Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building an Integrator for Software Components., , , and . Egypt. Comput. Sci. J., (2005)Resilient Countermeasures Against Cyber-Attacks on Self-Driving Car Architecture., , , , , and . IEEE Trans. Intell. Transp. Syst., 24 (11): 11514-11543 (November 2023)Towards Building an Arabic Plagiarism Detection System: Plagiarism Detection in Arabic., , and . Int. J. Inf. Retr. Res., 9 (3): 12-22 (2019)A fedearted E-learning cloud system based on mixed reality., , , , , and . AICCSA, page 1-5. IEEE Computer Society, (2016)A Secure Lightweight Mutual Authentication and Message Exchange Protocol for IoT Environments Based on the Existence of Active Server., , , , , and . ICICT (1), volume 1041 of Advances in Intelligent Systems and Computing, page 375-384. Springer, (2019)LSHADE with semi-parameter adaptation hybrid with CMA-ES for solving CEC 2017 benchmark problems., , , and . CEC, page 145-152. IEEE, (2017)Language identification in document analysis (LIDA)., , and . Circuits, Signals, and Systems, page 278-283. IASTED/ACTA Press, (2004)An enhanced technique for image steganography using 2-levels PVD., and . SIP, page 202-206. IASTED/ACTA Press, (2007)Towards Authorship Attribution in Arabic Short-Microblog Text., , , and . IEEE Access, (2021)Using Agent Technology for Recognizing Arabic Handwriting Words as A phase of Document Analysis.. Egypt. Comput. Sci. J., (2005)