Search

Your search keyword '"Yasmine Abouelseoud"' showing total 78 results

Search Constraints

Start Over You searched for: Author "Yasmine Abouelseoud" Remove constraint Author: "Yasmine Abouelseoud"
78 results on '"Yasmine Abouelseoud"'

Search Results

1. Deep learning-based spam image filtering

2. Hierarchical Distributed Framework for Optimal Dynamic Load Management of Electric Vehicles With Vehicle-to-Grid Technology

3. Optimal capacitor placement and sizing in radial electric powe

4. A heuristics-based solution to the continuous berth allocation and crane assignment problem

20. Multimedia Data Secure Transmission: A Review

30. A Symmetric Key Dynamic Gates Encryption Algorithm Based on Quantum Computing

31. A New 16 Bit Symmetric Key Quantum Encryption Algorithm Based On Dynamic Pauli Gates

32. An Improvement to the Set Protocol Based on Signcryption

33. A Mixed Integer Linear Programming Approach to Electrical Stimulation Optimization Problems

34. Innovative Approximate Analytical Solution for Standard Model of Viral Dynamics: Hepatitis C with Direct-Acting Agents as an Implemented Case

37. Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps

38. Data hiding in a digital cover image using chaotic maps and LSB technique

39. An Efficient Off-Line E-Cash System based on Signcryption without Bilinear Pairings

40. An Improved Authentication Protocol for Mobile Communication based on Tripartite Signcryption

41. A Pairing-Free Identity Based Tripartite Signcryption Scheme

42. Avoiding Key Off-Set attack in a Pairing-Free Certificateless Key Agreement Protocol based on ECC

43. A heuristics-based solution to the continuous berth allocation and crane assignment problem

44. A Tripartite Signcryption Scheme with Applications to E-Commerce

45. An Efficient Proxy Signcryption Scheme Based on the Discrete Logarithm Problem

46. Mixed-integer quadratically constrained programming with application to distribution networks reconfiguration

47. Dual cycle mode scheduling of internal transfer in container terminals using a Genetic Algorithm

48. New blind signcryption schemes with application to E-cash systems

49. Extension and application of El-Gamal encryption scheme

50. An efficient identity-based signeryption scheme without bilinear pairings

Catalog

Books, media, physical & digital resources