|
| | Issue Date | Title | Author(s) |
| 121 | 1-Mar-2016 | A performance comparison of delay-tolerant network routing protocols | Abdelkader, Tamer ; Naik K. ; Nayak A. ; Goel N. ; Srivastava V. |
| 2 | 2010 | Performance Evaluation of Mobility spead over MANET Routing Protocols | Yaser Kamal,; Mohamed H. Abd El-Aziz ; Ahmed Safwat Abd El-Radi |
| 3 | 2020 | Performance Evaluation of trust Algorithms for Service Provider n Mobile Edge Computing | Merhan B. Monir,Tamer Mostafa Mohamed, Mohamed H. Abd El-Aziz,El-Sayed M. El-Horbat; Mohamed Hashem |
| 4 | 1-Dec-2022 | Performance testing as a service using cloud computing environment: A survey | Ali, Amira ; Maghawry, Huda Amin; Badr, Nagwa |
| 5 | 2011 | Personalized Ranking of Search results based on semantic similarity between queries | Naglaa Fathy; Nagwa Badr; Tarek Gharieb; Mohamed Hashem Abd El-Aziz |
| 6 | 2019 | Predicting Length of Stay in Hospitals intensive Care Unit using General Admission Features | Hashem, Mohamed; N. Abd Elwahab; A. A.Othman; Merhan A. Abd-Elrazek; Mohamed Hashem |
| 7 | 2021 | Predicting of Autism Spectrum Disorder using Gene Ontology | Ismail, E.; Hashem, Mohamed; Gad, W.; M. Hashem |
| 8 | 1-Dec-2021 | Predicting the Big Five for social network users using their personality characteristics | Hassanein, Mariam; Rady, Sherine ; Hussein, Wedad; Gharib, Tarek F. |
| 9 | Dec-2021 | Predicting the Dark Triad for Social Network Users using Their Personality Characteristics | M. Hassanein; Rady, Sherine ; T.F. Gharib; W. Hussein |
| 10 | 1-Jan-2018 | Privacy-preserving tabular data publishing: A comprehensive evaluation from web to cloud | Abdelhameed, Saad A.; Sherin M. Moussa ; khalifa, mohamed essam |
| 11 | 2010 | Problems of SIP flooding attacks anomaly detection algorithms | H.Al-Allouni; A. Rohiem,; A. El-moghazy; Mohamed Hashem |
| 12 | 2021 | ProGOMap: Automatic Generation of Mappings from Property Graphs to Ontologies | Fathy, N; Gad, W; Badr, N; Hashem, M. |
| 13 | 2006 | Proposed Data Fusion Techniques For Improving USA Geographical Data | Mohamed Hashem ; Ahmed Abd El-Rahman,; Ahmed Hamed; M.Helmy Mahran |
| 14 | 2006 | A Proposed Framework for Web Service Security | Hashem, M. |
| 15 | 1998 | Prospective Analysis of IP over ATM | Y. El-Gamal; Hashem, Mohamed; M.Sobh; Hashem, M. |
| 16 | 2020 | Querying Heterogeneous Property Graph Data Sources based on a Unified Conceptual View | W., Badr, N.,; Mohamed Hashem ; Fathy, N., Gad |
| 17 | 2007 | The Quest Of Accuracy In Applying Data Mining In Intrusion Detection Systems For Ad-Hoc Networks | M. Hashem ; M.S.Ghoniemy |
| 18 | 1-Dec-2016 | Realization of a data traceability and recovery service for a trusted authority service co-ordination within a Cloud environment | Zawawi N. ; Hamdy ElEliemy, Mohamed ; Ghary R. ; Tolba M. |
| 19 | 2020 | A regression-based model for predicting the best mode of treatment for Egyptian liver cancer patients | Abdelaziz, EH; ElBahnasy, K; Kamal, SM; Rasha Ismail |
| 20 | 2018 | Reliable Web Service Consumption Through Mobile Cloud Computing | Abdelfattah, Amr S.; Abdelkader, Tamer ; El-Sayed M. El-Horbaty |