default search action
Ehab R. Mohamed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Khalid M. Hosny, Nada Abdelfattah Ibrahim, Ehab R. Mohamed, Hanaa M. Hamza:
Artificial intelligence-based masked face detection: A survey. Intell. Syst. Appl. 22: 200391 (2024) - [j14]Khalid M. Hosny, Ahmed I. Awad, Marwa M. Khashaba, Mostafa M. Fouda, Mohsen Guizani, Ehab R. Mohamed:
Optimized Multi-User Dependent Tasks Offloading in Edge-Cloud Computing Using Refined Whale Optimization Algorithm. IEEE Trans. Sustain. Comput. 9(1): 14-30 (2024) - 2023
- [j13]Walid I. Khedr, Ameer El-Sayed Gouda, Ehab R. Mohamed:
FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation Framework Using Machine Learning for Stateful SDN-Based IoT Networks. IEEE Access 11: 28934-28954 (2023) - [j12]Khalid M. Hosny, Doaa Elshoura, Ehab R. Mohamed, Eleni Vrochidou, George A. Papakostas:
Deep Learning and Optimization-Based Methods for Skin Lesions Segmentation: A Review. IEEE Access 11: 85467-85488 (2023) - [j11]Sarah M. Alhammad, Doaa Sami Khafaga, Aya Y. Hamed, Osama El-Koumy, Ehab R. Mohamed, Khalid M. Hosny:
Fast and Accurate Detection of Masked Faces Using CNNs and LBPs. Comput. Syst. Sci. Eng. 47(3): 2939-2952 (2023) - [j10]Khalid M. Hosny, Ahmed I. Awad, Marwa M. Khashaba, Ehab R. Mohamed:
New Improved Multi-Objective Gorilla Troops Algorithm for Dependent Tasks Offloading problem in Multi-Access Edge Computing. J. Grid Comput. 21(2): 21 (2023) - [j9]Ahmed I. Awad, Mostafa M. Fouda, Marwa M. Khashaba, Ehab R. Mohamed, Khalid M. Hosny:
Utilization of mobile edge computing on the Internet of Medical Things: A survey. ICT Express 9(3): 473-485 (2023) - [j8]Khalid M. Hosny, Ahmed I. Awad, Marwa M. Khashaba, Mostafa M. Fouda, Mohsen Guizani, Ehab R. Mohamed:
Enhanced multi-objective gorilla troops optimizer for real-time multi-user dependent tasks offloading in edge-cloud computing. J. Netw. Comput. Appl. 218: 103702 (2023) - 2022
- [j7]Khalid M. Hosny, Aya Y. Hamad, Osama El-Komy, Ehab R. Mohamed:
Fast and accurate face recognition system using MORSCMs-LBP on embedded circuits. PeerJ Comput. Sci. 8: e1008 (2022) - 2020
- [j6]Khalid M. Hosny, Ameer El-Sayed Gouda, Ehab R. Mohamed:
New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks. Int. J. Sociotechnology Knowl. Dev. 12(2): 1-30 (2020) - [j5]Yu Gao, Yinsong Pan, Hong Huang, Ehab R. Mohamed, Zahraa M. I. Aly:
Swarm intelligence algorithm for extracting spatial spectrum features of hyperspectral remote sensing image and decomposing mixed pixels. J. Intell. Fuzzy Syst. 39(4): 5045-5055 (2020) - [j4]Khalid M. Hosny, Asmaa M. Khalid, Ehab R. Mohamed:
Efficient compression of volumetric medical images using Legendre moments and differential evolution. Soft Comput. 24(1): 409-427 (2020)
2010 – 2019
- 2019
- [j3]Walid I. Khedr, Heba M. Khater, Ehab R. Mohamed:
Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage. IEEE Access 7: 65635-65651 (2019) - 2018
- [j2]Khalid M. Hosny, Yasmeen M. Khedr, Walid I. Khedr, Ehab R. Mohamed:
Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication. Circuits Syst. Signal Process. 37(12): 5441-5462 (2018) - [j1]Khalid M. Hosny, Yasmeen M. Khedr, Walid I. Khedr, Ehab R. Mohamed:
Robust image hashing using exact Gaussian-Hermite moments. IET Image Process. 12(12): 2178-2185 (2018) - [c1]Nermeen M. Hamza, Shaimaa Ahmed El-Said, Ehab Rushdy Mohamed Attia, Mahmoud Ibrahim Abdalla:
Energy Aware Optimized Hierarchical Routing Technique for Wireless Sensor Networks. AMLTA 2018: 614-623
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint