default search action
Khaled Ahmed Nagaty
Person information
- affiliation: British University in Egypt, Cairo, Egypt
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j12]Madonna Fanoos, Abeer Hamdy, Khaled Ahmed Nagaty:
Bug Triage Automation Approaches: A Comparative Study. Int. J. Open Source Softw. Process. 13(1): 1-19 (2022) - 2019
- [j11]Katarzyna Bobkowska, Khaled Ahmed Nagaty, Marek Przyborski:
Incorporating iris, fingerprint and face biometric for fraud prevention in e-passports using fuzzy vault. IET Image Process. 13(13): 2516-2528 (2019) - 2017
- [j10]Samiha Marwan, Ahmed Shawish, Khaled Ahmed Nagaty:
Utilizing DNA Strands for Secured Data-Hiding with High Capacity. Int. J. Interact. Mob. Technol. 11(2): 88-98 (2017) - 2016
- [j9]Samiha Marwan, Ahmed Shawish, Khaled Ahmed Nagaty:
DNA-based cryptographic methods for data hiding in DNA media. Biosyst. 150: 110-118 (2016) - 2005
- [j8]Khaled Ahmed Nagaty, T. M. Nazmy, S. M. Talat, M. Ali:
An Efficient Distributed Watermarking Scheme z using Block Information Measure. Egypt. Comput. Sci. J. 27(3) (2005) - [j7]Khaled Ahmed Nagaty:
An adaptive hybrid energy-based fingerprint matching technique. Image Vis. Comput. 23(5): 491-500 (2005) - 2004
- [j6]Khaled Ahmed Nagaty:
An Energy-Based Fingerprint Matching System. Egypt. Comput. Sci. J. 26(1) (2004) - [j5]T. M. Nazmy, Khaled Ahmed Nagaty, Tarek F. Gharib, A. S. Abbass:
An Image Signature Based PCNN for Skilled Forgery Signature Detection. Egypt. Comput. Sci. J. 26(2) (2004) - 2003
- [j4]Abdel-Badeeh M. Salem, Emad Monica, Khaled Ahmed Nagaty:
New Techniques for Enhancement of SOM-Based Cluster Visualization. Egypt. Comput. Sci. J. 25(1) (2003) - [j3]Khaled Ahmed Nagaty:
On learning to estimate the block directional image of a fingerprint using a hierarchical neural network. Neural Networks 16(1): 133-144 (2003) - 2001
- [j2]Abdel-Badeeh M. Salem, Mohamed Roushdy, Khaled Ahmed Nagaty, Safia Abbas:
Rough sets Approach for Data Mining in Medicine. Egypt. Comput. Sci. J. 23(1) (2001) - [j1]Khaled Ahmed Nagaty:
Fingerprints classification using artificial neural networks: a combined structural and statistical approach. Neural Networks 14(9): 1293-1305 (2001)
Conference and Workshop Papers
- 2015
- [c5]Samiha Marwan, Ahmed Shawish, Khaled Ahmed Nagaty:
An Enhanced DNA-based Steganography Technique with a Higher Hiding Capacity. BIOINFORMATICS 2015: 150-157 - 2008
- [c4]Ahmed Salah El-Din Mohamed, Khaled Ahmed Nagaty, Taha ElArif:
An Enhanced Histogram Matching Approach Using the Retinal Filter's Compression Function for Illumination Normalization in Face Recognition. ICIAR 2008: 873-883 - 2004
- [c3]Khaled Ahmed Nagaty:
An energy-based fingerprint matching system. CCNC 2004: 706-709 - [c2]Khaled Ahmed Nagaty, Ezz Hattab:
An approach to a fingerprints multi-agent parallel matching system. SMC (5) 2004: 4750-4756 - 2003
- [c1]Abdel-Badeeh M. Salem, Khaled Ahmed Nagaty, Bassant El Bagoury:
A Hybrid Case-Based Adaptation Model for Thyroid Cancer Diagnosis. ICEIS (2) 2003: 58-65
Informal and Other Publications
- 2019
- [i3]Khaled Ahmed Nagaty:
Discrete Logarithmic Fuzzy Vault Scheme. CoRR abs/1905.07561 (2019) - [i2]Khaled Ahmed Nagaty:
A Fuzzy-Fuzzy Vault Scheme. CoRR abs/1906.03043 (2019) - [i1]Khaled Ahmed Nagaty:
Deep Fuzzy Systems. CoRR abs/1906.08222 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 22:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint