Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Mohamed F. Chouikha"'
Publikováno v:
IEEE Access, Vol 12, Pp 48540-48554 (2024)
With the advent of the Internet of Things (IoT), Long-range Wide Area Networks (LoRaWAN), and high-speed internet, the potential to use such technologies for monitoring remote areas with limited cellular coverage is becoming increasingly important. H
Externí odkaz:
https://doaj.org/article/f960ed1016bd402aa977e8a3fb01361b
Autor:
Mohamed F. Chouikha, E. Thomas Gilmore, Preston D. Frazier, Wardell E. Samotshozo, Isaac J. Collins
Publikováno v:
Journal of Hardware and Systems Security. 2:240-250
The electronics industry has become a primary target in the global market of counterfeiting. Counterfeit electronic parts transverse through the supply chain end up in critical avionics, industrial, medical, and military systems, and the financial lo
Autor:
Mamadou Wade, Mohamed F. Chouikha, Wayne Patterson, Talitha M. Washington, Tepper L. Gill, Jianchao Zeng
Publikováno v:
UEMCON
The objective of this research is to develop a novel image encryption method that can be used to considerably increase the security of encrypted images. To solve this image security problem, we propose a distributed homomorphic image encryption schem
Publikováno v:
IEEE Transactions on Geoscience and Remote Sensing. 54:5385-5396
Target detection in hyperspectral images (HSIs) is an active area of research; it seeks to detect objects that are small in both number and size within a scene. The proposed work presents a new methodology for target detection in HSIs by combining ku
Publikováno v:
Environment Systems and Decisions. 33:477-485
Within the electronics industry, counterfeit electronic components entering the supply chain have steadily become an increasing threat accounting for more than 8 % of global merchandise trade and an annual $600 billion enterprise. Currently, there ar
Publikováno v:
ICMLC
The counterfeiting of electronic parts is a critical issue that places the reliability and security of numerous systems, such as financial, defense, and aerospace, in peril. The global cost of counterfeiting is as much as $500 billion (USD) annually
Publikováno v:
CodeSwitch@EMNLP
Publikováno v:
International Journal on Cryptography and Information Security. 2:13-25
In this paper, the study of the effects of illumination changes in the process of face recognition is discussed. Additionally, a new methodology that integrates Single -Scale Retinex (SSR) and Scale Invariant Feature Transform (SIFT) is presented. Th
Autor:
Heather Roy, Michelle Vanni, Sue E. Kase, Elizabeth K. Bowman, Mohamed F. Chouikha, Mugizi Robert Rwebangira, Alla V. Tovares, Nkonko M. Kamwangamalu
This report documents the intersection of computational social network analysis and sociolinguistic research aimed at discovering how social intent is communicated through online bilingual speech acts in African cultures. Researchers from the US Army
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ae4244695a4a93fc7e85d00a28f0cb94
https://doi.org/10.21236/ada622463
https://doi.org/10.21236/ada622463
Publikováno v:
The Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology. 45:21-28
In statistical signal processing, parametric modeling of non-Gaussian processes experiencing noise interference is a very important research topic. Particularly challenging to some researchers is how to estimate signals encountering stochastic noise