default search action
El-Sayed M. El-Horbaty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j11]Imad Tareq, Bassant Mohamed Elbagoury, Salsabil Amin El-Regaily, El-Sayed M. El-Horbaty:
Deep Reinforcement Learning Approach for Cyberattack Detection. Int. J. Online Biomed. Eng. 20(5): 15-30 (2024) - [j10]Ayman Iskandar, Marco Alfonse, Mohamed Roushdy, El-Sayed M. El-Horbaty:
Biometric systems for identification and verification scenarios using spatial footsteps components. Neural Comput. Appl. 36(7): 3817-3836 (2024) - 2021
- [j9]Merrihan B. M. Mansour, Tamer Abdelkader, Mohamed Hashem, El-Sayed M. El-Horbaty:
An integrated three-tier trust management framework in mobile edge computing using fuzzy logic. PeerJ Comput. Sci. 7: e700 (2021) - 2019
- [j8]Donia Gamal, Marco Alfonse, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Analysis of Machine Learning Algorithms for Opinion Mining in Different Domains. Mach. Learn. Knowl. Extr. 1(1): 224-234 (2019) - 2018
- [j7]Amr S. Abdelfattah, Tamer Abdelkader, El-Sayed M. El-Horbaty:
RSAM: An enhanced architecture for achieving web services reliability in mobile cloud computing. J. King Saud Univ. Comput. Inf. Sci. 30(2): 164-174 (2018) - 2014
- [j6]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Cryptographic Cloud Computing Environment as a More Trusted Communication Environment. Int. J. Grid High Perform. Comput. 6(2): 38-51 (2014) - 2002
- [j5]I. A. Ismail, El-Sayed M. El-Horbaty, M. A. Ashabrawy:
Autoregressive Filter Algorithm for Sifting Digital Images. Int. J. Comput. Their Appl. 9(4): 200-204 (2002) - 2000
- [j4]El-Sayed M. El-Horbaty:
A Linear Time Parallel Algorithm for the 2-CNF Satisfiability Problem. Egypt. Comput. Sci. J. 22(1) (2000) - [j3]El-Sayed M. El-Horbaty, I. A. Ismail:
Autoregressive Filter Algorithm for Sifting Digital Images. Egypt. Comput. Sci. J. 22(1) (2000) - [j2]Suliman M. Mohamed, Henry O. Nyongesa, El-Sayed M. El-Horbaty:
A Learning Pattern Recognition Algorithm Using Fuzzy Self-Organizing Map Network. Egypt. Comput. Sci. J. 22(1) (2000) - 1992
- [j1]El-Sayed M. El-Horbaty, A. El-Din H. Mohamed:
A synchronous algorithm for shortest paths on a tree machine. Parallel Comput. 18(1): 103-107 (1992)
Conference and Workshop Papers
- 2023
- [c10]Ibrahim F. Ibrahim, Mohammed M. Morsey, Abeer M. Mahmoud, El-Sayed M. El-Horbaty:
Towards Developing a Metaverse Authentication Model for Mobile Features. ICEIS (1) 2023: 691-697 - 2021
- [c9]Dalia Rizk, Hoda Hosny, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A Survey Study and Analysis of Task Scheduling Approaches for the Major Computing Environments. WEBIST 2021: 412-421 - 2020
- [c8]Dalia Rizk, Hoda Hosny, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A Study on Cloud Computing Architectures for Smart Healthcare Services. IDDM 2020: 302-310 - 2019
- [c7]Aya A. Salah Farrag, Safia Abbas Mohamad, El-Sayed M. El-Horbaty:
Swarm Optimization for Solving Load Balancing in Cloud Computing. AMLTA 2019: 102-113 - 2018
- [c6]Nora Youssef, Alsayed Algergawy, Ibrahim F. Moawad, El-Sayed M. El-Horbaty:
Combined Features for Content Based Image Retrieval: A Comparative Study. AISI 2018: 634-643 - 2014
- [c5]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Statistical analysis for random bits generation on quantum key distribution. CyberSec 2014: 45-51 - [c4]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Advanced encryption standard development based quantum key distribution. ICITST 2014: 402-408 - 2013
- [c3]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A comparative study between modern encryption algorithms based on cloud computing environment. ICITST 2013: 531-535 - 2012
- [c2]Nermine N. Sophoclis, Mohammad Abdeen, El-Sayed M. El-Horbaty, Mustapha C. E. Yagoub:
A novel approach for indexing Arabic documents through GPU computing. CCECE 2012: 1-4 - 2003
- [c1]Hussam H. Abuazab, El-Sayed M. El-Horbaty:
An Approach on Database Index Schemes. IKE 2003: 581-590
Parts in Books or Collections
- 2016
- [p1]Omer K. Jasim Mohammad, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service. New Approaches in Intelligent Control 2016: 241-272
Informal and Other Publications
- 2022
- [i11]Amr S. Abdelfattah, Tamer Abdelkader, El-Sayed M. El-Horbaty:
RMAWS: An Hybrid Architecture for achieving Web Services Reliability in Mobile Cloud Computing. CoRR abs/2207.11608 (2022) - [i10]Amr S. Abdelfattah, Tamer Abdelkader, El-Sayed M. El-Horbaty:
RSAM: An Enhanced Architecture for achieving Web Services Reliability in Mobile Cloud Computing. CoRR abs/2207.12404 (2022) - [i9]Amr S. Abdelfattah, Tamer Abdelkader, El-Sayed M. El-Horbaty:
Reliable Web Services Approaches of Mobile CloudComputing: A Comparative study. CoRR abs/2207.13172 (2022) - 2020
- [i8]Nora Youssef, Abeer M. Mahmoud, El-Sayed M. El-Horbaty:
A Parallel Hybrid Technique for Multi-Noise Removal from Grayscale Medical Images. CoRR abs/2005.05371 (2020) - 2015
- [i7]Gamal Abd El-Nasser A. Said, El-Sayed M. El-Horbaty:
A Simulation Modeling Approach for Optimization of Storage Space Allocation in Container Terminal. CoRR abs/1501.06802 (2015) - [i6]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. CoRR abs/1503.04796 (2015) - [i5]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Innovative Method for enhancing Key generation and management in the AES-algorithm. CoRR abs/1504.03406 (2015) - 2014
- [i4]Gamal Abd El-Nasser A. Said, Abeer M. Mahmoud, El-Sayed M. El-Horbaty:
A Comparative Study of Meta-heuristic Algorithms for Solving Quadratic Assignment Problem. CoRR abs/1407.4863 (2014) - [i3]Gamal Abd El-Nasser A. Said, Abeer M. Mahmoud, El-Sayed M. El-Horbaty:
Simulation and optimization of container terminal operations: a case study. CoRR abs/1407.6257 (2014) - [i2]Gamal Abd El-Nasser A. Said, Abeer M. Mahmoud, El-Sayed M. El-Horbaty:
Solving container terminals problems using computer-based modeling. CoRR abs/1407.6384 (2014) - [i1]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A New Trend of Pseudo Random Number Generation using QKD. CoRR abs/1411.2469 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint