Browse
Collection's Items (Sorted by Submit Date in Descending order): 201 to 220 of 674
| Issue Date | Title | Author(s) |
|---|---|---|
| 1-Mar-2024 | Biometric systems for identification and verification scenarios using spatial footsteps components | Iskandar, Ayman; Alfonse, Marco ; Roushdy M. ; El-Sayed M. El-Horbaty |
| 1-Jan-1992 | A synchronous algorithm for shortest paths on a tree machine | El-Sayed M. El-Horbaty ; Mohamed, Alaa El Din H. |
| 1-Jan-2015 | An Optimization Methodology for Container Handling Using Genetic Algorithm | Said, Gamal Abd El Nasser A.; El-Sayed M. El-Horbaty |
| 1-Jan-2015 | Hybrid Algorithm for Resource Provisioning of Multi-tier Cloud Computing | Eawna, Marwah Hashim; Mohammed, Salma Hamdy; El-Sayed M. El-Horbaty |
| 2-Aug-2024 | A Hybrid-Transformer-Based Cyber-Attack Detection in IoT Networks | Al-Halboosi, Imad Tareq; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty |
| 1-Jan-2015 | Quantum Key Distribution: Simulation and Characterizations | Jasim, Omer K.; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. |
| 1-Dec-2024 | Federated inception-multi-head attention models for cyber-attacks detection | Al-Halboosi, Imad Tareq; Elbagoury, Bassant M.; El-Regaily, Salsabil ; El-Sayed M. El-Horbaty |
| 1-Jan-2024 | Deep Reinforcement Learning Approach for Cyberattack Detection | Tareq, Imad; Elbagoury, Bassant Mohamed; El-Regaily, Salsabil Amin; El-Sayed M. El-Horbaty |
| 1-Jan-2014 | Advanced encryption standard development based quantum key distribution | Mohammad, Omer K.Jasim; abbas, Safia abbas ; El-Sayed M. El-Horbaty ; Salem A. |
| 30-Sep-2014 | Statistical analysis for random bits generation on quantum key distribution | Mohammad, Omer K.Jasim; Abbas, Safia; El-Sayed M. El-Horbaty ; Salem A. |
| 1-Jan-2023 | Towards Developing a Metaverse Authentication Model for Mobile Features | Ibrahim, Ibrahim F.; Morsey, Mohammed M.; Mahmoud, Abeer M.; El-Sayed M. El-Horbaty |
| 1-Jan-2018 | Implementation of Machine Learning Algorithms in Arabic Sentiment Analysis Using N-Gram Features | Gamal, Donia ; Alfonse, Marco ; El-Sayed M. El-Horbaty ; Salem A. |
| 1-Jan-2018 | Achieving web services reliability in mobile cloud computing | Abdelfattah, Amr S.; Abdelkader, Tamer ; El-Sayed M. El-Horbaty |
| 1-Jul-2017 | A comparative study on opinion mining algorithms of social media statuses | Gamal, Donia ; Alfonse, Marco ; El-Sayed M. El-Horbaty ; Salem A. |
| 2024 | DeepFake Detection System using Deep Learning | Hossieny, Radwa ; Omar Ahmed; Sameh Fekry; Abdullah Metwally; Abdelrahman Abdelwahid; Amer Abdulelmagid; Dina Khattab |
| 2024 | AI-Safe Transportation: Real-Time Incident Detection and Alerting System in Smart Cities | Reda, Radwa ; Ziad Al-Agroudy; Abdelrahman Mohamed; Ziad Ashraf; Salma Al-Sayed; Ziad Hassan; Walaa Gad |
| 2024 | Security And Fire Detection System Using Deep Learning Techniques | Reda, Radwa ; Ahmed Nouh; Ahmed Khaled; Ahmed Tarek; Nada Magdy; Ahmed Khaled A.; Hala M. Ebied |
| 2023 | Development of electrooculogram based human computer interface system using deep learning | Radwa Reda Hossieny ; Manal Tantawi; Howida Shedeed; Mohamed F Tolba |
| 2021 | Attention detection using electro-oculography signals in e-learning environment | Reda, Radwa ; Yassmina Abdo; Howida Shedeed; Ehab Yahya; Hussein Ismail; Mostafa Saleh |
| 2020 | Analyzing electrooculography (eog) for eye movement detection | Reda, Radwa ; Manal Tantawi; Howida Shedeed; Mohamed F Tolba |
Collection's Items (Sorted by Submit Date in Descending order): 201 to 220 of 674
Discover
By people