default search action
Ashraf El-Sisi
Person information
- affiliation: Menofia University, Al Minufya, Egypt
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c16]Wesam Yehia, Mahmoud Hussein, Ashraf El-Sisi:
An Ensemble Approach for Improving Short-term Electrical Load Forecasting. ICCTA 2022: 51-56 - 2020
- [j12]Mohamed G. Malhat, Mohamed El-Menshawy, Hamdy M. Mousa, Ashraf El-Sisi:
A new approach for instance selection: Algorithms, evaluation, and comparisons. Expert Syst. Appl. 149: 113297 (2020)
2010 – 2019
- 2018
- [j11]Amira Abdelatey, Mohamed Elkawkagy, Ashraf El-Sisi, Arabi Keshk:
Web Service Security Policy Matching Based on Semantics. Int. Arab. J. e Technol. 5(1): 12-19 (2018) - 2017
- [j10]Hamada M. Zahera, Ashraf Bahgat El-Sisi:
Accelerating Training Process in Logistic Regression Model using OpenCL Framework. Int. J. Grid High Perform. Comput. 9(3): 34-45 (2017) - 2016
- [c15]Amira Abdelatey, Mohamed Elkawkagy, Ashraf El-Sisi, Arabi Keshk:
A Multilateral Agent-Based Service Level Agreement Negotiation Framework. AISI 2016: 576-586 - [c14]Amira Abdelatey, Mohamed Elkawkagy, Ashraf El-Sisi, Arabi Keshk:
A Repaired Genetic Algorithm Based Approach for Web Service Security Negotiation. ICCTA 2016: 86-91 - [c13]Shymaa Sobhy, Mahmoud Hussein, Ashraf B. Elsisi:
Event-driven Modeling Test Case Generation with Holistic View for Multilevel Services Composition. ICCTA 2016: 92-97 - 2015
- [j9]Medhat A. Tawfeek, Ashraf El-Sisi, Arabi Keshk, Fawzy A. Torkey:
Cloud task scheduling based on ant colony optimization. Int. Arab J. Inf. Technol. 12(2): 129-137 (2015) - [c12]Roqyiah M. Abdeen, Ahmed Afifi, Ashraf B. Elsisi:
Improved Arabic handwriting word segmentation approach using Random Forests. AICCSA 2015: 1-8 - [c11]Shimaa Saber, Ali Ahmed, Ashraf B. Elsisi, Mohy Hadhoud:
Performance Evaluation of Arabic Optical Character Recognition Engines for Noisy Inputs. AISI 2015: 449-459 - [c10]Roqyiah M. Abdeen, Ahmed Afifi, Ashraf B. Elsisi:
An Enhanced Technique for Offline Arabic Handwritten Words Segmentation. CICLing (2) 2015: 663-681 - [c9]Hamada M. Zahera, Ashraf B. Elsisi:
Accelerated Parallel Training of Logistic Regression using OpenCL. ICCTA 2015: 113-117 - [c8]Ahmed M. AbdelSalam, Ashraf B. El-Sisi, Vamshi Reddy K:
Mitigating ARP Spoofing Attacks in Software-Defined Networks. ICCTA 2015: 126-131 - 2014
- [j8]Ashraf El-Sisi, Hamdy M. Mousa:
Argumentation Based Negotiation in Multi-agent System. Int. Arab. J. e Technol. 3(3): 155-162 (2014) - [c7]Medhat A. Tawfeek, Ashraf El-Sisi, Arabi Keshk, Fawzy A. Torkey:
Virtual Machine Placement Based on Ant Colony Optimization for Minimizing Resource Wastage. AMLTA 2014: 153-164 - [c6]Mohamed G. Malhat, Hamdy M. Mousa, Ashraf El-Sisi:
Parallel Ward Clustering for Chemical Compounds Using MapReduce. AMLTA 2014: 258-267 - 2013
- [j7]Khaled A. Al-Sheshtawi, Hatem Mohamed Abdul-kader, Ashraf B. Elsisi:
A novel artificial immune clonal selection classification and rule mining with swarm learning model. Connect. Sci. 25(2-3): 75-127 (2013) - 2012
- [j6]Ashraf El-Sisi, Hamdy M. Mousa:
Evaluation of Encryption Algorithms for Privacy Preserving Association Rules Mining. Int. J. Netw. Secur. 14(5): 289-296 (2012) - 2011
- [j5]Ashraf El-Sisi:
Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter. Int. Arab J. Inf. Technol. 8(4): 355-363 (2011) - [j4]Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail:
Privacy preserving association rules mining on distributed homogenous databases. Int. J. Data Min. Model. Manag. 3(2): 172-188 (2011) - 2010
- [j3]Ashraf El-Sisi:
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database. Int. Arab J. Inf. Technol. 7(2): 152-160 (2010) - [j2]Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail:
Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves. Int. J. Netw. Secur. 11(3): 155-162 (2010)
2000 – 2009
- 2009
- [c5]Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail:
FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191). ISA 2009: 619-634 - 2008
- [c4]Ashraf El-Sisi, Sameh M. Shohdy, Nabil A. Ismail:
Reconfigurable Implementation of Karatsuba Multiplier for Galois Field in Elliptic Curves. TeNe 2008: 87-92 - [c3]Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail:
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base. DMIN 2008: 513-519 - [c2]Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail:
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base. KES (2) 2008: 607-616 - [c1]Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail:
Performance Tuning of Steganography Algorithm for Privacy Preserving Association Rule Mining in Heterogeneous Data Base. NTMS 2008: 1-6 - 2007
- [j1]Walaa H. Al-Ashmaway, Ashraf El-Sisi, Hamed M. Nassar, Nabil A. Ismail:
Bilateral Agent Negotiation for E-Commerce Based On Fuzzy Logic. Egypt. Comput. Sci. J. 29(3) (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint