Mohamed Benmohammed

Learn More
Recent embedded systems and SOCs design is confronted with the problem of the so-called productivity gap. In order to cope with this problem, authors emphasize on using UML as a system level language, so higher level of abstraction is achieved. However UML in its current form has not yet achieved the maturity necessary to enable its efficient use within(More)
— Radio Frequency Identification (RFID) and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, …). Our work focuses on the design of a RFID authentication protocol which(More)
Due to the fact that sensor nodes are untethered and unattended, energy management is a critical issue in communication mechanism of a wireless sensor network. In this paper, we address this problem and propose a novel solution based on media access control technique. Our protocol STDMA (for Sensor-Time Division Multiple Access) exploits the inherent(More)
In this paper, the authors contribute to solve the simultaneous problems of detection and gender classification from any viewpoint. The authors use an invariant model for accurate face localization based on a combination of appearance and geometric. A probabilistic matching of visual traits allows to classify the gender of face even when pose changes. The(More)
The capacity gain of active networks has been extensively studied in the reliability of multicast. It has been shown that active networks improve the network reliability by reducing the number of packet retransmission between the source and receivers in lossy networks. However, the existing active reliable multicast protocols are based on the(More)
In this paper, we would like to present a new UML-based methodology for embedded applications design. Our approach starts from a pure sequential object paradigm model from which a task level model is extracted. The latter allows designer to expose all parallelism forms such as task parallelism, data parallelism, pipelining, while making control and(More)
Among the embedded systems which were quickly developed during the last years and that were used in various domains (e.g. access control, health, ...) we can cite radio frequency identification (RFID). In this paper, we propose an improved mutual authentication protocol in RFID systems based on the randomized McEliece cryp-tosystem. The McEliece(More)