Zobrazeno 1 - 10
of 83
pro vyhledávání: '"Emad E. Abdallah"'
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 12 (2016)
Several routing algorithms have been proposed for efficient routing in mobile ad hoc networks, most of them consider mobile nodes embedded in two-dimensional environments. However, in reality, these networks are embedded in three-dimensional environm
Externí odkaz:
https://doaj.org/article/fe9b95c3ad134233a63242785965438a
Autor:
Alaa E. Abdallah, Emad E. Abdallah
Publikováno v:
Procedia Computer Science. 220:429-435
Publikováno v:
Procedia Computer Science. 220:291-298
Publikováno v:
Procedia Computer Science. 220:307-314
Publikováno v:
Journal of Applied Security Research. :1-25
Publikováno v:
Procedia Computer Science. 201:205-212
Publikováno v:
International Journal of Business Analytics. 8:1-13
The gigantic growth of platforms that give individuals the ability to write a review that is visible to everyone and the huge number of documents shared on the internet have triggered the researchers to try to detect if these platforms are trying to
Publikováno v:
ANT/EDI40
The massive use of the social media and the huge number of messages that are shared on the internet, create a countless need to automatically detect the age and gender of the people who write these messages. Several sites and platforms attempt to mis
Publikováno v:
Journal of Applied Security Research. 15:185-198
We present a robust and unnoticeable secure image watermarking approach using Nonnegative Matrix Factorization (NMF) and Fast Walsh-Hadamard Transform (FWHT). The core idea of the proposed scheme c...
Autor:
Emad E. Abdallah, Nedal Tahat
Publikováno v:
Journal of Applied Security Research. 13:304-314
A new public authenticated encryption scheme based on chaotic maps and factoring problems is proposed. The chaos-based cryptosystem offers an encryption scheme with several advantages including sec...