Skip to main content

Showing 1–6 of 6 results for author: Guennoun, M

.
  1. Constraints on the structure and seasonal variations of Triton's atmosphere from the 5 October 2017 stellar occultation and previous observations

    Authors: J. Marques Oliveira, B. Sicardy, A. R. Gomes-Júnior, J. L. Ortiz, D. F. Strobel, T. Bertrand, F. Forget, E. Lellouch, J. Desmars, D. Bérard, A. Doressoundiram, J. Lecacheux, R. Leiva, E. Meza, F. Roques, D. Souami, T. Widemann, P. Santos-Sanz, N. Morales, R. Duffard, E. Fernández-Valenzuela, A. J. Castro-Tirado, F. Braga-Ribas, B. E. Morgado, M. Assafin , et al. (212 additional authors not shown)

    Abstract: A stellar occultation by Neptune's main satellite, Triton, was observed on 5 October 2017 from Europe, North Africa, and the USA. We derived 90 light curves from this event, 42 of which yielded a central flash detection. We aimed at constraining Triton's atmospheric structure and the seasonal variations of its atmospheric pressure since the Voyager 2 epoch (1989). We also derived the shape of th… ▽ More

    Submitted 25 January, 2022; originally announced January 2022.

    Comments: 52 pages, 26 figures in the main paper, 2 figures in appendix B, 9 figures in appendix C, 1 long table over 5 pages

    Journal ref: A&A 659, A136 (2022)

  2. arXiv:2004.01069  [pdf, other

    astro-ph.EP astro-ph.IM

    A Global Fireball Observatory

    Authors: H. A. R. Devillepoix, M. Cupák, P. A. Bland, E. K. Sansom, M. C. Towner, R. M. Howie, B. A. D. Hartig, T. Jansen-Sturgeon, P. M. Shober, S. L. Anderson, G. K. Benedix, D. Busan, R. Sayers, P. Jenniskens, J. Albers, C. D. K. Herd, P. J. A. Hill, P. G. Brown, Z. Krzeminski, G. R. Osinski, H. Chennaoui Aoudjehane, Z. Benkhaldoun, A. Jabiri, M. Guennoun, A. Barka , et al. (24 additional authors not shown)

    Abstract: The world's meteorite collections contain a very rich picture of what the early Solar System would have been made of, however the lack of spatial context with respect to their parent population for these samples is an issue. The asteroid population is equally as rich in surface mineralogies, and map** these two populations (meteorites and asteroids) together is a major challenge for planetary sc… ▽ More

    Submitted 12 June, 2020; v1 submitted 2 April, 2020; originally announced April 2020.

    Comments: Accepted in PSS. 19 pages, 9 figures

  3. arXiv:1512.03498  [pdf

    cs.CR

    A Secure Database System using Homomorphic Encryption Schemes

    Authors: Youssef Gahi, Mouhcine Guennoun, Khalil El-Khatib

    Abstract: Cloud computing emerges as an attractive solution that can be delegated to store and process confidential data. However, several security risks are encountered with such a system as the securely encrypted data should be decrypted before processing them. Therefore, the decrypted data is susceptible to reading and alterations. As a result, processing encrypted data has been a research subject since… ▽ More

    Submitted 10 December, 2015; originally announced December 2015.

  4. An Encrypted Trust-Based Routing Protocol

    Authors: Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib

    Abstract: The interest in trust-based routing protocols has grown with the advancements achieved in ad-hoc wireless networks.However, regardless of the many security approaches and trust metrics available, trust-based routing still faces some security challenges, especially with respect to privacy. In this paper, we propose a novel trust-based routing protocol based on a fully homomorphic encryption scheme.… ▽ More

    Submitted 10 December, 2015; originally announced December 2015.

  5. arXiv:1508.05411  [pdf

    cs.CR cs.NI

    On the use of homomorphic encryption to secure cloud computing, services, and routing protocols

    Authors: Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-khatib

    Abstract: The trend towards delegating data processing to a remote party raises major concerns related to privacy violations for both end-users and service providers. These concerns have attracted the attention of the research community, and several techniques have been proposed to protect against malicious parties by providing secure communication protocols. Most of the proposed techniques, however, requir… ▽ More

    Submitted 21 August, 2015; originally announced August 2015.

    Comments: Youssef Gahi, PhD dissertation, 2013

  6. arXiv:1311.3231  [pdf

    cs.CY

    Infrastructure Logicielle d un Environnement Hospitalier Intelligent

    Authors: Youssef Gahi, Meryem Lamrani, Mouhcine Guennoun, Khalil El-Khatib

    Abstract: The impact of new technologies in the field of healthcare has been proven to be satisfactory in improving the quality of care and services for patients. The hospital environment is undoubtedly one of the environments where human or hardware errors can cause harmful damage. It is therefore very useful for the sector to be at the forefront of technology and use the strongest and most efficient means… ▽ More

    Submitted 12 November, 2013; originally announced November 2013.

    Comments: 50 pages. Master thesis 2008