![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
El-Sayed M. El-Horbaty
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Imad Tareq Al-Haboosi, Bassant Mohamed Elbagoury, Salsabil Amin El-Regaily, El-Sayed M. El-Horbaty:
A Hybrid-Transformer-Based Cyber-Attack Detection in IoT Networks. Int. J. Interact. Mob. Technol. 18(14): 90-102 (2024) - [j11]Imad Tareq
, Bassant Mohamed Elbagoury, Salsabil Amin El-Regaily, El-Sayed M. El-Horbaty:
Deep Reinforcement Learning Approach for Cyberattack Detection. Int. J. Online Biomed. Eng. 20(5): 15-30 (2024) - [j10]Ayman Iskandar
, Marco Alfonse, Mohamed Roushdy
, El-Sayed M. El-Horbaty:
Biometric systems for identification and verification scenarios using spatial footsteps components. Neural Comput. Appl. 36(7): 3817-3836 (2024) - 2023
- [c10]Ibrahim F. Ibrahim, Mohammed M. Morsey, Abeer M. Mahmoud, El-Sayed M. El-Horbaty:
Towards Developing a Metaverse Authentication Model for Mobile Features. ICEIS (1) 2023: 691-697 - 2022
- [i11]Amr S. Abdelfattah, Tamer Abdelkader
, El-Sayed M. El-Horbaty:
RMAWS: An Hybrid Architecture for achieving Web Services Reliability in Mobile Cloud Computing. CoRR abs/2207.11608 (2022) - [i10]Amr S. Abdelfattah, Tamer Abdelkader
, El-Sayed M. El-Horbaty:
RSAM: An Enhanced Architecture for achieving Web Services Reliability in Mobile Cloud Computing. CoRR abs/2207.12404 (2022) - [i9]Amr S. Abdelfattah, Tamer Abdelkader
, El-Sayed M. El-Horbaty:
Reliable Web Services Approaches of Mobile CloudComputing: A Comparative study. CoRR abs/2207.13172 (2022) - 2021
- [j9]Merrihan B. M. Mansour, Tamer Abdelkader
, Mohamed Hashem, El-Sayed M. El-Horbaty:
An integrated three-tier trust management framework in mobile edge computing using fuzzy logic. PeerJ Comput. Sci. 7: e700 (2021) - [c9]Dalia Rizk, Hoda Hosny, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A Survey Study and Analysis of Task Scheduling Approaches for the Major Computing Environments. WEBIST 2021: 412-421 - 2020
- [c8]Dalia Rizk, Hoda Hosny, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A Study on Cloud Computing Architectures for Smart Healthcare Services. IDDM 2020: 302-310 - [i8]Nora Youssef, Abeer M. Mahmoud, El-Sayed M. El-Horbaty:
A Parallel Hybrid Technique for Multi-Noise Removal from Grayscale Medical Images. CoRR abs/2005.05371 (2020)
2010 – 2019
- 2019
- [j8]Donia Gamal
, Marco Alfonse, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Analysis of Machine Learning Algorithms for Opinion Mining in Different Domains. Mach. Learn. Knowl. Extr. 1(1): 224-234 (2019) - [c7]Aya A. Salah Farrag, Safia Abbas Mohamad, El-Sayed M. El-Horbaty:
Swarm Optimization for Solving Load Balancing in Cloud Computing. AMLTA 2019: 102-113 - 2018
- [j7]Amr S. Abdelfattah, Tamer Abdelkader
, El-Sayed M. El-Horbaty:
RSAM: An enhanced architecture for achieving web services reliability in mobile cloud computing. J. King Saud Univ. Comput. Inf. Sci. 30(2): 164-174 (2018) - [c6]Nora Youssef, Alsayed Algergawy, Ibrahim F. Moawad, El-Sayed M. El-Horbaty:
Combined Features for Content Based Image Retrieval: A Comparative Study. AISI 2018: 634-643 - 2016
- [p1]Omer K. Jasim Mohammad
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Ciphering of Cloud Computing Environment Based New Intelligent Quantum Service. New Approaches in Intelligent Control 2016: 241-272 - 2015
- [i7]Gamal Abd El-Nasser A. Said
, El-Sayed M. El-Horbaty:
A Simulation Modeling Approach for Optimization of Storage Space Allocation in Container Terminal. CoRR abs/1501.06802 (2015) - [i6]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm. CoRR abs/1503.04796 (2015) - [i5]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Innovative Method for enhancing Key generation and management in the AES-algorithm. CoRR abs/1504.03406 (2015) - 2014
- [j6]Omer K. Jasim Mohammad
, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Cryptographic Cloud Computing Environment as a More Trusted Communication Environment. Int. J. Grid High Perform. Comput. 6(2): 38-51 (2014) - [c5]Omer K. Jasim Mohammad
, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Statistical analysis for random bits generation on quantum key distribution. CyberSec 2014: 45-51 - [c4]Omer K. Jasim Mohammad
, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Advanced encryption standard development based quantum key distribution. ICITST 2014: 402-408 - [i4]Gamal Abd El-Nasser A. Said
, Abeer M. Mahmoud
, El-Sayed M. El-Horbaty:
A Comparative Study of Meta-heuristic Algorithms for Solving Quadratic Assignment Problem. CoRR abs/1407.4863 (2014) - [i3]Gamal Abd El-Nasser A. Said
, Abeer M. Mahmoud, El-Sayed M. El-Horbaty:
Simulation and optimization of container terminal operations: a case study. CoRR abs/1407.6257 (2014) - [i2]Gamal Abd El-Nasser A. Said
, Abeer M. Mahmoud
, El-Sayed M. El-Horbaty:
Solving container terminals problems using computer-based modeling. CoRR abs/1407.6384 (2014) - [i1]Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A New Trend of Pseudo Random Number Generation using QKD. CoRR abs/1411.2469 (2014) - 2013
- [c3]Omer K. Jasim Mohammad
, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
A comparative study between modern encryption algorithms based on cloud computing environment. ICITST 2013: 531-535 - 2012
- [c2]Nermine N. Sophoclis, Mohammad Abdeen, El-Sayed M. El-Horbaty, Mustapha C. E. Yagoub:
A novel approach for indexing Arabic documents through GPU computing. CCECE 2012: 1-4
2000 – 2009
- 2003
- [c1]Hussam H. Abuazab, El-Sayed M. El-Horbaty:
An Approach on Database Index Schemes. IKE 2003: 581-590 - 2002
- [j5]I. A. Ismail, El-Sayed M. El-Horbaty, M. A. Ashabrawy:
Autoregressive Filter Algorithm for Sifting Digital Images. Int. J. Comput. Their Appl. 9(4): 200-204 (2002) - 2000
- [j4]El-Sayed M. El-Horbaty:
A Linear Time Parallel Algorithm for the 2-CNF Satisfiability Problem. Egypt. Comput. Sci. J. 22(1) (2000) - [j3]El-Sayed M. El-Horbaty, I. A. Ismail:
Autoregressive Filter Algorithm for Sifting Digital Images. Egypt. Comput. Sci. J. 22(1) (2000) - [j2]Suliman M. Mohamed, Henry O. Nyongesa, El-Sayed M. El-Horbaty:
A Learning Pattern Recognition Algorithm Using Fuzzy Self-Organizing Map Network. Egypt. Comput. Sci. J. 22(1) (2000)
1990 – 1999
- 1992
- [j1]El-Sayed M. El-Horbaty, A. El-Din H. Mohamed:
A synchronous algorithm for shortest paths on a tree machine. Parallel Comput. 18(1): 103-107 (1992)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint