


default search action
Ahmed Ghoneim
Person information
- affiliation: Menoufia University, Faculty of Science, Shebin El-Koom, Egypt
- affiliation: King Saud University, Riyadh, Saudi Arabia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j57]Esraa Hassan, M. Shamim Hossain, Abeer Saber
, Samir Elmougy
, Ahmed Ghoneim, Ghulam Muhammad
:
A quantum convolutional network and ResNet (50)-based classification architecture for the MNIST medical dataset. Biomed. Signal Process. Control. 87(Part B): 105560 (2024) - [j56]Esraa Hassan, M. Shamim Hossain
, Samir Elmuogy, Ahmed Ghoneim
, Khalid Al Mutib, Abeer Saber:
Ultimate pose estimation: A comparative study. Expert Syst. J. Knowl. Eng. 41(9) (2024) - 2023
- [j55]Mohamed Abdur Rahman
, M. Shamim Hossain
, Ahmad Showail
, Nabil Ali Alrajeh
, Ahmed Ghoneim
:
AI-Enabled IIoT for Live Smart City Event Monitoring. IEEE Internet Things J. 10(4): 2872-2880 (2023) - [j54]Esraa Hassan
, Samir Elmougy, Mai R. Ibraheem
, M. Shamim Hossain
, Khalid Al Mutib, Ahmed Ghoneim, Salman A. AlQahtani
, Fatma M. Talaat
:
Enhanced Deep Learning Model for Classification of Retinal Optical Coherence Tomography Images. Sensors 23(12): 5393 (2023) - 2022
- [j53]Hongyin Zhu
, Prayag Tiwari
, Ahmed Ghoneim
, M. Shamim Hossain
:
A Collaborative AI-Enabled Pretrained Language Model for AIoT Domain Question Answering. IEEE Trans. Ind. Informatics 18(5): 3387-3396 (2022) - [j52]Parminder Singh
, Mehedi Masud
, M. Shamim Hossain
, Avinash Kaur, Ghulam Muhammad
, Ahmed Ghoneim
:
Privacy-Preserving Serverless Computing Using Federated Learning for Smart Grids. IEEE Trans. Ind. Informatics 18(11): 7843-7852 (2022) - 2021
- [j51]Fadl Dahan
, Khalil M. El Hindi, Ahmed Ghoneim, Hussain Alsalman:
An Enhanced Ant Colony Optimization Based Algorithm to Solve QoS-Aware Web Service Composition. IEEE Access 9: 34098-34111 (2021) - [j50]Laura Verde
, Giuseppe De Pietro, Ahmed Ghoneim
, Mubarak Alrashoud
, Khaled N. Al-Mutib, Giovanna Sannino
:
Exploring the Use of Artificial Intelligence Techniques to Detect the Presence of Coronavirus Covid-19 Through Speech and Voice Analysis. IEEE Access 9: 65750-65757 (2021) - [j49]Amit Kumar Jaiswal
, Prayag Tiwari
, Sachin Kumar
, Mabrook S. Al-Rakhami
, Mubarak Alrashoud
, Ahmed Ghoneim
:
Deep Learning-Based Smart IoT Health System for Blindness Detection Using Retina Images. IEEE Access 9: 70606-70615 (2021) - [j48]Mehedi Masud
, Gurjot Singh Gaba
, Salman AlQahtani
, Ghulam Muhammad
, Brij B. Gupta
, Pardeep Kumar
, Ahmed Ghoneim
:
A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care. IEEE Internet Things J. 8(21): 15694-15703 (2021) - [j47]Rui Wang, Jinfeng Xu, Yujun Ma
, Muhammad Talha, Mabrook S. Al-Rakhami, Ahmed Ghoneim:
Auxiliary Diagnosis of COVID-19 Based on 5G-Enabled Federated Learning. IEEE Netw. 35(3): 14-20 (2021) - [j46]Aaisha Makkar
, Sahil Garg
, Neeraj Kumar
, M. Shamim Hossain
, Ahmed Ghoneim
, Mubarak Alrashoud
:
An Efficient Spam Detection Technique for IoT Devices Using Machine Learning. IEEE Trans. Ind. Informatics 17(2): 903-912 (2021) - [c16]Mina Bishay, Ahmed Ghoneim, Mohamed Ashraf, Mohammad Mavadati:
Which CNNs and Training Settings to Choose for Action Unit Detection? A Study Based on a Large-Scale Dataset. FG 2021: 1-5 - [c15]Sandipan Banerjee, Ajjen Joshi, Ahmed Ghoneim, Survi Kyal, Taniya Mishra:
Synthesize & Learn: Jointly Optimizing Generative and Classifier Networks for Improved Drowsiness Detection. ICASSP 2021: 4050-4054 - [c14]Mina Bishay, Ahmed Ghoneim, Mohamed Ashraf, Mohammad Mavadati:
Choose Settings Carefully: Comparing Action Unit Detection At Different Settings Using A Large-Scale Dataset. ICIP 2021: 2883-2887 - [i2]Mina Bishay, Ahmed Ghoneim, Mohamed Ashraf, Mohammad Mavadati:
Which CNNs and Training Settings to Choose for Action Unit Detection? A Study Based on a Large-Scale Dataset. CoRR abs/2111.08320 (2021) - [i1]Mina Bishay, Ahmed Ghoneim, Mohamed Ashraf, Mohammad Mavadati:
Choose Settings Carefully: Comparing Action Unit detection at Different Settings Using a Large-Scale Dataset. CoRR abs/2111.08324 (2021) - 2020
- [j45]Lixia Luan, Wenjing Xiao
, Kai Hwang, M. Shamim Hossain
, Ghulam Muhammad
, Ahmed Ghoneim
:
MEMO Box: Health Assistant for Depression With Medicine Carrier and Exercise Adjustment Driven by Edge Computing. IEEE Access 8: 195568-195577 (2020) - [j44]Ahmed Ghoneim
, Ghulam Muhammad
, M. Shamim Hossain:
Cervical cancer classification using convolutional neural networks and extreme learning machines. Future Gener. Comput. Syst. 102: 643-649 (2020) - [j43]Yiming Miao, Gaoxiang Wu, Miao Li, Ahmed Ghoneim
, Mabrook Al-Rakhami
, M. Shamim Hossain:
Intelligent task prediction and computation offloading based on mobile-edge cloud computing. Future Gener. Comput. Syst. 102: 925-931 (2020) - [j42]Jiayi Lu, Enmin Song, Ahmed Ghoneim
, Mubarak Alrashoud:
Machine learning for assisting cervical cancer diagnosis: An ensemble approach. Future Gener. Comput. Syst. 106: 199-205 (2020) - [j41]Mostafa Ahmad, Ahmed Ghoneim
, Saleh Alshomrani, Ahmed H. Samak, Nader Omar, Fahad Algarni:
A novel and dependable image steganography model for strengthening the security of cloud storage. J. Intell. Fuzzy Syst. 38(3): 2777-2788 (2020) - [j40]Jun Yang, Nadra Guizani, Long Hu, Ahmed Ghoneim
, Mubarak Alrashoud, M. Shamim Hossain:
Smart Autonomous Moving Platforms. IEEE Netw. 34(3): 116-123 (2020) - [j39]Yiming Miao, Ming Zhou, Ahmed Ghoneim
:
Blockchain and AI-Based Natural Gas Industrial IoT System: Architecture and Design Issues. IEEE Netw. 34(5): 84-90 (2020) - [j38]Arun Kumar Sangaiah
, Darshan Vishwasrao Medhane
, Gui-Bin Bian
, Ahmed Ghoneim
, Mubarak Alrashoud
, M. Shamim Hossain
:
Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System. IEEE Trans. Ind. Informatics 16(5): 3322-3329 (2020) - [j37]Long Hu, Yiming Miao, Jun Yang, Ahmed Ghoneim
, M. Shamim Hossain, Mubarak Alrashoud:
IF-RANs: Intelligent Traffic Prediction and Cognitive Caching toward Fog-Computing-Based Radio Access Networks. IEEE Wirel. Commun. 27(2): 29-35 (2020)
2010 – 2019
- 2019
- [j36]Laura Verde
, Giuseppe De Pietro, Mubarak Alrashoud
, Ahmed Ghoneim
, Khaled N. Al-Mutib, Giovanna Sannino
:
Dysphonia Detection Index (DDI): A New Multi-Parametric Marker to Evaluate Voice Quality. IEEE Access 7: 55689-55697 (2019) - [j35]Mubarak Alrashoud
, Etessam Hazza, Fayez Alqahtani, Muneer H. Al-Hammadi
, Abdolreza Abhari, Ahmed Ghoneim
:
Cognitive and Hierarchical Fuzzy Inference System for Generating Next Release Planning in SaaS Applications. IEEE Access 7: 102966-102974 (2019) - [j34]Laura Verde
, Giuseppe De Pietro, Mubarak Alrashoud
, Ahmed Ghoneim
, Khaled N. Al-Mutib, Giovanna Sannino
:
Leveraging Artificial Intelligence to Improve Voice Disorder Identification Through the Use of a Reliable Mobile App. IEEE Access 7: 124048-124054 (2019) - [j33]Yixue Hao
, Mohd Usama
, Jun Yang
, M. Shamim Hossain
, Ahmed Ghoneim
:
Recurrent convolutional neural network based multimodal disease risk prediction. Future Gener. Comput. Syst. 92: 76-83 (2019) - [j32]Yin Zhang
, Yongfeng Qian, Di Wu
, M. Shamim Hossain
, Ahmed Ghoneim
, Min Chen
:
Emotion-Aware Multimedia Systems Security. IEEE Trans. Multim. 21(3): 617-624 (2019) - [j31]Yin Zhang
, M. Shamim Hossain, Ahmed Ghoneim
, Mohsen Guizani:
COCME: Content-Oriented Caching on the Mobile Edge for Wireless Communications. IEEE Wirel. Commun. 26(3): 26-31 (2019) - [j30]Kai Lin, Chensi Li, Daxin Tian, Ahmed Ghoneim
, M. Shamim Hossain, Syed Umar Amin
:
Artificial-Intelligence-Based Data Analytics for Cognitive Communication in Heterogeneous Wireless Networks. IEEE Wirel. Commun. 26(3): 83-89 (2019) - 2018
- [j29]Ahmed A. Abd El-Latif
, Bassem Abd-El-Atty
, M. Shamim Hossain
, Samir Elmougy
, Ahmed Ghoneim
:
Secure Quantum Steganography Protocol for Fog Cloud Internet of Things. IEEE Access 6: 10332-10340 (2018) - [j28]Yixue Hao
, Min Chen
, Long Hu, M. Shamim Hossain
, Ahmed Ghoneim
:
Energy Efficient Task Caching and Offloading for Mobile Edge Computing. IEEE Access 6: 11365-11373 (2018) - [j27]Ahmed Ghoneim
, Ghulam Muhammad
, Syed Umar Amin
, Brij B. Gupta
:
Medical Image Forgery Detection for Smart Healthcare. IEEE Commun. Mag. 56(4): 33-37 (2018) - [j26]Ahmed Ghoneim:
A New Service Oriented Framework for Self-Adapting Smart Applications in Mobile Environment. J. Softw. 13(3): 180-191 (2018) - [j25]Min Chen
, Yixue Hao
, Long Hu, M. Shamim Hossain, Ahmed Ghoneim
:
Edge-CoCaCo: Toward Joint Optimization of Computation, Caching, and Communication on Edge Cloud. IEEE Wirel. Commun. 25(3): 21-27 (2018) - [j24]Yiming Miao
, Yuanwen Tian, Jingjing Cheng
, M. Shamim Hossain
, Ahmed Ghoneim
:
RADB: Random Access with Differentiated Barring for Latency-Constrained Applications in NB-IoT Network. Wirel. Commun. Mob. Comput. 2018 (2018) - 2017
- [j23]Ghulam Muhammad
, Mansour Alsulaiman, Syed Umar Amin
, Ahmed Ghoneim
, Mohammed F. Alhamid:
A Facial-Expression Monitoring System for Improved Healthcare in Smart Cities. IEEE Access 5: 10871-10881 (2017) - [j22]Hazem M. Raafat, M. Shamim Hossain
, Ehab Essa, Samir Elmougy
, Ahmed S. Tolba, Ghulam Muhammad
, Ahmed Ghoneim
:
Fog Intelligence for Real-Time IoT Sensor Data Analytics. IEEE Access 5: 24062-24069 (2017) - [j21]Chin-Feng Lai
, Yao-Chung Chang, Han-Chieh Chao
, M. Shamim Hossain, Ahmed Ghoneim
:
A Buffer-Aware QoS Streaming Approach for SDN-Enabled 5G Vehicular Networks. IEEE Commun. Mag. 55(8): 68-73 (2017) - [j20]Fadl Dahan
, Khalil M. El Hindi, Ahmed Ghoneim
:
Enhanced Artificial Bee Colony Algorithm for QoS-aware Web Service Selection problem. Computing 99(5): 507-517 (2017) - [j19]Fadl Dahan, Khalil M. El Hindi, Ahmed Ghoneim
:
An Adapted Ant-Inspired Algorithm for Enhancing Web Service Composition. Int. J. Semantic Web Inf. Syst. 13(4): 181-197 (2017) - [j18]S. F. El-Zoghdy, Ahmed Ghoneim
:
New selection based model for filtering heterogeneous distributed computing systems based on quality of services criteria and load balancing polices. J. High Speed Networks 23(4): 271-286 (2017) - [j17]Majdi Rawashdeh, Mohammad Shorfuzzaman, Abdel Monim Artoli, M. Shamim Hossain, Ahmed Ghoneim
:
Mining tag-clouds to improve social media recommendation. Multim. Tools Appl. 76(20): 21157-21170 (2017) - [j16]Kai Lin
, Jeungeun Song, Jiming Luo, Wen Ji, M. Shamim Hossain, Ahmed Ghoneim
:
Green Video Transmission in the Mobile Cloud Networks. IEEE Trans. Circuits Syst. Video Technol. 27(1): 159-169 (2017) - [j15]Kai Lin, Jiming Luo, Long Hu, M. Shamim Hossain, Ahmed Ghoneim
:
Localization Based on Social Big Data Analysis in the Vehicular Networks. IEEE Trans. Ind. Informatics 13(4): 1932-1940 (2017) - [j14]Gaoxiang Li, Di Wu, Jiefeng Hu, Yong Li, M. Shamim Hossain, Ahmed Ghoneim
:
HELOS: Heterogeneous Load Scheduling for Electric Vehicle-Integrated Microgrids. IEEE Trans. Veh. Technol. 66(7): 5785-5796 (2017) - [c13]Li Li, Bassem Abd-El-Atty
, Ahmed A. Abd El-Latif
, Ahmed Ghoneim
:
Quantum color image encryption based on multiple discrete chaotic systems. FedCSIS 2017: 555-559 - 2016
- [j13]Tsung-Hung Tsai, Wei-Cih Jhou, Wen-Huang Cheng, Min-Chun Hu, I-Chao Shen
, Tekoing Lim, Kai-Lung Hua
, Ahmed Ghoneim
, M. Anwar Hossain
, Shintami Chusnul Hidayati:
Photo sundial: Estimating the time of capture in consumer photos. Neurocomputing 177: 529-542 (2016) - [j12]Wei Tan, Yushun Fan, Ahmed Ghoneim
, M. Anwar Hossain
, Schahram Dustdar
:
From the Service-Oriented Architecture to the Web API Economy. IEEE Internet Comput. 20(4): 64-68 (2016) - [j11]Said Fathy El-Zoghdy, Ahmed Ghoneim
:
A Multi-Class Task Scheduling Strategy for Heterogeneous Distributed Computing Systems. KSII Trans. Internet Inf. Syst. 10(1): 117-135 (2016) - [j10]Aitor Agirre
, Jorge Parra
, Aintzane Armentia
, Ahmed Ghoneim
, Elisabet Estévez-Estévez
, Marga Marcos
:
QoS management for dependable sensory environments. Multim. Tools Appl. 75(21): 13397-13419 (2016) - [j9]Sebastian von Enzberg
, Ayoub Al-Hamadi
, Ahmed Ghoneim
:
Registration of Feature-Poor 3D Measurements from Fringe Projection. Sensors 16(3): 283 (2016) - [j8]Quan Fang, Changsheng Xu, Jitao Sang, M. Shamim Hossain, Ahmed Ghoneim
:
Folksonomy-Based Visual Ontology Construction and Its Applications. IEEE Trans. Multim. 18(4): 702-713 (2016) - [j7]Xiaoshan Yang, Tianzhu Zhang, Changsheng Xu
, Shuicheng Yan, M. Shamim Hossain, Ahmed Ghoneim
:
Deep Relative Attributes. IEEE Trans. Multim. 18(9): 1832-1842 (2016) - [j6]M. Shamim Hossain, Mohammad Moniruzzaman, Ghulam Muhammad
, Ahmed Ghoneim
, Atif Alamri:
Big Data-Driven Service Composition Using Parallel Clustered Particle Swarm Optimization in Mobile Environment. IEEE Trans. Serv. Comput. 9(5): 806-817 (2016) - 2015
- [j5]Amr Tolba
, Ahmed Ghoneim
:
A Stepwise Self-adaptive Model for Improving Cloud Efficiency Based on Multi-Agent Features. J. Softw. 10(8): 1037-1044 (2015) - [j4]Anwar Saeed, Ayoub Al-Hamadi
, Ahmed Ghoneim
:
Head Pose Estimation on Top of Haar-Like Face Detection: A Study Using the Kinect Sensor. Sensors 15(9): 20945-20966 (2015) - [j3]Long Hu, Meikang Qiu, Jeungeun Song, M. Shamim Hossain, Ahmed Ghoneim
:
Software defined healthcare networks. IEEE Wirel. Commun. 22(6): 67-75 (2015) - [j2]Yasser Albagory
, Mostafa A. Nofal, Ahmed Ghoneim
:
Handover Performance of Unstable-Yaw Stratospheric High-Altitude Stations. Wirel. Pers. Commun. 84(4): 2651-2663 (2015) - 2014
- [c12]Ahmed Maher, Ahmed Ghoneim:
Multiple Subscriber-Identity-Module Detection Using Social Network Analysis Techniques. ICDM Workshops 2014: 804-809 - 2013
- [j1]Noureddine Abbadeni, Ahmed Ghoneim
, Abdullah AlGhamdi:
Program Educational Objectives Definition and Assessment for Accreditation Purposes. Int. J. Eng. Pedagog. 3(3): 33-46 (2013) - 2011
- [c11]Ahmed A. Hussein, Ahmed Ghoneim
, Reiner R. Dumke:
An Approach for Securing and Validating Business Processes Based on a Defined Enterprise Security Ontology Criteria. ICDIPC (2) 2011: 54-66 - [c10]Samir Elmougy
, Ahmed Ghoneim
:
A Dynamic Reconfigurable-Based Approach for Connectivity Mismatches of Web Services. ICDIPC (2) 2011: 67-81 - 2010
- [c9]Ahmed Ghoneim, Samir Elmougy, Mohamed Kotta, Hosni Abdellah:
Service Oriented Workflow Enhancement Blueprint Based on QoS and Graph Theory. SWWS 2010: 84-92 - [c8]Ahmed Ghoneim, Samir Elmougy, Ahmed Hussein, Reiner R. Dumke:
A Service Oriented Integration and Adaptation Framework for Organizational Services Orchestration. SWWS 2010: 105-111
2000 – 2009
- 2007
- [c7]Walter Cazzola
, Sonia Pini, Ahmed Ghoneim, Gunter Saake:
Co-evolving application code and design models by exploiting meta-data. SAC 2007: 1275-1279 - 2006
- [c6]Walter Cazzola, Ahmed Ghoneim, Gunter Saake:
Viewpoint for maintaining uml models against application changes. ICSOFT (1) 2006: 263-268 - 2005
- [c5]Ahmed Ghoneim, Sven Apel, Gunter Saake:
Evolutionary Software Life Cycle for Self-Adapting Software Systems. ICEIS (3) 2005: 211-216 - 2004
- [c4]Ahmed Ghoneim, Walter Cazzola:
RAMSES: a Reflective Middleware for Software Evolution. RAM-SE 2004: 21-26 - [c3]Walter Cazzola, Ahmed Ghoneim, Gunter Saake:
System Evolution through Design Information Evolution: a Case Study. IASSE 2004: 145-150 - 2003
- [c2]Walter Cazzola, Ahmed Ghoneim
, Gunter Saake:
Software Evolution through Dynamic Adaptation of Its OO Desgin. Objects, Agents, and Features 2003: 67-80 - 2002
- [c1]Walter Cazzola, Ahmed Ghoneim, Gunter Saake:
Reflective Analysis and Design for Adapting Object Run-Time Behavior. OOIS 2002: 242-254
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 00:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint