Zobrazeno 1 - 10
of 434
pro vyhledávání: '"N. Boudriga"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
N. Boudriga, Mohammad S. Obaidat
Publikováno v:
Computers & Electrical Engineering. 32:266-276
The development of various network architectures to connect wireless sensors for monitoring physical environments has emerged as an important new area of applications. The major issues occurring in these new types of systems are: (a) the continuity o
Autor:
Mohammad S. Obaidat, N. Boudriga
Publikováno v:
Computing in Science and Engineering. 6:35-42
Intelligent agents are goal-driven and autonomous, and can communicate and interact with each other. Moreover, they can evaluate information obtained online from heterogeneous sources and present information tailored to an individual's needs. This ar
Autor:
M, Allouche, N, Boudriga, H Ben, Ahmed, A, Banasr, M, Shimi, F, Gloulou, M, Zhioua, B, Bouhajja, H, Baccar, M, Hamdoun
Publikováno v:
Annales de cardiologie et d'angeiologie. 62(2)
To develop profile of the victims and to study circumstances, causes of death and autopsy findings.Retrospective study of cases of sudden death in sport activity whose autopsy was performed in forensic department of Tunis, between January 2005 and De
Publikováno v:
Information Sciences. 75:223-252
Despite several decades of research, capturing the semantics of concurrent programs in a crisp and tractable fashion remains a formidable challenge. In this paper, we present a relation-based model for defining the semantics of concurrent programs. A
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
N. Boudriga, M. Hamdi
Publikováno v:
ICC
The intrinsic vulnerabilities of wireless networks place a great demand on efficient encryption techniques.With the proliferation of video streaming applications, the need for multimedia encryption techniques is becoming of utmost importance. This pa
Autor:
N. Boudriga, J. Krichene
Publikováno v:
ISPA
Security incident response is a major activity to guarantee the protection of information systems. We develop in this paper a methodology for automatically determining responses to security incidents based on a new category of cognitive maps, referre
Autor:
M. Hamdi, N. Boudriga
Publikováno v:
ICME
This paper proposes a chaotic encryption scheme for image data transmission and multimedia communication. To this end, we first extend the definition of the well-known Arnold 2-D chaotic map to the four-dimensional context. We demonstrate that the ch