Browse
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 505
| Issue Date | Title | Author(s) |
|---|---|---|
| 1-Jan-2021 | A Survey Study and Analysis of Task Scheduling Approaches for the Major Computing Environments | Rizk, Dalia Kamal A.A.; Hosny, Hoda M.; El-Sayed M. El-Horbaty ; Salem A. |
| 1-Dec-2003 | An approach on database index schemes | Abuazab, Hussam H.; El-Sayed M. El-Horbaty |
| 1-Jan-2024 | ConvNeXt network with transfer learning for cumulative foot pressure images recognition | Iskandar, Ayman; Alfonse, Marco ; Roushdy M. ; El-Sayed M. El-Horbaty |
| 1-Jun-1992 | Multiphase percolation and Josephson model for high-temperature superconductivity | El-Sayed M. El-Horbaty ; Ahmed, E. |
| 2-Jul-2015 | Securing Cloud Computing Environment using a New Trend of Cryptography | Mohammad, Omer K.Jasim; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. |
| 1-Jan-2024 | A survey about deep learning and federated Learning in cyberse-curity | Tareq, Imad; Elbagoury, Bassant M.; El-Regaily, Salsabil ; El-Sayed M. El-Horbaty |
| 1-Jan-2015 | A hybrid de-nosing technique for multi-noise removal on gray scale medical images | Youssef, Nora; Mahmoud, Abeer M.; El-Sayed M. El-Horbaty |
| 7-Dec-2012 | A novel approach for indexing Arabic documents through GPU computing | Sophoclis, Nermine N.; Abdeen, M.; El-Sayed M. El-Horbaty ; Yagoub, M. |
| 1-Apr-2014 | Cryptographic cloud computing environment as a more trusted communication environment | Jasim, Omer K.; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. |
| 1-Jan-1996 | An algorithm for calculating jones polynomials | El-Misiery, A. E.M.; El-Sayed M. El-Horbaty |
| 1-Mar-2024 | Biometric systems for identification and verification scenarios using spatial footsteps components | Iskandar, Ayman; Alfonse, Marco ; Roushdy M. ; El-Sayed M. El-Horbaty |
| 1-Jan-1992 | A synchronous algorithm for shortest paths on a tree machine | El-Sayed M. El-Horbaty ; Mohamed, Alaa El Din H. |
| 1-Jan-2015 | An Optimization Methodology for Container Handling Using Genetic Algorithm | Said, Gamal Abd El Nasser A.; El-Sayed M. El-Horbaty |
| 1-Jan-2015 | Hybrid Algorithm for Resource Provisioning of Multi-tier Cloud Computing | Eawna, Marwah Hashim; Mohammed, Salma Hamdy; El-Sayed M. El-Horbaty |
| 2-Aug-2024 | A Hybrid-Transformer-Based Cyber-Attack Detection in IoT Networks | Al-Halboosi, Imad Tareq; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty |
| 1-Jan-2015 | Quantum Key Distribution: Simulation and Characterizations | Jasim, Omer K.; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. |
| 1-Dec-2024 | Federated inception-multi-head attention models for cyber-attacks detection | Al-Halboosi, Imad Tareq; Elbagoury, Bassant M.; El-Regaily, Salsabil ; El-Sayed M. El-Horbaty |
| 1-Jan-2024 | Deep Reinforcement Learning Approach for Cyberattack Detection | Tareq, Imad; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty |
| 1-Jan-2014 | Advanced encryption standard development based quantum key distribution | Mohammad, Omer K.Jasim; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. |
| 30-Sep-2014 | Statistical analysis for random bits generation on quantum key distribution | Mohammad, Omer K.Jasim; Abbas, Safia; El-Sayed M. El-Horbaty ; Salem A. |
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 505
Discover
By people