
Mohamed Elhoseny
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [b1]Rajiv Singh, Swati Nigam, Amit Kumar Singh, Mohamed Elhoseny:
Intelligent Wavelet Based Techniques for Advanced Multimedia Applications. Springer 2020, ISBN 978-3-030-31872-7, pp. 1-144 - [j89]Ibrahim M. El-Hasnony
, Sherif I. Barakat, Mohamed Elhoseny
, Reham R. Mostafa
:
Improved Feature Selection Model for Big Data Analytics. IEEE Access 8: 66989-67004 (2020) - [j88]Mohamed Abdel-Basset
, Reda Mohamed
, Mohamed Elhoseny
, Ripon Kumar Chakrabortty
, Michael J. Ryan
:
A Hybrid COVID-19 Detection Model Using an Improved Marine Predators Algorithm and a Ranking-Based Diversity Reduction Strategy. IEEE Access 8: 79521-79540 (2020) - [j87]M. Sivaram, E. Laxmi Lydia, Irina Valeryevna Pustokhina
, Denis Alexandrovich Pustokhin
, Mohamed Elhoseny
, Gyanendra Prasad Joshi, K. Shankar
:
An Optimal Least Square Support Vector Machine Based Earnings Prediction of Blockchain Financial Products. IEEE Access 8: 120321-120330 (2020) - [j86]A. Francis Saviour Devaraj, G. Murugaboopathi, Mohamed Elhoseny
, K. Shankar
, Kyungbok Min, Hyeonjoon Moon
, Gyanendra Prasad Joshi
:
An Efficient Framework for Secure Image Archival and Retrieval System Using Multiple Secret Share Creation Scheme. IEEE Access 8: 144310-144320 (2020) - [j85]Mohamed Abdel-Basset
, Hossam Hawash
, Mohamed Elhoseny
, Ripon Kumar Chakrabortty
, Michael J. Ryan
:
DeepH-DTA: Deep Learning for Predicting Drug-Target Interactions: A Case Study of COVID-19 Drug Repurposing. IEEE Access 8: 170433-170451 (2020) - [j84]K. Shankar
, Mohamed Elhoseny
, S. K. Lakshmanaprabu, M. Ilayaraja, Vidhyavathi RM, Mohamed A. Elsoud, Majid Alkhambashi:
Optimal feature level fusion based ANFIS classifier for brain MRI image classification. Concurr. Comput. Pract. Exp. 32(1) (2020) - [j83]Mohamed Elhoseny
:
Multi-object Detection and Tracking (MODT) Machine Learning Model for Real-Time Video Surveillance Systems. Circuits Syst. Signal Process. 39(2): 611-630 (2020) - [j82]Mohamed Elhoseny
:
Intelligent firefly-based algorithm with Levy distribution (FF-L) for multicast routing in vehicular communications. Expert Syst. Appl. 140 (2020) - [j81]Munwar Ali, Low Tang Jung
, Abdel-Haleem Abdel-Aty
, Mustapha Yusuf Abubakar
, Mohamed Elhoseny
, Irfan Ali:
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm. Expert Syst. Appl. 151: 113374 (2020) - [j80]Ashit Kumar Dutta, Mohamed Elhoseny, Vandna Dahiya
, K. Shankar:
An efficient hierarchical clustering protocol for multihop Internet of vehicles communication. Trans. Emerg. Telecommun. Technol. 31(5) (2020) - [j79]Muhammad Sajjad, Mansoor Nasir, Khan Muhammad, Siraj Khan, Zahoor Jan, Arun Kumar Sangaiah
, Mohamed Elhoseny
, Sung Wook Baik
:
Raspberry Pi assisted face recognition framework for enhanced law-enforcement services in smart cities. Future Gener. Comput. Syst. 108: 995-1007 (2020) - [j78]Mohamed Elhoseny, Hosny A. Abbas:
Towards automated SCADA forensic investigation: challenges, opportunities and promising paradigms. Int. J. Inf. Comput. Secur. 13(3/4): 268-288 (2020) - [j77]Mohamed Elhoseny
, M. Kabir Hassan
, Amit Kumar Singh
:
Special issue on cognitive big data analytics for business intelligence applications: Towards performance improvement. Int. J. Inf. Manag. 50: 413-415 (2020) - [j76]Vipin Kumar Rathi, Vinay Chaudhary, Nikhil Kumar Rajput
, Bhavya Ahuja, Amit Kumar Jaiswal, Deepak Gupta
, Mohamed Elhoseny, Mohammad Hammoudeh:
A Blockchain-Enabled Multi Domain Edge Computing Orchestrator. IEEE Internet Things Mag. 3(2): 30-36 (2020) - [j75]Mohamed Elhoseny, M. Kabir Hassan
, Mirjana Pejic-Bach:
Special Issue on "Cognitive Big Data Analytics for Intelligent Information Systems". Inf. Syst. E Bus. Manag. 18(4): 485-486 (2020) - [j74]K. Shankar, Mohamed Elhoseny
, R. Satheesh Kumar, S. K. Lakshmanaprabu, Xiaohui Yuan:
Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. J. Ambient Intell. Humaniz. Comput. 11(5): 1821-1833 (2020) - [j73]Mohamed Elhoseny, Xiaohui Yuan:
Editorial for special issue on fuzzy systems in distributed sensing applications. J. Intell. Fuzzy Syst. 38(2): 1135 (2020) - [j72]Mahmoud Zaher, Abdulaziz Shehab
, Mohamed Elhoseny, Farahat Farag Farahat:
Unsupervised Model for Detecting Plagiarism in Internet-based Handwritten Arabic Documents. J. Organ. End User Comput. 32(2): 42-66 (2020) - [j71]A. Francis Saviour Devaraj, Mohamed Elhoseny, S. Dhanasekaran, E. Laxmi Lydia, K. Shankar:
Hybridization of firefly and Improved Multi-Objective Particle Swarm Optimization algorithm for energy efficient load balancing in Cloud Computing environments. J. Parallel Distributed Comput. 142: 36-45 (2020) - [j70]N. Krishnaraj, Mohamed Elhoseny
, M. Thenmozhi, Mahmoud M. Selim
, K. Shankar:
Deep learning model for real-time image compression in Internet of Underwater Things (IoUT). J. Real Time Image Process. 17(6): 2097-2111 (2020) - [j69]Asif Ali Shah, Shabir A. Parah
, Mamoon Rashid
, Mohamed Elhoseny:
Efficient image encryption scheme based on generalized logistic map for real time image processing. J. Real Time Image Process. 17(6): 2139-2151 (2020) - [j68]Mohamed Elhoseny
, Diego Oliva
, Valentín Osuna-Enciso
, Aboul Ella Hassanien, Gunasekaran Manogaran:
Parameter identification of two dimensional digital filters using electro-magnetism optimization. Multim. Tools Appl. 79(7-8): 5005-5022 (2020) - [j67]Fuqiang Qin, Shuai Fang, Lifang Wang, Xiaohui Yuan, Mohamed Elhoseny, Xiaojing Yuan:
Kernel learning for blind image recovery from motion blur. Multim. Tools Appl. 79(29-30): 21873-21887 (2020) - [j66]Hamid Reza Boveiri
, Mohamed Elhoseny
:
A-COA: an adaptive cuckoo optimization algorithm for continuous and combinatorial optimization. Neural Comput. Appl. 32(3): 681-705 (2020) - [j65]Mohamed Elhoseny
, K. Shankar, S. K. Lakshmanaprabu, Andino Maseleno, Arunkumar N.:
Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput. Appl. 32(15): 10979-10993 (2020) - [j64]Sachi Nandan Mohanty, E. Laxmi Lydia, Mohamed Elhoseny, Majid M. Gethami Al Otaibi, K. Shankar:
Deep learning with LSTM based distributed data mining model for energy efficient wireless sensor networks. Phys. Commun. 40: 101097 (2020) - [j63]R. Bharathi, T. Abirami, S. Dhanasekaran, Deepak Gupta, Ashish Khanna, Mohamed Elhoseny, K. Shankar
:
Energy efficient clustering with disease diagnosis model for IoT based sustainable healthcare systems. Sustain. Comput. Informatics Syst. 28: 100453 (2020) - [j62]Mona Gamal Gafar, Mohamed Elhoseny
, Gunasekaran Manogaran:
Modeling neutrosophic variables based on particle swarm optimization and information theory measures for forest fires. J. Supercomput. 76(4): 2339-2356 (2020) - [j61]K. Karthikeyan, R. Sunder, K. Shankar, S. K. Lakshmanaprabu, V. Vijayakumar, Mohamed Elhoseny
, Gunasekaran Manogaran:
Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC-BA). J. Supercomput. 76(5): 3374-3390 (2020) - [j60]Mohamed Elhoseny
, K. Shankar
:
Reliable Data Transmission Model for Mobile Ad Hoc Network Using Signcryption Technique. IEEE Trans. Reliab. 69(3): 1077-1086 (2020) - [j59]J. Uthayakumar
, Mohamed Elhoseny
, K. Shankar
:
Highly Reliable and Low-Complexity Image Compression Scheme Using Neighborhood Correlation Sequence Algorithm in WSN. IEEE Trans. Reliab. 69(4): 1398-1423 (2020) - [j58]Mohamed Elhoseny
, Hosny A. Abbas, Aboul Ella Hassanien, Khan Muhammad, Arun Kumar Sangaiah
:
Secure Automated Forensic Investigation for Sustainable Critical Infrastructures Compliant with Green Computing Requirements. IEEE Trans. Sustain. Comput. 5(2): 174-191 (2020)
2010 – 2019
- 2019
- [j57]Vikram Puri, Sudan Jha, Raghvendra Kumar, Ishaani Priyadarshini, Le Hoang Son, Mohamed Abdel-Basset
, Mohamed Elhoseny
, Hoang Viet Long:
A Hybrid Artificial Intelligence and Internet of Things Model for Generation of Renewable Resource of Energy. IEEE Access 7: 111181-111191 (2019) - [j56]Mohamed Abdel-Basset
, Mohamed Elhoseny, Abduallah Gamal
, Florentin Smarandache
:
A novel model for evaluation Hospital medical care systems based on plithogenic sets. Artif. Intell. Medicine 100 (2019) - [j55]Mohamed Abdel-Basset
, Mai Mohamed, Mohamed Elhoseny
, Le Hoang Son, Francisco Chiclana, Abd El-Nasser H. Zaied:
Cosine similarity measures of bipolar neutrosophic set for diagnosis of bipolar disorder diseases. Artif. Intell. Medicine 101 (2019) - [j54]Haidi Rao, Xianzhang Shi, Ahoussou Kouassi Rodrigue, Juanjuan Feng, Yingchun Xia, Mohamed Elhoseny
, Xiaohui Yuan
, Lichuan Gu:
Feature selection based on artificial bee colony and gradient boosting decision tree. Appl. Soft Comput. 74: 634-642 (2019) - [j53]B. S. Murugan, Mohamed Elhoseny
, K. Shankar, J. Uthayakumar:
Region-based scalable smart system for anomaly detection in pedestrian walkways. Comput. Electr. Eng. 75: 146-160 (2019) - [j52]Moein Sarvaghad-Moghaddam, Ali A. Orouji, Zeinab Ramezani, Mohamed Elhoseny
, Ahmed Farouk
, Arunkumar N.:
Modelling the spice parameters of SOI MOSFET using a combinational algorithm. Clust. Comput. 22(Supplement): 4683-4692 (2019) - [j51]Alaa Tharwat, Mohamed Elhoseny
, Aboul Ella Hassanien, Thomas Gabel, Arun Kumar Sangaiah:
Intelligent Bézier curve-based path planning model using Chaotic Particle Swarm Optimization algorithm. Clust. Comput. 22(Supplement): 4745-4766 (2019) - [j50]Mohamed Elhoseny
, Gui-Bin Bian, S. K. Lakshmanaprabu
, K. Shankar, Amit Kumar Singh
, Wanqing Wu
:
Effective features to classify ovarian cancer data in internet of medical things. Comput. Networks 159: 147-156 (2019) - [j49]S. K. Lakshmanaprabu, Mohamed Elhoseny
, K. Shankar:
Optimal tuning of decentralized fractional order PID controllers for TITO process using equivalent transfer function. Cogn. Syst. Res. 58: 292-303 (2019) - [j48]Mohammed A. El-Shorbagy
, Mohamed Elhoseny
, Aboul Ella Hassanien, Syed Hassan Ahmed
:
A novel PSO algorithm for dynamic wireless sensor network multiobjective optimization problem. Trans. Emerg. Telecommun. Technol. 30(11) (2019) - [j47]Baofu Fang, Xiaoping Guo, Zaijun Wang, Yong Li, Mohamed Elhoseny
, Xiaohui Yuan
:
Collaborative task assignment of interconnected, affective robots towards autonomous healthcare assistant. Future Gener. Comput. Syst. 92: 241-251 (2019) - [j46]Nasir N. Hurrah, Shabir A. Parah
, Nazir A. Loan, Javaid A. Sheikh, Mohamed Elhoseny
, Khan Muhammad:
Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gener. Comput. Syst. 94: 654-673 (2019) - [j45]Tao Wang, Zhigao Zheng
, Mohamed Elhoseny
:
Equivalent mechanism: Releasing location data with errors through differential privacy. Future Gener. Comput. Syst. 98: 600-608 (2019) - [j44]Bin Cao, Jianwei Zhao
, Po Yang, Peng Yang, Xin Liu, Jun Qi, Andrew Simpson, Mohamed Elhoseny
, Irfan Mehmood, Khan Muhammad:
Multiobjective feature selection for microarray data via distributed parallel algorithms. Future Gener. Comput. Syst. 100: 952-981 (2019) - [j43]Hamid Reza Boveiri
, Raouf Khayami, Mohamed Elhoseny
, Gunasekaran Manogaran:
An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications. J. Ambient Intell. Humaniz. Comput. 10(9): 3469-3479 (2019) - [j42]Ashraf Darwish
, Aboul Ella Hassanien, Mohamed Elhoseny
, Arun Kumar Sangaiah
, Khan Muhammad:
The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J. Ambient Intell. Humaniz. Comput. 10(10): 4151-4166 (2019) - [j41]Xiaohui Yuan, Mohamed Elhoseny
:
Intelligent data aggregation inspired paradigm and approaches in IoT applications. J. Intell. Fuzzy Syst. 37(1): 3-7 (2019) - [j40]Pengcheng Sheng, Jingang Ma, Dapeng Wang, Wenyang Wang, Mohamed Elhoseny
:
Intelligent trajectory planning model for electric vehicle in unknown environment. J. Intell. Fuzzy Syst. 37(1): 397-407 (2019) - [j39]Ying Tang, Mohamed Elhoseny
:
Computer network security evaluation simulation model based on neural network. J. Intell. Fuzzy Syst. 37(3): 3197-3204 (2019) - [j38]Zhou Libo, Huang Tian, Guan Chunyun, Mohamed Elhoseny
:
Real-time detection of cole diseases and insect pests in wireless sensor networks. J. Intell. Fuzzy Syst. 37(3): 3513-3524 (2019) - [j37]K. Shankar, Mohamed Elhoseny:
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES. J. Univers. Comput. Sci. 25(10): 1221-1239 (2019) - [j36]Syed Hassan Ahmed
, Ali Kashif Bashir
, Mohamed Elhoseny
, Wael Guibène, Safdar Hussain Bouk:
Research on Efficient Data Forwarding in Vehicular Networks. Mob. Inf. Syst. 2019: 2353478:1-2353478:2 (2019) - [j35]Sriti Thakur, Amit Kumar Singh
, Satya Prakash Ghrera, Mohamed Elhoseny
:
Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multim. Tools Appl. 78(3): 3457-3470 (2019) - [j34]Mohammed K. Hassan, Ali I. El-Desouky, Mahmoud Mohammed Badawy, Amany M. Sarhan
, Mohamed Elhoseny
, Gunasekaran Manogaran:
EoT-driven hybrid ambient assisted living framework with naïve Bayes-firefly algorithm. Neural Comput. Appl. 31(5): 1275-1300 (2019) - [j33]Rizk Masoud Rizk-Allah, Aboul Ella Hassanien, Mohamed Elhoseny
, Gunasekaran Manogaran:
A new binary salp swarm algorithm: development and application for optimization tasks. Neural Comput. Appl. 31(5): 1641-1663 (2019) - [j32]Mohamed Elhoseny
, Xiaohui Yuan, Gunasekaran Manogaran:
Special issue on machine learning applications for self-organized wireless sensor networks. Neural Comput. Appl. 31(S-1): 1-2 (2019) - [j31]Ali Asghar Rahmani Hosseinabadi
, Javad Vahidi, Behzad Saemi, Arun Kumar Sangaiah
, Mohamed Elhoseny
:
Extended Genetic Algorithm for solving open-shop scheduling problem. Soft Comput. 23(13): 5099-5116 (2019) - [j30]Lamia Nabil Omran, Kadry Ali Ezzat, Mohamed Elhoseny
, Aboul Ella Hassanien:
Biomechanics of artificial intervertebral disc with different materials using finite element method. Soft Comput. 23(19): 9215-9236 (2019) - [j29]Khan Muhammad
, Salman Khan
, Mohamed Elhoseny
, Syed Hassan Ahmed
, Sung Wook Baik
:
Efficient Fire Detection for Uncertain Surveillance Environment. IEEE Trans. Ind. Informatics 15(5): 3113-3122 (2019) - 2018
- [j28]Abdulaziz Shehab
, Mohamed Elhoseny
, Khan Muhammad
, Arun Kumar Sangaiah
, Po Yang, Haojun Huang, Guolin Hou:
Secure and Robust Fragile Watermarking Scheme for Medical Images. IEEE Access 6: 10269-10278 (2018) - [j27]Mohamed Elhoseny
, Gustavo A. Ramírez González, Osama M. Abu-Elnasr, Shihab A. Shawkat
, Arunkumar N., Ahmed Farouk
:
Secure Medical Data Transmission Model for IoT-Based Healthcare Systems. IEEE Access 6: 20596-20608 (2018) - [j26]K. Shankar
, Mohamed Elhoseny
, E. Dhiravidachelvi, S. K. Lakshmanaprabu, Wanqing Wu:
An Efficient Optimal Key Based Chaos Function for Medical Image Security. IEEE Access 6: 77145-77154 (2018) - [j25]Rizk Masoud Rizk-Allah, Aboul Ella Hassanien, Mohamed Elhoseny
:
A multi-objective transportation model under neutrosophic environment. Comput. Electr. Eng. 69: 705-719 (2018) - [j24]Walaa Elsayed, Mohamed Elhoseny
, Sahar F. Sabbeh, Alaa Mohamed Riad:
Self-maintenance model for Wireless Sensor Networks. Comput. Electr. Eng. 70: 799-812 (2018) - [j23]Xiaohui Yuan
, Daniel Li, Deepankar Mohapatra, Mohamed Elhoseny
:
Automatic removal of complex shadows from indoor videos using transfer learning and dynamic thresholding. Comput. Electr. Eng. 70: 813-825 (2018) - [j22]Alaa Tharwat, Tarek Gaber
, Aboul Ella Hassanien, Mohamed Elhoseny
:
Automated toxicity test model based on a bio-inspired technique and AdaBoost classifier. Comput. Electr. Eng. 71: 346-358 (2018) - [j21]Tian Chen, Sihang Ju, Xiaohui Yuan
, Mohamed Elhoseny
, Fuji Ren, Mingyan Fan, Zhangang Chen:
Emotion recognition using empirical mode decomposition and approximation entropy. Comput. Electr. Eng. 72: 383-392 (2018) - [j20]I. S. Farahat, A. S. Tolba, Mohamed Elhoseny
, Waleed Eladrosy:
A secure real-time internet of medical smart things (IOMST). Comput. Electr. Eng. 72: 455-467 (2018) - [j19]Reem E. Mohamed
, Walid R. Ghanem, Abeer T. Khalil, Mohamed Elhoseny
, Muhammad Sajjad, Mohamed A. Mohamed:
Energy efficient collaborative proactive routing protocol for Wireless Sensor Network. Comput. Networks 142: 154-167 (2018) - [j18]Tarek Gaber
, Sarah Abdelwahab
, Mohamed Elhoseny
, Aboul Ella Hassanien:
Trust-based secure clustering in WSN-based intelligent transportation systems. Comput. Networks 146: 151-158 (2018) - [j17]Mohamed Elhoseny
, Alaa Tharwat, Xiaohui Yuan
, Aboul Ella Hassanien:
Optimizing K-coverage of mobile WSNs. Expert Syst. Appl. 92: 142-153 (2018) - [j16]Alaa Tharwat, Hani Mahdi, Mohamed Elhoseny
, Aboul Ella Hassanien
:
Recognizing human activity in mobile crowdsensing environment using optimized k-NN algorithm. Expert Syst. Appl. 107: 32-44 (2018) - [j15]Mohamed Elhoseny
, Ahmed Abdelaziz
, Ahmed S. Salama, Alaa Mohamed Riad, Khan Muhammad, Arun Kumar Sangaiah
:
A hybrid model of Internet of Things and cloud computing to manage big data in health services applications. Future Gener. Comput. Syst. 86: 1383-1394 (2018) - [j14]Reham Gharbia
, Aboul Ella Hassanien, Ali Hassan El Baz, Mohamed Elhoseny
, Gunasekaran Manogaran:
Multi-spectral and panchromatic image fusion approach using stationary wavelet transform and swarm flower pollination optimization for remote sensing applications. Future Gener. Comput. Syst. 88: 501-511 (2018) - [j13]Mohamed Elhoseny
, Alaa Tharwat, Aboul Ella Hassanien:
Bezier Curve Based Path Planning in a Dynamic Field using Modified Genetic Algorithm. J. Comput. Sci. 25: 339-350 (2018) - [j12]Arup Roy, Soumya Banerjee, Manash Sarkar, Ashraf Darwish
, Mohamed Elhoseny
, Aboul Ella Hassanien:
Exploring New Vista of intelligent collaborative filtering: A restaurant recommendation paradigm. J. Comput. Sci. 27: 168-182 (2018) - [j11]Ahmed M. Eassa, Mohamed Elhoseny
, Hazem M. El-Bakry, Ahmed S. Salama:
NoSQL Injection Attack Detection in Web Applications Using RESTful Service. Program. Comput. Softw. 44(6): 435-444 (2018) - [j10]Hosny A. Abbas
, Samir I. Shaheen
, Mohamed Elhoseny
, Amit Kumar Singh
, Majid Alkhambashi:
Systems thinking for developing sustainable complex smart cities based on self-regulated agent systems and fog computing. Sustain. Comput. Informatics Syst. 19: 204-213 (2018) - [c10]Mohamed Elhoseny
, Abdulaziz Shehab
, Lobna Osman:
An Empirical Analysis of User Behavior for P2P IPTV Workloads. AMLTA 2018: 252-263 - [c9]Hisham Elhoseny, Mohamed Elhoseny
, Alaa Mohamed Riad, Aboul Ella Hassanien:
A Framework for Big Data Analysis in Smart Cities. AMLTA 2018: 405-414 - [c8]Xiaohui Yuan
, Lichuan Gu, Tian Chen, Mohamed Elhoseny
, Wencheng Wang:
A Fast and Accurate Retina Image Verification Method Based on Structure Similarity. BigDataService 2018: 181-185 - [e1]Aboul Ella Hassanien, Mohamed F. Tolba, Mohamed Elhoseny, Mohamed Mostafa:
The International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2018, Cairo, Egypt, February 22-24, 2018. Advances in Intelligent Systems and Computing 723, Springer 2018, ISBN 978-3-319-74689-0 [contents] - 2017
- [j9]Noura Metawa, M. Kabir Hassan
, Mohamed Elhoseny
:
Genetic algorithm based model for optimizing bank lending decisions. Expert Syst. Appl. 80: 75-82 (2017) - [j8]Mohamed Elhoseny, Noura Metawa, Ashraf Darwish, Aboul Ella Hassanien:
Intelligent information system to ensure quality in higher education institutions, towards an automated e-university. Int. J. Comput. Intell. Stud. 6(2/3): 115-149 (2017) - [j7]Mohamed Elhoseny, Ahmed S. Salama, Ahmed Abdelaziz, Alaa Mohamed Riad:
Intelligent systems based on loud computing for healthcare services: a survey. Int. J. Comput. Intell. Stud. 6(2/3): 157-188 (2017) - [j6]Mohamed Elhoseny
, Abdulaziz Shehab
, Xiaohui Yuan
:
Optimizing robot path in dynamic environments using Genetic Algorithm and Bezier Curve. J. Intell. Fuzzy Syst. 33(4): 2305-2316 (2017) - [j5]Xiaohui Yuan
, Mohamed Elhoseny
, Hamdy K. El-Minir, Alaa Mohamed Riad:
A Genetic Algorithm-Based, Dynamic Clustering Method Towards Improved WSN Longevity. J. Netw. Syst. Manag. 25(1): 21-46 (2017) - [j4]Mohamed Elhoseny
, Ahmed Farouk
, Nanrun Zhou, Mingming Wang, Soliman Abdalla, Josep Batle:
Dynamic Multi-hop Clustering in a Wireless Sensor Network: Performance Improvement. Wirel. Pers. Commun. 95(4): 3733-3753 (2017) - [c7]Walaa Elsayed, Mohamed Elhoseny
, Alaa Mohamed Riad, Aboul Ella Hassanien:
Autonomic Self-healing Approach to Eliminate Hardware Faults in Wireless Sensor Networks. AISI 2017: 151-160 - [c6]Ahmed Abdelaziz
, Mohamed Elhoseny
, Ahmed S. Salama, Alaa Mohamed Riad, Aboul Ella Hassanien:
Intelligent Algorithms for Optimal Selection of Virtual Machine in Cloud Environment, Towards Enhance Healthcare Services. AISI 2017: 289-298 - [c5]Mahmoud Zaher, Abdulaziz Shehab
, Mohamed Elhoseny
, Lobna Osman:
A New Model for Detecting Similarity in Arabic Documents. AISI 2017: 488-499 - [c4]Mohamed Elhoseny
, Ehab Essa, Ahmad H. El Khateb
, Aboul Ella Hassanien, Ahmed Hamad:
Cascade Multimodal Biometric System Using Fingerprint and Iris Patterns. AISI 2017: 590-599 - [c3]Hisham Elhoseny, Mohamed Elhoseny
, Samir Abdelrazek
, Alaa Mohamed Riad:
Evaluating Learners' Progress in Smart Learning Environment. AISI 2017: 734-744 - [c2]Abdulaziz Shehab
, Ahmed Ismail, Lobna Osman, Mohamed Elhoseny
, Ibrahim M. El-Henawy:
Quantified Self Using IoT Wearable Devices. AISI 2017: 820-831 - [c1]Mingming Wang, Zhiguo Qu, Mohamed Elhoseny
:
Quantum Secret Sharing in Noisy Environment. ICCCS (2) 2017: 100-112 - 2016
- [j3]Mohamed Elhoseny
, Hamdy K. Elminir, Alaa Mohamed Riad, Xiaohui Yuan
:
A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption. J. King Saud Univ. Comput. Inf. Sci. 28(3): 262-275 (2016) - [j2]Mohamed Elhoseny
, Xiaohui Yuan
, Hamdy K. El-Minir, Alaa Mohamed Riad:
An energy efficient encryption method for secure dynamic WSN. Secur. Commun. Networks 9(13): 2024-2031 (2016) - 2015
- [j1]Mohamed Elhoseny
, Xiaohui Yuan
, Zhengtao Yu, Cunli Mao, Hamdy K. El-Minir, Alaa Mohamed Riad:
Balancing Energy Consumption in Heterogeneous Wireless Sensor Networks Using Genetic Algorithm. IEEE Commun. Lett. 19(12): 2194-2197 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-11 00:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint