default search action
Mohamed Benmohammed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Samira Hazmoune, Fateh Bougamouza, Smaine Mazouzi, Mohamed Benmohammed:
Boosting speech recognition performance: a robust and accurate ensemble method based on HMMs. Int. J. Intell. Syst. Technol. Appl. 22(1): 41-76 (2024) - [c33]Massinissa Chelghoum, Gueltoum Bendiab, Mohamed Aymen Labiod, Mohamed Benmohammed, Stavros Shiaeles, Abdelhamid Mellouk:
Blockchain and AI for Collaborative Intrusion Detection in 6G-enabled IoT Networks. HPSR 2024: 179-184 - 2023
- [c32]Massinissa Chelghoum, Gueltoum Bendiab, Mohamed Benmohammed, Stavros Shiaeles, Emanuele Bellini:
BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians Networks. CSR 2023: 148-153 - 2022
- [j34]Aymen Hamoud, Esma Aïmeur, Mohamed Benmohammed:
Individual Processing of Phishing Emails: Towards a Phishing Detection Framework. Int. J. Secur. Priv. Pervasive Comput. 14(1): 1-22 (2022) - 2020
- [j33]Belahcene Bahloul, Hassina Aliane, Mohamed Benmohammed:
ArA*summarizer: An Arabic text summarization system based on subtopic segmentation and using an A* algorithm for reduction. Expert Syst. J. Knowl. Eng. 37(2) (2020) - [j32]Billel Kenidra, Mohamed Benmohammed:
An Ultra-Fast Method for Clustering of Big Genomic Data. Int. J. Appl. Metaheuristic Comput. 11(1): 45-60 (2020) - [j31]Mohamed Ramdani, Mohamed Benmohammed, Nadjia Benblidia:
Comparison of scalar point multiplication algorithms in a low resource device. J. King Saud Univ. Comput. Inf. Sci. 32(4): 425-432 (2020) - [j30]Chaouki Araar, Salim Ghanemi, Mohamed Benmohammed, Hamza Atoui:
Pruned improved eight-point approximate DCT for image encoding in visual sensor networks requiring only ten additions. J. Real Time Image Process. 17(5): 1597-1608 (2020) - [c31]Nabil Sahli, Mohamed Benmohammed, Hugues Bersini, El-Bay Bourennane:
Artificial Intelligence and Cyber Security: Protecting and Maintaining Industry 4.0 Power Networks. IAM 2020: 19-31 - [c30]Fatima Bourebaa, Mohamed Benmohammed:
Android Malware Detection using Convolutional Deep Neural Networks. ICAASE 2020: 1-7
2010 – 2019
- 2019
- [j29]Chirihane Gherbi, Zibouda Aliouat, Mohamed Benmohammed:
Comparative analysis of hierarchical cluster protocols for wireless sensor networks. Int. J. High Perform. Comput. Netw. 13(4): 366-377 (2019) - [j28]Chirihane Gherbi, Zibouda Aliouat, Mohamed Benmohammed:
A Novel Load Balancing Scheduling Algorithm for Wireless Sensor Networks. J. Netw. Syst. Manag. 27(2): 430-462 (2019) - 2018
- [j27]Meriama Mahamdioua, Mohamed Benmohammed:
Automatic adaptation of SIFT for robust facial recognition in uncontrolled lighting conditions. IET Comput. Vis. 12(5): 623-633 (2018) - [j26]Chirihane Gherbi, Zibouda Aliouat, Mohamed Benmohammed:
Energy efficient with time synchronised and service coverage guarantee in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 21(1): 56-79 (2018) - [j25]Mohamed Badeche, Frédéric Bousefsaf, Abdelhak Moussaoui, Mohamed Benmohammed, Alain Pruski:
An automatic natural feature selection system for indoor tracking - application to Alzheimer patient support. Int. J. Comput. Vis. Robotics 8(2): 201-220 (2018) - [j24]Fateh Bougamouza, Samira Hazmoune, Mohamed Benmohammed:
Normalisation of handwriting speed for online Arabic characters recognition. Int. J. Comput. Vis. Robotics 8(6): 591-605 (2018) - [j23]Samira Hazmoune, Fateh Bougamouza, Smaine Mazouzi, Mohamed Benmohammed:
A new hybrid framework based on Hidden Markov models and K-nearest neighbors for speech recognition. Int. J. Speech Technol. 21(3): 689-704 (2018) - [j22]Meriem Guerar, Mauro Migliardi, Alessio Merlo, Mohamed Benmohammed, Francesco Palmieri, Aniello Castiglione:
Using Screen Brightness to Improve Security in Mobile Social Network Access. IEEE Trans. Dependable Secur. Comput. 15(4): 621-632 (2018) - [c29]Mohamed Ramdani, Mohamed Benmohammed, Nadjia Benblidia:
Comparison of Scalar Multiplication Algorithms in a Low Resource Device. ICAASE 2018: 70-75 - [c28]Mohamed Ramdani, Mohamed Benmohammed, Nadjia Benblidia:
Distributed solution of scalar multiplication on elliptic curves over Fp for resource-constrained networks. ICFNDS 2018: 63:1-63:6 - [c27]Fadila Maouche, Mohamed Benmohammed:
Dynamic Time Warping Inside a Genetic Algorithm for Automatic Speech Recognition. MISC 2018: 180-192 - 2017
- [j21]Lakhdar Derdouri, Congduc Pham, Mohamed Benmohammed:
Analysis of hybrid router-assisted reliable multicast protocols in lossy networks. Int. Arab J. Inf. Technol. 14(1): 26-34 (2017) - [j20]Rima Djellab, Mohamed Benmohammed:
A novel quantum distributed key management protocol for ring-organised group. Int. J. Inf. Comput. Secur. 9(4): 302-323 (2017) - [j19]Meriem Boumassata, Mohamed Benmohammed:
Two Rounds Based LEACH: A Variant of Low Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks. Int. J. Inf. Syst. Soc. Chang. 8(3): 34-44 (2017) - [j18]Elkhamssa Lakehal, Djemel Ziou, Mohamed Benmohammed:
Multiple illuminant estimation from the covariance of colors. J. Vis. Commun. Image Represent. 46: 107-118 (2017) - [j17]Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed:
RFID Authentication Protocols Based on Error-Correcting Codes: A Survey. Wirel. Pers. Commun. 96(1): 509-527 (2017) - 2016
- [j16]Chirihane Gherbi, Zibouda Aliouat, Mohamed Benmohammed:
Using adaptive clustering scheme with load balancing to enhance energy efficiency and reliability in delay tolerant with QoS in large-scale mobile wireless sensor networks. Int. J. Pervasive Comput. Commun. 12(3): 352-374 (2016) - [j15]Meriem Guerar, Mohamed Benmohammed, Vincent Alimi:
Color wheel pin: Usable and resilient ATM authentication. J. High Speed Networks 22(3): 231-240 (2016) - [j14]Leila Boussaad, Mohamed Benmohammed, Redha Benzid:
Age Invariant Face Recognition Based on DCT Feature Extraction and Kernel Fisher Analysis. J. Inf. Process. Syst. 12(3): 392-409 (2016) - [c26]Billel Kenidra, Mohamed Benmohammed, Abdesselem Beghriche, Zakaria Benmounah:
A Partitional Approach for Genomic-Data Clustering Combined with K-Means Algorithm. CSE/EUC/DCABES 2016: 114-121 - [c25]Fateh Bougamouza, Samira Hazmoune, Mohammed Benmohammed:
Using Mel Frequency Cepstral Coefficient method for online Arabic characters handwriting recognition. ICMCS 2016: 87-92 - [c24]Meriama Mahamdioua, Mohammed Benmohammed:
Robust SIFT for dark face images recogntition. ISIVC 2016: 53-58 - 2015
- [j13]Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed:
Improved RFID Authentication Protocol Based on Randomized McEliece Cryptosystem. Int. J. Netw. Secur. 17(4): 413-422 (2015) - [c23]Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed:
Weaknesses in Two RFID Authentication Protocols. C2SI 2015: 162-172 - [c22]Billel Kenidra, Mohamed Benmohammed:
A data-clustering approach based on artificial ant colonies with control of emergence combined with K-Means approach. IPAC 2015: 48:1-48:5 - [c21]Meriem Guerar, Mauro Migliardi, Alessio Merlo, Mohamed Benmohammed, Belhadri Messabih:
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices. HPCS 2015: 203-210 - [c20]Mohamed Nadjib Zennir, Mohamed Benmohammed, Rima Boudjadja:
Spike-Time Dependant Plasticity in a Spiking Neural Network for Robot Path Planning. AIAI Workshops 2015: 2-13 - 2014
- [j12]Samra Boulfekhar, Mohamed Benmohammed:
Synchronous receiver initiated MAC protocol for long-lived sensor networks. Comput. Electr. Eng. 40(2): 504-516 (2014) - [j11]Mokhtar Taffar, Serge Miguet, Mohamed Benmohammed:
Probabilistic Modeling for Detection and Gender Classification. Int. J. Comput. Vis. Image Process. 4(1): 30-39 (2014) - [j10]Nabil Sahli, Mohamed Benmohammed, El-Bay Bourennane:
Ontology and protocol secure for SCADA. Int. J. Metadata Semant. Ontologies 9(2): 114-127 (2014) - [j9]Raja Lehtihet, Wael El Oraiby, Mohamed Benmohammed:
Ridge frequency estimation for Low-Quality Fingerprint Images enhancement using Delaunay Triangulation. Int. J. Pattern Recognit. Artif. Intell. 28(1) (2014) - 2013
- [j8]Mokhtar Taffar, Serge Miguet, Mohamed Benmohammed:
Viewpoint invariant gender recognition. Int. J. Appl. Pattern Recognit. 1(1): 47-60 (2013) - [j7]Mokhtar Taffar, Serge Miguet, Mohamed Benmohammed:
Viewpoint invariant model for face detection. Int. J. Comput. Vis. Robotics 3(3): 182-196 (2013) - [j6]Afifa Ghenai, Mohamed Benmohammed:
Hybrid Simulation Based Approach for Embedded Systems Reliability Analysis. Int. J. Embed. Real Time Commun. Syst. 4(4): 27-47 (2013) - [j5]Samra Boulfekhar, Mohamed Benmohammed:
A Novel Energy Efficient and Lifetime Maximization Routing Protocol in Wireless Sensor Networks. Wirel. Pers. Commun. 72(2): 1333-1349 (2013) - [c19]Noureddine Chikouche, Cherif Foudil, Mohamed Benmohammed:
Algebraic Replay Attacks on Authentication in RFID Protocols. SecNet 2013: 153-163 - [i2]Afifa Ghenai, Mohamed Youcef Badaoui, Mohamed Benmohammed:
Towards a Good ABS Design for more Reliable Vehicles on the Roads. CoRR abs/1307.3086 (2013) - 2012
- [c18]Samia Chelloug, Mohamed Benmohammed:
Simulated Annealing for Maximizing the Lifetime of Sensor Networks under Opportunistic Routing. BWCCA 2012: 14-19 - [c17]Rima Djellab, Mohamed Benmohammed:
Securing Encryption Key Distribution in WLAN via QKD. CyberC 2012: 160-165 - [c16]Samra Boulfekhar, Louiza Bouallouche-Medjkoune, Mohamed Benmohammed:
S-TDMA: A New MAC Protocol for Wireless Sensor Networks. DS-RT 2012: 29-35 - [c15]Nabil Sahli, Mohamed Benmohammed:
Security Ontology for Semantic SCADA. ICWIT 2012: 179-192 - [c14]Mokhtar Taffar, Serge Miguet, Mohamed Benmohammed:
Viewpoint Invariant Face Detection. NDT (2) 2012: 390-402 - [i1]Noureddine Chikouche, Cherif Foudil, Mohamed Benmohammed:
An Authentication Protocol Based on Combined RFID-Biometric System RFID-Biometric System. CoRR abs/1207.5627 (2012) - 2011
- [j4]Maâmar Kef, Leila Chergui, Mohamed Benmohammed:
Self-organization and topology's control for mobile ad-hoc networks. Int. Arab J. Inf. Technol. 8(3): 227-234 (2011) - [c13]Noureddine Chikouche, Cherif Foudil, Mohamed Benmohammed:
Conception et Vérification d'un Protocole d'Authentification de Systéme Combiné RFID-Biométrique. CIIA 2011 - [c12]Raja Lehtihet, Wael El Oraiby, Mohammed Benmohammed:
Improved Fingerprint Enhancement Performance via GPU Programming. IP&C 2011: 13-21 - [c11]Mokhtar Taffar, Mohammed Benmohammed:
Generic Face Invariant Model for Face Detection. IP&C 2011: 43-51 - 2010
- [j3]Fateh Boutekkouk, Mohamed Benmohammed:
Using UML as a Front-end for StreamIt Programs Verification and Generation. J. Multim. 5(5): 501-513 (2010) - [c10]Tarek Djouad, Alain Mille, Christophe Reffay, Mohamed Benmohammed:
A New Approach Based on Modelled Traces to Compute Collaborative and Individual Indicators Human Interaction. ICALT 2010: 53-54
2000 – 2009
- 2009
- [j2]Fateh Boutekkouk, Mohamed Benmohammed, Sébastien Bilavarn, Michel Auguin:
UML2.0 Profiles for Embedded Systems and Systems On a Chip (SOCs). J. Object Technol. 8(1): 135-157 (2009) - [j1]Fateh Boutekkouk, Mohamed Benmohammed, Sébastien Bilavarn, Michel Auguin:
UML for Modelling and Performance Estimation of Embedded Systems. J. Object Technol. 8(2): 95-118 (2009) - [c9]Leila Chergui, Maâmar Kef, Mohamed Benmohammed:
La Théorie de la Résonance Adaptative et les Moments de Zernike pour la Reconnaissance de Mots Arabes Manuscrits. CIIA 2009 - [c8]Fouzi Harrag, Mohamed Benmohammed:
Étude Comparative des Algorithmes de Segmentation Thématique Pour la Langue Arabe. CIIA 2009 - [c7]Fateh Boutekkouk, Mohamed Benmohammed:
UML Modeling and Formal Verification of Control/Data Driven Embedded Systems. ICECCS 2009: 311-316 - 2008
- [c6]Fateh Boutekkouk, Sébastien Bilavarn, Michel Auguin, Mohammed Benmohammed:
UML profile for estimating application Worst Case Execution Time on System-on-Chip. SoC 2008: 1-6 - [c5]Salah Merniz, Mohamed Benmohammed:
A Scalable Proof Methodology for RISC Processor Designs: A Functional Approach. ITNG 2008: 241-246 - [c4]Samra Boulfekhar, Mohamed Benmohammed:
EERP: energy-efficient routing protocol for wireless sensor networks. NOTERE 2008: 16:1-16:6 - 2007
- [c3]Salah Merniz, Mohamed Benmohammed:
A Methodology for the Formal Verification of RISC Microprocessors A Functional Approach. AICCSA 2007: 492-499 - 2001
- [c2]F. Z. Hadjam, Abdellatif Rahmoun, Mohamed Benmohammed:
On Designing a Systolic Network for the Resolution of Linear Systems Using the " Gauss-Seidel " Method. AICCSA 2001: 283-286 - 2000
- [c1]Mohamed Benmohammed, Abdelatif Rahmoune, Polen Kission:
The application of high-level synthesis techniques for the generation of pipelined reprogrammable microcontrollers. ICECS 2000: 993-998
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-13 17:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint