|
| Issue Date | Title | Author(s) |
| 2010 | A New Novel Fidelity Digital Watermarking Adaptively Pixel Based on Medial Pyramid of Embedding Error in Spatial Domain of Robust | Aliwa, M. B; Hashem, Mohamed; El-Toboly, T. E; Fahmy, M. M; Nasr, M. E; M.H AbdelAziz |
| 1-Dec-2009 | An agent-based framework for inhabitants' untraceability in ubiquitous environments | Sherin M. Moussa ; Mohamed Hashem ; Agha, Gul |
| 15-Sep-2021 | An integrated three-tier trust management framework in mobile edge computing using fuzzy logic | Mansour, Merrihan B.M.; Abdelkader, Tamer ; Hashem, Mohamed ; El-Sayed M. El-Horbaty |
| 2014 | Analysis and Verification of a Key Agreement Protocol over Cloud Computing using Scyther tool | Hazem A.Elbaz; Hashem, Mohamed; Taymoor Nazy; Hashem, Mohamed |
| 2012 | Automatic generation of multi-testing types test cases using requirements-based testing | Hashem, Mohamed ; Tolba, M.F.; Badr, N.L; Boghdady, P.N |
| 2005 | Autonomous UAV Fuzzy Logic Navigation and Obstacle Avoidance Controller | Amr Abd El Hamied; Hashem, Mohamed; Serag E.Habib; Mohamed Hashem |
| 2006 | A Bandwidth-constrained QoS Genetic Source Routing Algorithm for Ad-hoc Mobile Networks | M.H AbdelAziz |
| 2015 | Building Trust Management Model for Cloud Computing | Aya Salama A Saleh; Essam M. Ramzy Hamed; Hashem, Mohamed |
| 28-Nov-2017 | Business behavior predictions using location based social networks in smart cities | AlSonosy, Ola; Rady, Sherine ; Badr, Nagwa ; Mohamed Hashem |
| 2013 | A Categorized Trust-Based Message Reporting Scheme for VANETs | Merhan B. Monir; Ayman Adel Adel Ad El-Hamid; Hashem, Mohamed |
| 2006 | Clustering of Gege Expression Profiles Using a Graph-based Technique | M.El Sharkawy; Hashem, Mohamed; M.Siam,; M. Hashem |
| 2005 | Data Mining For Computer Virus Detection | M. Hashem ; M.Siam,; S. Arafat,; M.Mabrouk |
| 2006 | Data Transfer Using Mobile Agents: Security Mechnisms | Abd El-Wahab S,; Hashem, Mohamed; Samira S. Mersal; Mohamed Hashem |
| 2012 | Database Security-Mechanics,T echniques, Breaches,And New Directions | Hashem, M. ; I El-Henaw; y,A.Mostafa |
| 2016 | DCSS: Distributed Channel Selection Strategy Based On Channel Weight In Multi-Hop Cognitive Radio Network | Hashem, Mohamed ; S. I. Barakat; M. A. AttaAlla |
| 2002 | Design and Implementation of Distance Learning Education System | M.Mahran; Hashem, Mohamed; A. Mohamed; M. Hashem |
| 2013 | Design And Implementation Of Extensible Service-Oriented Algorithms For Securing Relational Data Bases | A.Mostafa,; Hashem, Mohamed; I El-Henawy; M. Hashem |
| 2013 | Design And Implementation Of Multi-Layer Polices For Database Security | A.Mostafa; Hashem, Mohamed; I El-Henawy; Hashem, M. |
| Dec-2015 | Design of DNA-based Advanced Encryption Standard (AES) | khalifa, mohamed essam ; Mona Sabry; Hashem, Mohamed ; Taymoor Nazmy |
| 2014 | Distributed channel selection based on channel weight for cognitive radio network | Hashem, Mohamed ; S. I. Barakat; M. A. Attalla |
| 2010 | A DNA and Amino-based Implementation of playfair cipher | Sabry, M; Hashem, Mohamed; Nazmy, T; Mohamed Hashem |
| 2006 | Dynamic Decision Support Systems For Geographical Information Systems Using Association Rules | Mohamed Hashem ; Ahmed Abd El-Rahman; Ahmed Hamed,; M.Helmy Mahran |
| 2015 | An Elliptical Basis Function Network for Non-blind Image Deconvolution | Hashem, Mohamed ; Hary Mohamed; E.A. Rashed, |
| 2014 | Encoding To The Form Of Natural Amino Acids | Mona Sabry; Hashem, Mohamed; Tymor Nazmy,; Hashem, M. |
| 2010 | An Enhanced Reliable Ad-Hoc Multicasting Protocol | M. Hashem; Hashem, Mohamed; F. Amer; A. Fahmy,; Ahmed Ibrahim,; M. Hashem |
| 2009 | Enhanced Reliable Ad-Hoc Multicasting Protocol | Ahmed Ibrahim; Hashem, Mohamed; F. Amer; A. Fahmy,; Hashem, M. |
| 2017 | Enhanced Tree Routing Protocols for Multi-hop and Multi-channel Cognitive Radio Network (EMM-TRP) | Hashem, Mohamed ; S. I. Barakat; M. A. Attalla |
| 2011 | Enhancing Web Search with Semantic Identification of User Preference | Naglaa Fathy; Nagwa Badr; Mohamed Hashem ; Tarek Gharieb |
| 2011 | Exploring A Hybrid Of Geospatial Semantic Information In Ubiquitous Computing Environments | Raghda A. Fouad; Hashem, Mohamed; Nagwa Badr; Hashem, M. |
| 2010 | Fidelity and Robust Digital Watermarking adaptively Pixel based on Medical Pyramid of Embedding Error Gray Scale Images | Aliwa, M. B; El-Tobely, T. E; M.H AbdelAziz ; Fahmy, M. M; Nasr, M. E |
| 2010 | A framework for mobility- aware resource management and untraceability in multi-inhibitant smart space | S. M. Moussa; Hashem, Mohamed; G. A. Agha; M. Hashem |
| 1999 | Fuzzy Logic for Threat Assessment | Osama Badawy; Hashem, Mohamed; Ashraf Deraz; M. Hashem |
| 2006 | Fuzzy Real-Time Multimedia Data Mining for Raw Video Sequences | Mohamed Hashem |
| 2009 | A gateway-based framework for transparent interconnection between WSN and IP network | Karim A. Emara; Mohammad Abdeen; M.H AbdelAziz |
| 2010 | Generic Technique for Interconnection between WSN and IP Network | Karim A. Emara; Mohamed Hashem ; Mohammad Abdeen, |
| 1999 | Genetic Adaptive Routing Algorithms (GARA) for Computer Networks | Hashem, M. ; Baith. M.,; A.Fahmy; M.A.El-Says, |
| 2003 | A Genetic Algorithm For Delay-Constrained Unicast Source Routing in Ad-Hoc Wireless Mobile networks | M. Hashem ; S. Ghonemy; , M.Hamdy |
| 2014 | GPSIH: A generic IP-based scheme for identity hiding in MANETs | Yomna Mohsen; Hashem, Mohamed ; Mohamed Hamdy |
| 2022 | HEC-ASD: a hybrid ensemble-based classification model for predicting autism spectrum disorder disease genes | Ismail, E; Hashem, Mohamed; Gad, W; Hashem, Mohamed |
| 2011 | Hybrid Multi-level Intrusion Detection Systems | Sahar Slim; Mohamed H. Abd El-Aziz ; Taymoor M. Nazmy |
| 2014 | Hybrid Rough Genetic Algorithm Model for Making Treatment Decisions of Hepatitis C | Mohammed M. Eissa; Mohammed El-mogy; Hashem, Mohamed ; Farid Badria |
| 2014 | Hybrid Trust Management Model for Cloud Computing | Aya Salama A Saleh; Essam M. Ramzy Hamed; Hashem, Mohamed |
| 2016 | An Improved Image Denoising Model by Incrementally Learning Gaussian Mixture Parameters | Hashem, Mohamed; E.A. Rashed, F. Hary; Hashem, Mohamed |
| 2005 | Improving Cluster Homogeneity and Separation In Clustering Gene Expression Patterns | Hashem, Mohamed; M.Mounir; M.Siam,; M.El Sharkawy,; Hashem, M. |
| 2006 | Intelligent Detection and Modelling of Computer Viruses | Mohamed Hashem |
| 2016 | Intelligent Prediction of Breast Cancer: A Comparative Study | Merhan A. Abd-Elrazek, ,; A. A.Othman,; Abd El-Aziz; N. Abd Elwahab; Hashem, Mohamed |
| 2012 | Interactive Multi-Layer Policies For Securing Relational Databases | M. Hashem ; I El-Henawy; A.Mostafa |
| 2009 | Intrusion Detection in VoIP/SIP Denial of Service attacks | H.Al-Allouni; A. Rohiem; A. El-moghazy; M. Hashem |
| 2010 | Intrusion Detection Using Multi-Stage Neural Network | Sahar Slim; Taymoor M. Nazmy; Mohamed Hashem |
| 2010 | Lightweight Distance Bound Protocol for Low cost RFID Tags | Mohamed Hashem |
| 25-May-2010 | Lightweight Mutual Authentication Protocol for Low Cost RFID Tags | Eslam Gamal Ahmed ; Eman Shaaban ; Hashem, Mohamed |
| 2015 | Low Dose CT Image Restoration by Incremental Learing and Ant Colony Optimization | Hashem, Mohamed ; E.A. Rashed; F. Hary |
| 9-May-2016 | Machine learning techniques for mining location-based social networks for business predictions | Al Sonosy, Ola; Rady, Sherine ; Badr, Nagwa ; Hashem, Mohamed |
| 2006 | MANS: A simulator for Ad-Hoc Networks | Mohamed Hashem ; Chrestieen Basem,; Peter Aziz,; Gerges Azmy |
| 1-Sep-2025 | Metaverse as a Cyber-Physical Social System | Abed, A.Z.M; Abdelkader, T; Hashem, Mohamed |
| 2005 | Mobile Agents For Computer Virus Detection | M.Siam; Hashem, Mohamed; S. Arafat; Hashem, M. |
| 2005 | Modefied Adaptive Channel Reservation for Wireless Networks | Hashem, Mohamed; M. M. Mounier; Mohamed Hashem |
| 2002 | Modified Distributed Quality of Service Routing in Wireless Mobile Ad-Hoc Networks | M. Hashem ; S. Ghonemy ,; M. Hamdy |
| 2002 | MPAR: Modified PNNI Augmented Routing , A New Proposed Model for IP over ATM | M. Hashem |
| 2006 | Network-based Hidden Markov Models Intrusion Detection Systems | Mohamed Hashem |
| 2003 | Neural Networks For Computer Virus Detection | M.Siam,; M. Hashem ; M.Mabrouk; . Arafat, |
| 2001 | Neural Networks for Threat Assessment | Osama Badawy; Hashem, Mohamed; Ashraf Deraz; M. Hashem |
| 2022 | A New Neural Network Model for Prediction Next Stage of Alzheimer’s Disease | Zawawi, N; Hashem, Mohamed; Gharib, T.F.; M. Hashem |
| 2010 | A New Novel Fidelity Digital Watermarking Based on Adaptively Pixel-Most-Significant-Bit-6 in Spatial Domain Gray Scale Images and Robust | Aliwa, M. B; Hashem, Mohamed; El-Toboly, T. E; Fahmy, M. M; Nasr, M. E; M.H AbdelAziz |
| 2011 | A Novel Authenticated Digital Watermarking in Mobile Ad-Hoc Networks using ns-2 Simulator | Aliwa, M. B; Hashem, Mohamed; El-Toboly,T. E; Fahmy, M. M; Nasr, M. E; M.H AbdelAziz |
| 2009 | Novel goal-based weapon target assignment doctrine | Mekawey, H.I; El-Wahab, M.S.A; M.H AbdelAziz |
| 2010 | On Location -Centeric Semantic Information Retrieval In Ubiquitous Computing Enviroments | Raghda A. Fouad, N,; Hashem, M. ; Hanaa Talha; agwa Badr |
| 2023 | Ontology-Driven Conceptual Model and Domain Ontology for Egyptian E-Goverement | Shaimaa Haridy; Hashem, Mohamed; Nagwa Badr; Hashem, Mohamed |
| 2021 | OntoUML Conceptual Model for Egyption E-Government : Student and Traveler Case Study | Shaimaa Haridy; Rasha M; Ismail; Nagwa Badr; Hashem, M. |
| 2017 | Performance Analysis of a Tree Routing Protocol for Cognitive Radio Network Under Impact of Different Primary User Activity Patterns | Hashem, Mohamed ; S. I. Barakat,; M. A. Attalla, |
| 2010 | Performance Evaluation of Mobility spead over MANET Routing Protocols | Yaser Kamal,; Mohamed H. Abd El-Aziz ; Ahmed Safwat Abd El-Radi |
| 2020 | Performance Evaluation of trust Algorithms for Service Provider n Mobile Edge Computing | Merhan B. Monir,Tamer Mostafa Mohamed, Mohamed H. Abd El-Aziz,El-Sayed M. El-Horbat; Mohamed Hashem |
| 2011 | Personalized Ranking of Search results based on semantic similarity between queries | Naglaa Fathy; Nagwa Badr; Tarek Gharieb; Mohamed Hashem Abd El-Aziz |
| 2019 | Predicting Length of Stay in Hospitals intensive Care Unit using General Admission Features | Hashem, Mohamed; N. Abd Elwahab; A. A.Othman; Merhan A. Abd-Elrazek; Mohamed Hashem |
| 2021 | Predicting of Autism Spectrum Disorder using Gene Ontology | Ismail, E.; Hashem, Mohamed; Gad, W.; M. Hashem |
| 2010 | Problems of SIP flooding attacks anomaly detection algorithms | H.Al-Allouni; A. Rohiem,; A. El-moghazy; Mohamed Hashem |
| 2021 | ProGOMap: Automatic Generation of Mappings from Property Graphs to Ontologies | Fathy, N; Gad, W; Badr, N; Hashem, M. |
| 2006 | Proposed Data Fusion Techniques For Improving USA Geographical Data | Mohamed Hashem ; Ahmed Abd El-Rahman,; Ahmed Hamed; M.Helmy Mahran |
| 2006 | A Proposed Framework for Web Service Security | Hashem, M. |
| 1998 | Prospective Analysis of IP over ATM | Y. El-Gamal; Hashem, Mohamed; M.Sobh; Hashem, M. |