Skip to main content

Showing 1–11 of 11 results for author: bouhlel, M S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1904.10715  [pdf

    cs.MM

    Système d'indexation et de recherche de vidéo intégrant un système gestuel pour les personnes handicapées

    Authors: Mohamed Hamroun, Mohamed Salim Bouhlel

    Abstract: The amount of audio-visual information has increased dramatically with the advent of High Speed Internet. Furthermore, technological advances in recent years in the field of information technology, have simplified the use of video data in various fields by the general public. This made it possible to store large collections of video documents into computer systems. To enable efficient use of these… ▽ More

    Submitted 24 April, 2019; originally announced April 2019.

    Comments: 6 pages, in French. International conference Human-Machine Interaction and Image IHMIM14, May 2014, Hammamet, Tunisia

  2. Image encryption with dynamic chaotic Look-Up Table

    Authors: Med Karim Abdmouleh, Ali Khalfallah, Med Salim Bouhlel

    Abstract: In this paper we propose a novel image encryption scheme. The proposed method is based on the chaos theory. Our cryptosystem uses the chaos theory to define a dynamic chaotic Look-Up Table (LUT) to compute the new value of the current pixel to cipher. Applying this process on each pixel of the plain image, we generate the encrypted image. The results of different experimental tests, such as Key sp… ▽ More

    Submitted 9 February, 2016; originally announced February 2016.

    Comments: 7 pages, 12 figures, 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012

  3. arXiv:1409.4587  [pdf

    cs.MM cs.CR

    A new Watermarking Technique for Medical Image using Hierarchical Encryption

    Authors: Med Karim Abdmouleh, Ali Khalfallah, Med Salim Bouhlel

    Abstract: In recent years, characterized by the innovation of technology and the digital revolution, the field of media has become important. The transfer and exchange of multimedia data and duplication have become major concerns of researchers. Consequently, protecting copyrights and ensuring service safety is needed. Cryptography has a specific role, is to protect secret files against unauthorized access.… ▽ More

    Submitted 16 September, 2014; originally announced September 2014.

    Comments: 6 pages, 9 figures

    Journal ref: IJCSI International Journal of Computer Science Issues 11(4) (2014) 27-32

  4. arXiv:1406.1329  [pdf

    cs.DM

    Algorithmes dynamiques pour la communication dans le réseau ad hoc Coloration des graphes

    Authors: Ali Mansouri, Mohamed Salim Bouhlel

    Abstract: Several authors modelled networks ad hoc by oriented or disoriented graphs, whereby the problem of allowance (allocation) of the frequencies at the level of the network was transformed into coloring problem of nodes in the graph. Graph coloring is a tool to characterize the graphs. In our study, we were interested in particular in the coloring of vertex. In this domain, a large number of parameter… ▽ More

    Submitted 5 June, 2014; originally announced June 2014.

    Comments: in French

  5. A linear algorithm for the grundy number of a tree

    Authors: Ali Mansouri, Mohamed Salim Bouhlel

    Abstract: A coloring of a graph G = (V,E) is a partition {V1, V2, . . ., Vk} of V into independent sets or color classes. A vertex v Vi is a Grundy vertex if it is adjacent to at least one vertex in each color class Vj . A coloring is a Grundy coloring if every color class contains at least one Grundy vertex, and the Grundy number of a graph is the maximum number of colors in a Grundy coloring. We derive a… ▽ More

    Submitted 1 June, 2014; originally announced June 2014.

    Journal ref: International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014

  6. arXiv:1405.7383  [pdf

    cs.DM

    Coloration de nombre de Grundy pour les graphes triangulés

    Authors: Ali Mansouri, Mohamed Salim bouhlel

    Abstract: The problem of the data routing management, it provides a method or a strategy that guarantees at any time the connection between any pair of nodes in the network. This routing method must be able to cope with frequent changes in the topology and also other characteristics of the ad hoc network as bandwidth, the number of links, network resources etc.. We also illustrate the utility of the propose… ▽ More

    Submitted 28 May, 2014; originally announced May 2014.

    Comments: In French

    Journal ref: SETIT 2009 5th International Conference: Sciences of Electronic, Technologies of Information and T'elecommunications March 22 26 2009 TUNISIA

  7. arXiv:1405.6433  [pdf

    cs.DM

    Results for grundy number of the complement of bipartite graphs

    Authors: Ali Mansouri, Mohamed Salim Bouhlel

    Abstract: A Grundy k-coloring of a graph G, is a vertex k-coloring of G such that for each two colors i and j with i < j, every vertex of G colored by j has a neighbor with color i. The Grundy chromatic number (G), is the largest integer k for which there exists a Grundy k-coloring for G. In this note we first give an interpretation of (G) in terms of the total graph of G, when G is the complement of a bipa… ▽ More

    Submitted 25 May, 2014; originally announced May 2014.

    Journal ref: Ubiquitous Computing and Communication Journal Special Issue for The International Conference on Computing, Communications and Information Technology Applications (CCITA-2010)

  8. arXiv:1405.6432  [pdf

    cs.DM math.CO

    Exact values for the Grundy number of some graphs

    Authors: Ali Mansouri, Mohamed Salim Bouhlel

    Abstract: The Grundy number of a graph G is the maximum number k of colors used to color the vertices of G such that the coloring is proper and every vertex x colored with color i, is adjacent to (i - 1) vertices colored with each color j, In this paper we give bounds for the Grundy number of some graphs and Cartesian products of graphs. In particular, we determine an exact value of this parameter for n-dim… ▽ More

    Submitted 25 May, 2014; originally announced May 2014.

  9. arXiv:1401.7826  [pdf

    cs.DM math.CO

    The result for the grundy number on p4 classes

    Authors: Ali Mansouri, Mohamed Salim bouhlel

    Abstract: Our work becomes integrated into the general problem of the stability of the network ad hoc. Some, works attacked (affected) this problem. Among these works, we find the modelling of the network ad hoc in the form of a graph. We can resume the problem of coherence of the network ad hoc of a problem of allocation of frequency We study a new class of graphs, the fat-extended P4 graphs, and we give a… ▽ More

    Submitted 30 January, 2014; originally announced January 2014.

    Comments: 5 pages

    Journal ref: International Journal of Next-Generation Networks (IJNGN) Vol.5, No.4, December 2013

  10. arXiv:1309.3314  [pdf

    cs.GR cs.CG cs.MM

    Progressive Compression of 3D Objects with an Adaptive Quantization

    Authors: Zeineb Abderrahim, Elhem Techini, Mohamed Salim Bouhlel

    Abstract: This paper presents a new progressive compression method for triangular meshes. This method, in fact, is based on a schema of irregular multi-resolution analysis and is centered on the optimization of the rate-distortion trade-off. The quantization precision is adapted to each vertex during the encoding / decoding process to optimize the rate-distortion compromise. The Optimization of the treated… ▽ More

    Submitted 12 September, 2013; originally announced September 2013.

    Comments: 8 pages, 5 figures

    Journal ref: IJCSI Volume 10, Issue 2,No 1, March 2013 , Pages 504-511

  11. arXiv:1207.2268  [pdf

    cs.MM cs.CV

    Improvement of ISOM by using filter

    Authors: Imen Chaabouni, Wiem Fourati, Med Salim Bouhlel

    Abstract: Image compression helps in storing the transmitted data in proficient way by decreasing its redundancy. This technique helps in transferring more digital or multimedia data over internet as it increases the storage space. It is important to maintain the image quality even if it is compressed to certain extent. Depend upon this the image compression is classified into two categories : lossy and los… ▽ More

    Submitted 10 July, 2012; originally announced July 2012.

    Comments: 6 pages, 3 figures, 2 tables; JCSI (May 2012 issue, Volume 9, Issue 3) and having paper id IJCSI-2012-9-3-2860