متابعة
Yasmine Abouelseoud
Yasmine Abouelseoud
Full Professor
بريد إلكتروني تم التحقق منه على alexu.edu.eg
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Optimal capacitor placement and sizing in radial electric power systems
A Elsheikh, Y Helmy, Y Abouelseoud, A Elsherif
Alexandria Engineering Journal 53 (4), 809-816, 2014
1262014
A heuristics-based solution to the continuous berth allocation and crane assignment problem
MH Elwany, I Ali, Y Abouelseoud
Alexandria Engineering Journal 52 (4), 671-677, 2013
502013
Efficient spam and phishing emails filtering based on deep learning
S Magdy, Y Abouelseoud, M Mikhail
Computer Networks 206, 108826, 2022
392022
An optimized hybrid approach for spectrum handoff in cognitive radio networks with non-identical channels
AF Tayel, SI Rabia, Y Abouelseoud
IEEE transactions on communications 64 (11), 4487-4496, 2016
342016
Improved DV-Hop based on Squirrel search algorithm for localization in wireless sensor networks
MG Abd El Ghafour, SH Kamel, Y Abouelseoud
Wireless Networks 27, 2743-2759, 2021
332021
Two-phase image encryption scheme based on FFCT and fractals
M Mikhail, Y Abouelseoud, G ElKobrosy
Security and Communication Networks 2017, 2017
272017
MIDSCYK: An efficient provably secure multi-recipient identity-based signcryption scheme
H Elkamchouchi, Y Abouelseoud
2009 International Conference on Networking and Media Convergence, 70-75, 2009
232009
A new proxy identity-based signcryption scheme for partial delegation of signing rights
H Elkamchouchi, Y Abouelseoud
Cryptology ePrint Archive, 2008
232008
New video encryption schemes based on chaotic maps
H Elkamchouchi, WM Salama, Y Abouelseoud
IET Image Processing 14 (2), 397-406, 2020
212020
A new blind identity-based signature scheme with message recovery
H Elkamchouchi, Y Abouelseoud
Cryptology ePrint Archive, 2008
21*2008
Extension and application of El-Gamal encryption scheme
M Mikhail, Y Abouelseoud, G Elkobrosy
2014 World Congress on Computer Applications and Information Systems (WCCAIS …, 2014
202014
An efficient proxy signcryption scheme based on the discrete logarithm problem
HM Elkamchouchi, EFA Elkhair, Y Abouelseoud
International Journal of Information Technology, Modeling and Computing 1 (2 …, 2013
142013
Optimal Power Flow and Reactive Compensation Using a Particle Swarm Optimization Algorithm.
A Elsheikh, Y Helmy, Y Abouelseoud, A Elsherif
Journal of Electrical Systems 10 (1), 2014
132014
Optimal placement and settings of FACTS devices for reactive power compensation using a Firefly algorithm
A El-Sherif, G Elkobrosy, Y Abouelseoud, Y Helmy
2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 1-5, 2019
122019
Data hiding in a digital cover image using chaotic maps and LSB technique
H Elkamchouchi, WM Salama, Y Abouelseoud
2017 12th International Conference on Computer Engineering and Systems …, 2017
112017
Deep learning-based spam image filtering
WM Salama, MH Aly, Y Abouelseoud
Alexandria Engineering Journal 68, 461-468, 2023
102023
Privacy preserving search index for image databases based on SURF and order preserving encryption
S Magdy, Y Abouelseoud, M Mikhail
IET Image Processing 14 (5), 874-881, 2020
92020
Innovative approximate analytical solution for standard model of viral dynamics: hepatitis C with direct-acting agents as an implemented case
HA Elkaranshawy, HM Ezzat, Y Abouelseoud, NN Ibrahim
Mathematical Problems in Engineering 2019, 2019
92019
A mixed integer linear programming approach to electrical stimulation optimization problems
G Abouelseoud, Y Abouelseoud, A Shoukry, N Ismail, J Mekky
IEEE Transactions on Neural Systems and Rehabilitation Engineering 26 (2 …, 2018
92018
A secure geographical routing protocol for highly-dynamic aeronautical networks
A Swidan, S Khattab, Y Abouelseoud, H Elkamchouchi
MILCOM 2015-2015 IEEE Military Communications Conference, 708-713, 2015
92015
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20