scispace - formally typeset
M

Mohamed Toumi

Researcher at University of Hassan II Casablanca

Publications -  7
Citations -  9

Mohamed Toumi is an academic researcher from University of Hassan II Casablanca. The author has contributed to research in topics: Wireless sensor network & Rekeying. The author has an hindex of 2, co-authored 6 publications receiving 9 citations.

Papers
More filters
Journal ArticleDOI

Dynamic Clustering Algorithm for Tracking Targets with High and Variable Celerity ATHVC

TL;DR: This work proposes to build optimal dynamic clusters on the target trajectory to increase energy efficiency and integrates for the first time, to the knowledge, strategies to avoid overlapping clusters and a model to wake up the sensors, adapting to the context of targets with large and variable speed.
Proceedings ArticleDOI

Dynamic Clustering Algorithm for Tracking Target with High and Variable Celerity

TL;DR: This work proposes to build optimal dynamic clusters on the target trajectory to increase energy efficiency and integrates for the first time, to the knowledge, strategies to avoid overlapping clusters and a model to wake up the sensors, adapting to the context of targets with large and variable speed.
Journal ArticleDOI

Dynamic cluster algorithm for improving percolation of targets in a sensor network (DC-AIPT)

TL;DR: This work proposes to construct optimal dynamic clusters on the target trajectory based on a probabilistic model integrating two fundamental parameters: energy consumption and accuracy, and this last metric is evaluated, for the first time, by the notion percolation.
Proceedings Article

Knee kinematic signals clustering for the Identification of sagittal and transverse gait patterns

TL;DR: The purpose of this study is to investigate knee kinematic signals clustering by principal component analysis to identify meaningful patterns in normal gait knee flexion/extension and tibial internal/external rotation signals.
Book ChapterDOI

How Mobile Nodes Influence Wireless Sensor Networks Security and Lifetime

TL;DR: A mobile approach to secure data exchanged by structured nodes in cluster based on cryptography elliptic curves and key management through a balanced binary tree to increase the security and lifetime of the entire network is proposed.