Search

Your search keyword '"Yasmine Abouelseoud"' showing total 78 results

Search Constraints

Start Over You searched for: Author "Yasmine Abouelseoud" Remove constraint Author: "Yasmine Abouelseoud"
78 results on '"Yasmine Abouelseoud"'

Search Results

1. Deep learning-based spam image filtering

2. Hierarchical Distributed Framework for Optimal Dynamic Load Management of Electric Vehicles With Vehicle-to-Grid Technology

3. Optimal capacitor placement and sizing in radial electric powe

4. A heuristics-based solution to the continuous berth allocation and crane assignment problem

20. Multimedia Data Secure Transmission: A Review

28. Improved DV-Hop based on Squirrel search algorithm for localization in wireless sensor networks

30. New video encryption schemes based on chaotic maps

32. A Symmetric Key Dynamic Gates Encryption Algorithm Based on Quantum Computing

33. A New 16 Bit Symmetric Key Quantum Encryption Algorithm Based On Dynamic Pauli Gates

34. An Improvement to the Set Protocol Based on Signcryption

35. A Mixed Integer Linear Programming Approach to Electrical Stimulation Optimization Problems

36. Two-Phase Image Encryption Scheme Based on FFCT and Fractals

37. Optimal Placement and Settings of FACTS Devices for Reactive Power Compensation Using a Firefly Algorithm

38. Innovative Approximate Analytical Solution for Standard Model of Viral Dynamics: Hepatitis C with Direct-Acting Agents as an Implemented Case

39. An Optimized Hybrid Approach for Spectrum Handoff in Cognitive Radio Networks With Non-Identical Channels

40. Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps

41. On the use of time division multiplexing to improve electrical brain stimulation focality

44. Data hiding in a digital cover image using chaotic maps and LSB technique

45. Optimal capacitor placement and sizing in radial electric power systems

46. An Efficient Off-Line E-Cash System based on Signcryption without Bilinear Pairings

47. An Improved Authentication Protocol for Mobile Communication based on Tripartite Signcryption

48. ArMTFr: a new permutation-based image encryption scheme

49. A Pairing-Free Identity Based Tripartite Signcryption Scheme

50. Avoiding Key Off-Set attack in a Pairing-Free Certificateless Key Agreement Protocol based on ECC

Catalog

Books, media, physical & digital resources