Security And Attacks In Wireless Sensor Networks Security in a wireless environment is an important issue which has been investigated by researchers for few years. Recently, the advancements in the miniaturization of the electromechanical systems (MEMS) allowed ...
A Distributed Approach Using Redundancy For Wireless Sensor Networks Reconfiguration In this paper, we are interested in the fault-tolerant approach in the wireless sensor networks (WSN) based on reconfiguration. Indeed, we propose an approach of monitoring of a WSN by ...
A Real-time Simulation Platform For The H.264 Codec Modules In this paper, we propose a real-time platform for H.264 CODEC with a memory management method in which we use a preloading mechanism in order to reduce external memory accessing. ...
Embedded Network Soc Application Based On The Openrisc Soft Processor This paper presents an implementation of an embedded network application into FPGA, based on the Opencores and Opensources approaches. The embedded system is part of a System on Chip (SoC) ...
Implementation Of A Real-time Signal Processing Application Using Partial Dynamic Reconfiguration In Fpga Reconfigurable devices, such as modern FPGA provide advanced capabilities which allow the creation of embedded systems on single chips (SoC). One of the most challenging opportunities provided by this kind ...
Real-time Fpga Implementation Of A Switching Chaotic Generators For The Secure Embedded Systems This article proposes a new chaotic key generator for data encryption and its optimized FPGA implementation based on a chaos switching rule between Lorenz’s and Lü’s no-linear systems. The originality ...
High Level Synthesis Of Embedded Systems Targeting Reconfigurable Architectures In this paper, we propose and validate a flow integrating the Unified Modelling Language UML with existing high level synthesis tools targeting reconfigurable architectures. The flow tries to take advantages ...
A New Hybrid Approach Of Embedded Application Validation In this paper, we suggest certain approach of validation of an embedded application. The presented methodology is divided on several layers, we can transit from one level to another level ...
Segmentation Of Satellite Image Using Geodesic Active Contour In this paper we present the method of satellites images segmentation. The technique is based on the geodesic actives contours using geometric approach. We shown that a particular case of ...
Alger - 3e édition de «Scopus Awards»: 12 chercheurs algériens dont 2 femmes, honorés
Ayant comptabilisé le plus de publications dans différentes disciplines scientifiques, 12 chercheurs algériens, dont 2 femmes, ont été honorés par le prix de la science «SCOPUS AWARDS», lors d’une soirée ...
CERIST Directeur : . Adresse : : 05, Rue des 3 frères aissou - Ben Aknoun - Alger - Algérie Activités : CENTRE DE RECHERCHE SUR L'INFORMATION
SCIENTIFIQUE ET TECHNIQUE ...
Cadoc Adresse : : Rue de la Flanelle cité Ain Allah Bp 143, Dely Brahim, Alger Activités : Compagnie Algérienne de la documantaion et conseil ...
https-geoteachme-blogspot-com ... Blog de géologie algérienne, bibliothèque en ligne, livres, articles, documents...etc ...
www-asjp-cerist-dz ... La plateforme ASJP regroupe de très nombreux articles en français et en arabe issus des publications universitaires algériennes comme les Annales de l'Université d'Alger. Le moteur de recherche permet de ...
www-sndl-cerist-dz ... SNDL Systeme National de Documentation en Ligne ...