computational Science and Engineering, 2016

Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem.
I. J. Network Security, 2015

Spike-Time Dependant Plasticity in a Spiking Neural Network for Robot Path Planning.
Proceedings of the Special Tracks and Workshops at the 11th International Conference on Artificial Intelligence Applications and Innovations (AIAI 2015), 2015

A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Weaknesses in Two RFID Authentication Protocols.
Proceedings of the Codes, Cryptology, and Information Security, 2015

Ridge frequency estimation for Low-Quality Fingerprint Images enhancement using Delaunay Triangulation.
IJPRAI, 2014

Ontology and protocol secure for SCADA.
IJMSO, 2014

Probabilistic Modeling for Detection and Gender Classification.
IJCVIP, 2014

Synchronous receiver initiated MAC protocol for long-lived sensor networks.
Computers & Electrical Engineering, 2014

A Novel Energy Efficient and Lifetime Maximization Routing Protocol in Wireless Sensor Networks.
Wireless Personal Communications, 2013

Hybrid Simulation Based Approach for Embedded Systems Reliability Analysis.

Viewpoint invariant model for face detection.
IJCVR, 2013

Viewpoint invariant gender recognition.
IJAPR, 2013

Viewpoint Invariant Face Detection.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Security Ontology for Semantic SCADA.
Proceedings of the 4th International conference on Web and Information Technologies, 2012

S-TDMA: A New MAC Protocol for Wireless Sensor Networks.
Proceedings of the 16th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2012

Securing Encryption Key Distribution in WLAN via QKD.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Simulated Annealing for Maximizing the Lifetime of Sensor Networks under Opportunistic Routing.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

Self-organization and topology's control for mobile ad-hoc networks.
Int. Arab J. Inf. Technol., 2011

Generic Face Invariant Model for Face Detection.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Improved Fingerprint Enhancement Performance via GPU Programming.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Conception et Vérification d'un Protocole d'Authentification de Systéme Combiné RFID-Biométrique.
Proceedings of the Third International Conference on Computer Science and its Applications (CIIA'11), 2011

Using UML as a Front-end for StreamIt Programs Verification and Generation.
Journal of Multimedia, 2010

A New Approach Based on Modelled Traces to Compute Collaborative and Individual Indicators Human Interaction.
Proceedings of the ICALT 2010, 2010

UML for Modelling and Performance Estimation of Embedded Systems.
Journal of Object Technology, 2009

UML2.0 Profiles for Embedded Systems and Systems On a Chip (SOCs).
Journal of Object Technology, 2009

UML Modeling and Formal Verification of Control/Data Driven Embedded Systems.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009

Étude Comparative des Algorithmes de Segmentation Thématique Pour la Langue Arabe.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

La Théorie de la Résonance Adaptative et les Moments de Zernike pour la Reconnaissance de Mots Arabes Manuscrits.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

A Scalable Proof Methodology for RISC Processor Designs: A Functional Approach.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

A Methodology for the Formal Verification of RISC Microprocessors A Functional Approach.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

On Designing a Systolic Network for the Resolution of Linear Systems Using the " Gauss-Seidel " Method.
Proceedings of the 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 2001