El-Sayed M. El-Horbaty
El-Sayed M. El-Horbaty
Professor of Computer Science,Faculty of Computer&Information Sciences,Ain Shams Univ
Verified email at cis.asu.edu.eg - Homepage
Title
Cited by
Cited by
Year
Classification using deep learning neural networks for brain tumors
H Mohsen, ESA El-Dahshan, ESM El-Horbaty, ABM Salem
Future Computing and Informatics Journal 3 (1), 68-71, 2018
2712018
A comparative study of meta-heuristic algorithms for solving quadratic assignment problem
GAENA Said, AM Mahmoud, ESM El-Horbaty
arXiv preprint arXiv:1407.4863, 2014
972014
Intelligent Cloud Algorithms for Load Balancing problems: A Survey
ESMEH Aya A. Salah Farrag , Safia Abbas
Proceedings of 2015 IEEE Seventh International Conference on Intelligent …, 2015
342015
Human activity recognition for surveillance applications
A Taha, HH Zayed, ME Khalifa, ESM El-Horbaty
Proceedings of the 7th International Conference on Information Technology …, 2015
252015
Skeleton-based human activity recognition for video surveillance
A Taha, HH Zayed, ME Khalifa, ESM El-Horbaty
International Journal of Scientific & Engineering Research 6 (1), 993-1004, 2015
202015
Twitter benchmark dataset for Arabic sentiment analysis
D Gamal, M Alfonse, ESM El-Horbaty, ABM Salem
Int J Mod Educ Comput Sci 11 (1), 33, 2019
192019
Hybrid algorithm for resource provisioning of multi-tier cloud computing
MH Eawna, SH Mohammed, ESM El-Horbaty
Procedia Computer Science 65, 682-690, 2015
192015
Analysis of Palm Vein Pattern Recognition Algorithms and Systems
ABMS Mona A. Ahmed, Hala M. Ebied, El-Sayed M. El-Horbaty
International Journal of Bio-Medical Informatics and e-Health 1 (1), 10-14, 2013
17*2013
Efficiency of Modern Encryption Algorithms in Cloud Computing
ABMS Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty
International Journal of Emerging Trends of Technology in Computer Science …, 2013
162013
A comparative study between modern encryption algorithms based on cloud computing environment
OKJ Mohammad, S Abbas, ESM El-Horbaty, ABM Salem
8th International Conference for Internet Technology and Secured …, 2013
152013
An optimization methodology for container handling using genetic algorithm
GAENA Said, ESM El-Horbaty
Procedia Computer Science 65, 662-671, 2015
132015
A simulation modeling approach for optimization of storage space allocation in container terminal
GAENA Said, ESM El-Horbaty
arXiv preprint arXiv:1501.06802, 2015
112015
Statistical analysis for random bits generation on quantum key distribution
OKJ Mohammad, S Abbas, ESM El-Horbaty, ABM Salem
2014 Third International Conference on Cyber Security, Cyber Warfare and …, 2014
112014
Brain tumor type classification based on support vector machine in magnetic resonance images
H Mohsen, EA El-Dahshan, EM El-Horbaty, AM Salem
Annals Of “Dunarea De Jos” University Of Galati, Mathematics, Physics …, 2017
102017
Trust Management in Cloud Computing: A Survey
ESMEH Merrihan B. Monir, Mohammed H. AbdelAziz, AbdelAzizA. AbdelHamid
Proceedings of 2015 IEEE Seventh International Conference on Intelligent …, 2015
10*2015
Innovative method for enhancing key generation and management in the aes-algorithm
OKJ Mohammad, S Abbas, ESM El-Horbaty, ABM Salem
arXiv preprint arXiv:1504.03406, 2015
92015
Quantum key distribution: simulation and characterizations
OK Jasim, S Abbas, ESM El-Horbaty, ABM Salem
Procedia Computer Science 65, 701-710, 2015
92015
Analysis of machine learning techniques for gene selection and classification of microarray data
AM Mahmoud, BA Maher, ESM El-Horbaty, ABM Salem
The 6th International Conference on Information Technology, 2013
92013
RSAM: An enhanced architecture for achieving web services reliability in mobile cloud computing
AS Abdelfattah, T Abdelkader, EISM EI-Horbaty
Journal of King Saud University-Computer and Information Sciences 30 (2 …, 2018
82018
Computational intelligence approaches for malignant melanoma detection and diagnosis
MA Arasi, ESM El-Horbaty, ABM Salem, ESA El-Dahshan
2017 8th International Conference on Information Technology (ICIT), 55-61, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20