


default search action
Youssef B. Mahdy
Person information
- affiliation: Assiut University, Egypt
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j11]Ibrahim Saad Aly Abdelhalim, Mamdouh Farouk Mohamed, Youssef Bassyouni Mahdy:
Data augmentation for skin lesion using self-attention based progressive generative adversarial network. Expert Syst. Appl. 165: 113922 (2021) - [j10]Tarek Hagras
, Asmaa Atef, Yousef B. Mahdy:
Greening Duplication-Based Dependent-Tasks Scheduling on Heterogeneous Large-Scale Computing Platforms. J. Grid Comput. 19(1): 13 (2021) - 2019
- [j9]Tarek Hagras
, Asmaa Atef, Yousef B. Mahdy:
Lower-bound time-complexity greening mechanism for duplication-based scheduling on large-scale computing platforms. J. Supercomput. 75(12): 8147-8167 (2019) - 2018
- [j8]Amr Magdy Rabee, Marghny Hassan Mohamed, Yousef B. Mahdy:
Blind JPEG steganalysis based on DCT coefficients differences. Multim. Tools Appl. 77(6): 7763-7777 (2018) - 2017
- [j7]Asmaa Atef, Tarek Hagras
, Yousef B. Mahdy, Jan Janecek:
Lower-bound complexity algorithm for task scheduling on heterogeneous grid. Computing 99(11): 1125-1145 (2017) - 2016
- [j6]Ahmed Hosny Ibrahim, Hossam El Deen Mostafa Faheem, Youssef Bassyouni Mahdy, Abdel-Rahman Hedar:
Resource allocation algorithm for GPUs in a private cloud. Int. J. Cloud Comput. 5(1/2): 45-56 (2016) - [j5]Hisham Shehata Galal
, Youssef Bassyouni Mahdy
, Mohammed Ali Atiea:
Behavior-based features model for malware detection. J. Comput. Virol. Hacking Tech. 12(2): 59-67 (2016) - 2015
- [j4]Abdelrahman Kamel, Youssef B. Mahdy, Khaled F. Hussain
:
Multi-Bin search: improved large-scale content-based image retrieval. Int. J. Multim. Inf. Retr. 4(3): 205-216 (2015) - 2008
- [j3]M. Hassaballah
, Saleh Omran, Youssef B. Mahdy
:
A Review of SIMD Multimedia Extensions and their Usage in Scientific and Engineering Applications. Comput. J. 51(6): 630-649 (2008) - 2005
- [j2]Youssef B. Mahdy
, Ahmed Younes, Mostafa A. Soliman, M. H. Abdellha:
A modified algorithm for computing the upper-bound reliabilty of computer networks. Appl. Math. Comput. 160(2): 523-538 (2005) - 1999
- [j1]Mohammed Zaki, Youssef B. Mahdy
, Samia A. Ali, K. F. El-Reefy:
Two practical systems for classification of three-dimensional objects. J. Syst. Softw. 48(1): 59-71 (1999)
Conference and Workshop Papers
- 2023
- [c6]Aya Mahmoud Ahmed, Mohamed Yousef, Khaled F. Hussain, Youssef Bassyouni Mahdy:
Can we integrate color and depth information for richer captions? NILES 2023: 179-183 - 2013
- [c5]Abdelrahman Kamel, Youssef B. Mahdy, Khaled F. Hussain
:
Multi-bin search: Improved large-scale content-based image retrieval. ICIP 2013: 2597-2601 - 2012
- [c4]Mohammed H. Afif
, Abdel-Rahman Hedar
, Taysir H. Abdel Hamid, Yousef B. Mahdy
:
Support Vector Machines with Weighted Powered Kernels for Data Classification. AMLTA 2012: 369-378 - 1999
- [c3]Yousef B. Mahdy, Samia A. Ali, Khaled M. Shaaban:
A fast scheme and implementation for n-bit squarer. ICECS 1999: 25-28 - [c2]Yousef B. Mahdy
, Samia A. Ali, Khaled M. Shaaban:
Algorithm and two efficient implementations for complex multiplier. ICECS 1999: 949-952 - [c1]Samia A. Ali, Yousef B. Mahdy
, Hassan A. Hassan:
An efficient algorithm-based fault detection and recovery on multiprocessor systems. ICECS 1999: 1093-1096
Parts in Books or Collections
- 2009
- [p1]Mahmoud Hassaballah
, M. M. Makky, Youssef B. Mahdy:
A Fast Fractal Image Compression Method Based on Entropy. Progress in Computer Vision and Image Analysis 2009: 137-152
Informal and Other Publications
- 2023
- [i3]Aya Mahmoud Ahmed, Mohamed Yousef, Khaled F. Hussain, Youssef Bassyouni Mahdy:
Enhancing image captioning with depth information using a Transformer-based framework. CoRR abs/2308.03767 (2023) - 2019
- [i2]Ibrahim Saad Ali, Mamdouh Farouk Mohamed, Youssef Bassyouni Mahdy:
Data Augmentation for Skin Lesion using Self-Attention based Progressive Generative Adversarial Network. CoRR abs/1910.11960 (2019) - 2015
- [i1]Marghny H. Mohamed, Yousef B. Mahdy, Wafaa Abd El-Wahed Shaban:
Confidential Algorithm for Golden Cryptography Using Haar Wavelet. CoRR abs/1501.03617 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint