Faculty of Computer and Information Sciences : [505] Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 505
Issue DateTitleAuthor(s)
1-Jan-2021A Survey Study and Analysis of Task Scheduling Approaches for the Major Computing EnvironmentsRizk, Dalia Kamal A.A.; Hosny, Hoda M.; El-Sayed M. El-Horbaty ; Salem A. 
1-Dec-2003An approach on database index schemesAbuazab, Hussam H.; El-Sayed M. El-Horbaty 
1-Jan-2024ConvNeXt network with transfer learning for cumulative foot pressure images recognitionIskandar, Ayman; Alfonse, Marco ; Roushdy M. ; El-Sayed M. El-Horbaty 
1-Jun-1992Multiphase percolation and Josephson model for high-temperature superconductivityEl-Sayed M. El-Horbaty ; Ahmed, E.
2-Jul-2015Securing Cloud Computing Environment using a New Trend of CryptographyMohammad, Omer K.Jasim; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. 
1-Jan-2024A survey about deep learning and federated Learning in cyberse-curityTareq, Imad; Elbagoury, Bassant M.; El-Regaily, Salsabil ; El-Sayed M. El-Horbaty 
1-Jan-2015A hybrid de-nosing technique for multi-noise removal on gray scale medical imagesYoussef, Nora; Mahmoud, Abeer M.; El-Sayed M. El-Horbaty 
7-Dec-2012A novel approach for indexing Arabic documents through GPU computingSophoclis, Nermine N.; Abdeen, M.; El-Sayed M. El-Horbaty ; Yagoub, M.
1-Apr-2014Cryptographic cloud computing environment as a more trusted communication environmentJasim, Omer K.; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. 
1-Jan-1996An algorithm for calculating jones polynomialsEl-Misiery, A. E.M.; El-Sayed M. El-Horbaty 
1-Mar-2024Biometric systems for identification and verification scenarios using spatial footsteps componentsIskandar, Ayman; Alfonse, Marco ; Roushdy M. ; El-Sayed M. El-Horbaty 
1-Jan-1992A synchronous algorithm for shortest paths on a tree machineEl-Sayed M. El-Horbaty ; Mohamed, Alaa El Din H.
1-Jan-2015An Optimization Methodology for Container Handling Using Genetic AlgorithmSaid, Gamal Abd El Nasser A.; El-Sayed M. El-Horbaty 
1-Jan-2015Hybrid Algorithm for Resource Provisioning of Multi-tier Cloud ComputingEawna, Marwah Hashim; Mohammed, Salma Hamdy; El-Sayed M. El-Horbaty 
2-Aug-2024A Hybrid-Transformer-Based Cyber-Attack Detection in IoT NetworksAl-Halboosi, Imad Tareq; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty 
1-Jan-2015Quantum Key Distribution: Simulation and CharacterizationsJasim, Omer K.; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. 
1-Dec-2024Federated inception-multi-head attention models for cyber-attacks detectionAl-Halboosi, Imad Tareq; Elbagoury, Bassant M.; El-Regaily, Salsabil ; El-Sayed M. El-Horbaty 
1-Jan-2024Deep Reinforcement Learning Approach for Cyberattack DetectionTareq, Imad; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty 
1-Jan-2014Advanced encryption standard development based quantum key distributionMohammad, Omer K.Jasim; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. 
30-Sep-2014Statistical analysis for random bits generation on quantum key distributionMohammad, Omer K.Jasim; Abbas, Safia; El-Sayed M. El-Horbaty ; Salem A. 
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 505