M. Benmohamed

  • Citations Per Year
Learn More
Cellular automata can be successfully applied in cryptography. In this paper we discuss the application of two-dimensional cellular automata to the problems of cryptography. The proposed methods are compared with some classical or recent methods. A very important feature of the proposed methods is their intrinsic parallelism, since they are implemented on(More)
Energy consumption is the most challenging issue in routing protocol design for mobile ad-hoc networks (MANETs), since mobile nodes are battery powered. Furthermore, replacing or recharging batteries is often impossible in critical environments such as in military or rescue missions. In a MANET, the energy depletion of a node does not affect the node itself(More)
In real time applications of augmented reality, it is always matter of tracking; one of the most promising techniques in this sense is tracking based pattern. In this paper we describe a method based on the discrete Kalman filter for a real-time tracking of a 2D pattern for augmented reality. Objective being to make real-time tracking of a 2D pattern(More)
  • 1