Zobrazeno 1 - 10
of 106
pro vyhledávání: '"Mohamed Benmohammed"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 32, Iss 4, Pp 425-432 (2020)
Since it was invented, Elliptic Curve Cryptography (ECC) is considered an ideal choice for implementing public key cryptography in resource constrained devices, thanks to its small keys. Scalar point multiplication is the central and the complex oper
Externí odkaz:
https://doaj.org/article/a73b663a52f14ef080b75f4480fadaee
Publikováno v:
IET Computer Vision, Vol 12, Iss 5, Pp 623-633 (2018)
The scale invariant feature transform (SIFT), which was proposed by David Lowe, is a powerful method that extracts and describes local features called keypoints from images. These keypoints are invariant to scale, translation, and rotation, and parti
Externí odkaz:
https://doaj.org/article/2211052939ec4c6a85be94febc556fa6
Publikováno v:
International Journal of Security and Privacy in Pervasive Computing. 14:1-22
There is a prevailing prejudice that technology can solve all problems in many fields, including cybercrime. Still, recent reports of increasing data breaches have shown that this belief is not always true. This paper investigated social engineering
Publikováno v:
12th International Conference on Information Systems and Advanced Technologies “ICISAT 2022” ISBN: 9783031253430
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::006ee4a8590c652bafa393f29fa85c7e
https://doi.org/10.1007/978-3-031-25344-7_2
https://doi.org/10.1007/978-3-031-25344-7_2
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 32, Iss 4, Pp 425-432 (2020)
Since it was invented, Elliptic Curve Cryptography (ECC) is considered an ideal choice for implementing public key cryptography in resource constrained devices, thanks to its small keys. Scalar point multiplication is the central and the complex oper
Autor:
Billel Kenidra, Mohamed Benmohammed
Publikováno v:
International Journal of Applied Metaheuristic Computing. 11:45-60
The clustering process is used to identify cancer subtypes based on gene expression and DNA methylation datasets, since cancer subtype information is critically important for understanding tumor heterogeneity, detecting previously unknown clusters of
Publikováno v:
Journal of Real-Time Image Processing. 17:1597-1608
A low-complexity pruned eight-point discrete cosine transform (DCT) approximation for image compression in visual sensor networks is introduced. The proposed transform consists of using an approximate DCT in combination with pruning approach. The aim
The Internet of Things (IoT) is the interconnection of things around us to make our daily process more efficient by providing more comfort and productivity. However, these connections also reveal a lot of sensitive data. Therefore, thinking about the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e7d698d78725268c9fe8313b2c6b8074
https://zenodo.org/record/4896447
https://zenodo.org/record/4896447
Autor:
Mohamed Benmohammed, Fatima Bourebaa
Publikováno v:
ICAASE
Deep learning in general and convolutional architectures, in particular, have pushed the limits of the current state of the art in the field of computer vision and the processing of natural languages and speech. Recently, these techniques have been a
Publikováno v:
Expert Systems. 37