default search action
Ahmed Emam
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Ahmed Emam, Mohamed M. Farag, Ribana Roscher:
Confident Naturalness Explanation (CNE): A Framework to Explain and Assess Patterns Forming Naturalness. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j14]Ahmed Emam, Timo T. Stomberg, Ribana Roscher:
Leveraging Activation Maximization and Generative Adversarial Training to Recognize and Explain Patterns in Natural Areas in Satellite Imagery. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j13]Saeed Mohsen, Anas M. Ali, Ahmed Emam:
Automatic modulation recognition using CNN deep learning models. Multim. Tools Appl. 83(3): 7035-7056 (2024) - 2023
- [j12]Ahmed Taleb Mohamed, Ahdab El-Morshedy, Elsayed Tag-Eldin, Ahmed Emam, Mohamed Mahmoud Samy:
Increasing Transmitted Power With Cost Mitigation via Modified EHV Power Lines in Egyptian Grid. IEEE Access 11: 21554-21561 (2023) - [j11]Radwa A. Roshdy, Mostafa H. Dahshan, Salman A. AlQahtani, Ahmed Emam, Hossam M. Kasem, Mohammed A. Salem:
Methods for Simplifying Quasi-Deterministic Millimeter-Wave Channel Models. IEEE Access 11: 34529-34543 (2023) - [j10]Amin S. Ibrahim, Ahmed M. Abbas, Ashraf Mohamed Ali Hassan, Wael M. F. Abdel-Rehim, Ahmed Emam, Saeed Mohsen:
Design and Implementation of a Pilot Model for IoT Smart Home Networks. IEEE Access 11: 59701-59728 (2023) - [i2]Ahmed Emam, Timo T. Stomberg, Ribana Roscher:
Leveraging Activation Maximization and Generative Adversarial Training to Recognize and Explain Patterns in Natural Areas in Satellite Imagery. CoRR abs/2311.08923 (2023) - [i1]Ahmed Emam, Mohamed M. Farag, Ribana Roscher:
Confident Naturalness Explanation (CNE): A Framework to Explain and Assess Patterns Forming Naturalness. CoRR abs/2311.08936 (2023) - 2021
- [j9]Mohamed H. Elmashtoly, Hussein I. Anis, Ahmed Emam:
Mitigating Hazardous Potentials Near Pipelines Using Passive Grounding Grids. IEEE Access 9: 121957-121963 (2021)
2010 – 2019
- 2019
- [j8]Alaa Awad Abdellatif, Ahmed Emam, Carla-Fabiana Chiasserini, Amr Mohamed, Ali Jaoua, Rabab Ward:
Edge-based compression and classification for smart healthcare systems: Concept, implementation and evaluation. Expert Syst. Appl. 117: 1-14 (2019) - [j7]Ahmed Saber, Ahmed Emam, Hany Elghazaly:
Wide-Area Backup Protection Scheme for Transmission Lines Considering Cross-Country and Evolving Faults. IEEE Syst. J. 13(1): 813-822 (2019) - [c9]Ahmed Emam, Alaa Awad Abdellatif, Amr Mohamed, Khaled A. Harras:
EdgeHealth: An Energy-Efficient Edge-based Remote mHealth Monitoring System. WCNC 2019: 1-7 - 2018
- [j6]Ahmed Saber, Ahmed Emam, Hany Elghazaly:
A Backup Protection Technique for Three-Terminal Multisection Compound Transmission Lines. IEEE Trans. Smart Grid 9(6): 5653-5663 (2018) - [c8]Ahmed Emam, Abderrahmen Mtibaa, Khaled A. Harras:
Message in a Bottle: Extending Communication Coverage Via Boat-to-Boat WiFi Communication. CHANTS@MOBICOM 2018: 63-69 - 2017
- [c7]Ahmed Emam, Abderrahmen Mtibaa, Khaled A. Harras, Amr Mohamed:
Adaptive forwarding of mHealth data in challenged networks. Healthcom 2017: 1-7 - [c6]Abderrahmen Mtibaa, Ahmed Emam, Sannan Tariq, Aliaa Essameldin, Khaled A. Harras:
On practical device-to-device wireless communication: A measurement driven study. IWCMC 2017: 409-414 - [c5]Ahmed Emam, Abderrahmen Mtibaa, Khaled A. Harras, Amr Mohamed:
On the shortcoming of DTN solutions in rural mHealth applications. IWCMC 2017: 1502-1507 - [c4]Abderrahmen Mtibaa, Ahmed Emam, Khaled A. Harras:
On practical multihop wireless communication: Insights, limitations, and solutions. WiMob 2017: 1-8 - 2012
- [j5]Ahmed Emam:
Robust Real Time Drowsy Eye Detection System. Int. J. Comput. Their Appl. 19(4): 224-231 (2012)
2000 – 2009
- 2009
- [c3]Ahmed Emam:
Future direction of incremental association rules mining. ACM Southeast Regional Conference 2009 - [c2]Ahmed Emam, Gyuchoon Cho:
Real Time Driver Drowsy Eye System. ESA 2009: 287-293 - [c1]Ahmed Emam, Ahmed Agha:
Framework for Documents Mining Using XML as Preprocessing. IKE 2009: 632-639
1970 – 1979
- 1979
- [j4]Stanley Y. W. Su, Le Huu Nguyen, Ahmed Emam, G. Jack Lipovski:
The Architectural Features and Implementation Techniques of the Multicell CASSM. IEEE Trans. Computers 28(6): 430-445 (1979) - 1978
- [j3]Stanley Y. W. Su, Ahmed Emam:
CASDAL: CASSM'a DAta Language. ACM Trans. Database Syst. 3(1): 57-91 (1978) - 1976
- [j2]S. J. Ackerman, Ahmed Emam, G. Jack Lipovski, Stanley Y. W. Su:
Implementation of a Context-Addressed Pipeline3 SIMD Architecture - Abstract. SIGIR Forum 10(4): 27-28 (1976) - [j1]Ahmed Emam, Stanley Y. W. Su, G. Jack Lipovski:
Software Aspects of the CASSM System - Abstract. SIGIR Forum 10(4): 29-31 (1976)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint