default search action
Said Fathy El-Zoghdy
Person information
- affiliation: Taif University, Saudi Arabia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Islam R. Kamal, Saied M. Abd El-atty, S. F. El-Zoghdy, Randa F. Soliman:
Internet of Bio-NanoThings privacy: securing a multi compartmental targeted cancer drug delivery scheme. Multim. Tools Appl. 83(33): 79235-79258 (2024) - 2021
- [j12]Osama S. Faragallah, Hala S. El-sayed, Ashraf Afifi, S. F. El-Zoghdy:
Small Details Gray Scale Image Encryption Using RC6 Block Cipher. Wirel. Pers. Commun. 118(2): 1559-1589 (2021) - 2020
- [j11]S. F. El-Zoghdy, Hala S. El-sayed, Osama S. Faragallah:
Transmission of Chaotic-based Encrypted Audio Through OFDM. Wirel. Pers. Commun. 113(1): 241-261 (2020)
2010 – 2019
- 2017
- [j10]S. F. El-Zoghdy, Ahmed Ghoneim:
New selection based model for filtering heterogeneous distributed computing systems based on quality of services criteria and load balancing polices. J. High Speed Networks 23(4): 271-286 (2017) - [j9]Hassan I. Ahmed, Nawal A. Elfeshawy, Said Fathy El-Zoghdy, Hala S. El-sayed, Osama S. Faragallah:
A Neural Network-Based Learning Algorithm for Intrusion Detection Systems. Wirel. Pers. Commun. 97(2): 3097-3112 (2017) - 2016
- [j8]Said Fathy El-Zoghdy, Ahmed Ghoneim:
A Multi-Class Task Scheduling Strategy for Heterogeneous Distributed Computing Systems. KSII Trans. Internet Inf. Syst. 10(1): 117-135 (2016) - [j7]Fatma Elgendy, Amany M. Sarhan, Tarek E. Eltobely, Said Fathy El-Zoghdy, Hala S. El-sayed, Osama S. Faragallah:
Chaos-based model for encryption and decryption of digital images. Multim. Tools Appl. 75(18): 11529-11553 (2016) - [j6]Osama S. Faragallah, S. F. El-Zoghdy:
Improved Hierarchical Key Management Scheme (IHKMS) with Three Phase Technique for Ad-Hoc Networks. Wirel. Pers. Commun. 91(3): 1297-1319 (2016) - 2015
- [j5]Elsayed M. Elshamy, El-Sayed M. El-Rabaie, Osama S. Faragallah, Osama A. Elshakankiry, Fathi E. Abd El-Samie, Hala S. El-sayed, Said Fathy El-Zoghdy:
Efficient audio cryptosystem based on chaotic maps and double random phase encoding. Int. J. Speech Technol. 18(4): 619-631 (2015) - [j4]Said Fathy El-Zoghdy, Alaa I. El-Nashar:
A threshold-based load balancing algorithm for grid computing systems. J. High Speed Networks 21(4): 237-257 (2015) - 2012
- [c3]Said Fathy El-Zoghdy, Sultan Aljahdali:
A two-level load balancing policy for grid computing. ICMCS 2012: 617-622 - 2011
- [j3]Imane Aly Saroit, Said Fathy El-Zoghdy, Mostafa Matar:
A Scalable and Distributed Security Protocol for Multicast Communications. Int. J. Netw. Secur. 12(2): 61-74 (2011) - [j2]Said Fathy El-Zoghdy, Yasser Mohammed Asem:
Secure group re-keying using key inverses. J. High Speed Networks 18(1): 47-68 (2011)
2000 – 2009
- 2006
- [j1]Said Fathy El-Zoghdy, Hisao Kameda, Jie Li:
Numerical studies on a paradox for non-cooperative static load balancing in distributed computer systems. Comput. Oper. Res. 33: 345-355 (2006) - [c2]Said Fathy El-Zoghdy:
Studies on Braess-like Paradoxes for Non-Cooperative Dynamic Load Balancing in Distributed Computer Systems. Parallel and Distributed Computing and Networks 2006: 238-243 - 2000
- [c1]Hisao Kameda, Said Fathy El-Zoghdy, Inhwan Ryu, Jie Li:
A performance comparison of dynamic vs. static load balancing policies in a mainframe-personal computer network model. CDC 2000: 1415-1420
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint