default search action
Mohammed Zaki 0001
Person information
- affiliation: Al-Azhar University, Department of Computer Engineering, Cairo, Egypt
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j37]Tarek M. Salem, Salah Abdel-Mageid, Sherine M. Abd El-Kader, Mohammed Zaki:
ICSSSS: An intelligent channel selection scheme for cognitive radio ad hoc networks using a self organized map followed by simple segregation. Pervasive Mob. Comput. 39: 195-213 (2017) - 2016
- [j36]Tarek S. Sobh, Ashraf Elgohary, Mohammed Zaki:
Evaluation of ASHFIK as Core-Based Routing Protocol for Critical MANETs. Wirel. Pers. Commun. 87(4): 1191-1208 (2016) - 2015
- [j35]Tarek M. Salem, Salah Abdel-Mageid, Sherine M. Abd El-Kader, Mohammed Zaki:
A quality of service distributed optimizer for Cognitive Radio Sensor Networks. Pervasive Mob. Comput. 22: 71-89 (2015) - [i1]Tamer M. Abo Neama, Ismail A. Ismail, Tarek S. Sobh, Mohammed Zaki:
Design of a Framework to Facilitate Decisions Using Information Fusion. CoRR abs/1502.05040 (2015) - 2014
- [j34]Tamer M. Abo Neama, Ismail A. Ismail, Tarek S. Sobh, Mohammed Zaki:
IFPDM: a framework to integrate information fusion and probabilistic decision making. Int. J. Inf. Decis. Sci. 6(3): 226-247 (2014) - [j33]Tarek M. I. El-Sakka, Mohammed Zaki:
Using Predicate-based Model Checker for Verifying E-Commerce Protocols. Int. J. Netw. Secur. 16(2): 90-101 (2014) - [j32]Ashraf Elgohary, Tarek S. Sobh, Sayed A. Nouh, Mohammed Zaki:
An efficient and dependable protocol for critical MANETs. J. High Speed Networks 20(3): 153-168 (2014) - 2013
- [j31]Ashraf Al-Marakeby, Fumitaka Kimura, Mohammed Zaki, Ali Mahmoud Rashid:
Design of an Embedded Arabic Optical Character Recognition. J. Signal Process. Syst. 70(3): 249-258 (2013) - 2012
- [j30]Salah Abdel-Mageid, Mohammed Zaki:
A Best Fit Relocation Approach for Heterogeneous Sensor Networks. Wirel. Pers. Commun. 65(4): 733-751 (2012) - 2010
- [j29]Mohammed Zaki, A. A. Hamouda:
Design of a multi_agent system for worm spreading_reduction. J. Intell. Inf. Syst. 35(1): 123-155 (2010)
2000 – 2009
- 2009
- [j28]Mohammed Zaki, M. Sayed:
The use of genetic programming for adaptive text compression. Int. J. Inf. Coding Theory 1(1): 88-108 (2009) - [j27]Mohammed Zaki, M. Youssef:
TNRAC: a system for tracking multiple moving non-rigid objects using an active camera. Signal Image Video Process. 3(2): 145-155 (2009) - 2008
- [j26]Tarek S. Sobh, Ashraf Elgohary, Mohammed Zaki:
Performance Improvements on the Network Level Security Protocols. Int. J. Netw. Secur. 6(1): 103-115 (2008) - 2006
- [j25]Ashraf Elgohary, Tarek S. Sobh, Mohammed Zaki:
Design of an enhancement for SSL/TLS protocols. Comput. Secur. 25(4): 297-306 (2006) - 2005
- [j24]Mohammed Zaki, Tarek S. Sobh:
NCDS: data mining for discovering interesting network characteristics. Inf. Softw. Technol. 47(3): 189-198 (2005) - [j23]Mohammed Zaki, Tarek S. Sobh:
Attack abstraction using a multiagent system for intrusion detection. J. Intell. Fuzzy Syst. 16(2): 141-150 (2005) - 2004
- [j22]Mohammed Zaki, Tarek S. Sobh:
A cooperative agent-based model for active security systems. J. Netw. Comput. Appl. 27(4): 201-220 (2004) - [j21]Mohammed Zaki, M. Y. El Nahas, M. Youssef:
EMBOT: An enhanced motion-based object tracker. J. Syst. Softw. 69(1-2): 149-158 (2004) - 2003
- [j20]Mohammed Zaki, M. G. Darwish, G. Osman:
GBF: a grammar based filter for Internet applications. J. Netw. Comput. Appl. 26(3): 229-257 (2003) - 2002
- [j19]Mohammed Zaki, M. M. Abulwafa:
The use of invariant features for object recognition from a single image. J. Intell. Fuzzy Syst. 12(2): 79-95 (2002) - [c1]G. Osman, M. G. Darwish, Mohammed Zaki:
Formal Design of Packet Filtering Systems. SEC 2002: 299-310 - 2001
- [j18]Mohammed Zaki, Hany M. Harb, Tarek S. Sobh:
A learning database system to observe malfunctions and to support network planning. J. Syst. Softw. 58(1): 33-46 (2001) - 2000
- [j17]Mohammed Zaki, Abdallah El-Ramsisi, Rostom Omran:
A soft computing approach for accurate interpretation of occluded shapes. J. Intell. Fuzzy Syst. 9(1-2): 85-99 (2000) - [j16]Mohammed Zaki, Abdallah El-Ramsisi, Rostom Omran:
A soft computing approach for recognition of occluded shapes. J. Syst. Softw. 51(1): 73-83 (2000) - [j15]Mohammed Zaki, Abdallah El-Ramsisi, Rostom Omran:
A genetic aggregate stereo algorithm for 3-D classification of occluded shapes. Pattern Recognit. Lett. 21(5): 349-363 (2000)
1990 – 1999
- 1999
- [j14]Mohammed Zaki, Youssef B. Mahdy, Samia A. Ali, K. F. El-Reefy:
Two practical systems for classification of three-dimensional objects. J. Syst. Softw. 48(1): 59-71 (1999) - [j13]Mohamad M. Eassa, Fathy E. Eassa, Mohammed Zaki:
A Reliability and Performance Model For Static Data Flow Machines. Simul. 73(2): 100-110 (1999) - 1997
- [j12]M. G. El-Said, G. Fischer, S. A. Gamalel-Din, Mohammed Zaki:
ADDI: a tool for automating the design of visual interfaces. Comput. Graph. 21(1): 79-87 (1997) - 1993
- [j11]Mohammed Zaki, M. Y. El Nahas, H. A. Allam:
DPDP: An interactive debugger for parallel and distributed processing. J. Syst. Softw. 22(1): 45-61 (1993) - 1992
- [j10]F. Hashim, Serag El-Din Habib, Mohammed Zaki:
A PC knowledge-based environment for VLSI layout verification. J. Syst. Softw. 18(1): 19-31 (1992)
1980 – 1989
- 1988
- [j9]Mohammed Zaki, M. M. Elboraey:
Analysis of Reliability Models for Interconnecting MIMD Systems. Comput. J. 31(4): 304-312 (1988) - [j8]Mohammed Zaki:
Design of a Graphics Interface for Computer-Based Biomedical Applications. Comput. Lang. 13(3/4): 125-141 (1988) - [j7]Mohammed Zaki, M. M. Elboraey:
Analysis of reliability models for interconnecting MIMD systems. J. Syst. Softw. 8(2): 133-144 (1988) - [j6]Mohammed Zaki, R. Salama:
Linkage versus integration for binding data base and interactive graphics systems. J. Syst. Softw. 8(5): 361-372 (1988) - 1987
- [j5]Mohammed Zaki, Al. H. Albarhamtoshy:
A Formal Design of an Arabic Text Formatter for Microcomputers. Comput. Lang. 12(2): 123-143 (1987) - [j4]Mohammed Zaki, R. Salama:
Linkage versus integration for binding database and interactive graphics systems. Inf. Syst. 12(3): 271-280 (1987) - 1985
- [j3]Mohammed Zaki, S. A. Gamal-Eldin:
A Portable Syntax Analyzer for Microcomputers. Comput. Lang. 10(2): 127-146 (1985) - [j2]Mohammed Zaki, F. Elboraey:
Processing of inverted files in magnetic bubble memories. Inf. Process. Manag. 21(1): 51-74 (1985) - [j1]Mohammed Zaki, Samir M. Koriem:
A model for the protocol design of back-end storage networks. J. Syst. Softw. 5(4): 249-265 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint