88 results on '"Abdallah, Emad E."'
Search Results
2. Identifying Intrusion Attempts on Connected and Autonomous Vehicles: A Survey
3. Deep Learning for Accurate Detection of Brute Force attacks on IoT Networks
4. Deep Learning Framework for Advanced De-Identification of Protected Health Information.
5. Intrusion Detection Systems using Supervised Machine Learning Techniques: A survey
6. Age and Gender prediction in Open Domain Text
7. Assistive Technology for Deaf People Based on Android Platform
8. Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey.
9. Robust 3D Watermarking Technique Using Eigendecomposition and Nonnegative Matrix Factorization
10. MPEG Video Watermarking Using Tensor Singular Value Decomposition
11. Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey
12. An Index-Based Approach for Wireless Sensor Networks
13. Spherical-based routing protocols for three-dimensional MANET
14. Spherical-based routing protocols for three-dimensional MANET
15. An Energy-Efficient Threshold-Based Clustering Protocol for Wireless Sensor Networks
16. Video watermarking using wavelet transform and tensor algebra
17. Watermarking 3D models using spectral mesh compression
18. A New Approach for Deception Detection in Open Domain Text
19. A new digital signature scheme with message recovery using hybrid problems
20. A Hybrid Secure Watermarking Scheme Using Nonnegative Matrix Factorization and FastWalsh-Hadamard Transform
21. A Novel and Efficient Priority-Based Cross-Layer Contextual Unobservability Scheme Against Global Attacks for WMSNs.
22. Feature-based Sentiment Analysis for Slang Arabic Text
23. Automated labelling and severity prediction of software bug reports
24. A Hybrid Secure Watermarking Scheme Using Nonnegative Matrix Factorization and FastWalsh-Hadamard Transform.
25. Blind users' assistive technology based on the Android platform
26. Blind users' assistive technology based on the Android platform
27. Randomized geographic-based routing with nearly guaranteed delivery for three-dimensional ad hoc network
28. Severity prediction of software bugs
29. Local Algorithm for Establishing a Virtual Backbone in 3D Ad Hoc Network
30. Detecting Email Forgery using Random Forests and Naïve Bayes Classifiers
31. A proxy partially blind signature approach using elliptic curve cryptosystem
32. Power Aware Ant Colony Routing Algorithm for Mobile Ad-hoc Networks
33. Breast Cancer Classification: Comparative Performance Analysis of Image Shape-Based Features and Microarray Gene Expression Data
34. A blind 3D watermarking technique using spherical coordinates and skewness measure
35. MPEG Video Watermarking Using Tensor Singular Value Decomposition
36. Robust 3D Watermarking Technique Using Eigendecomposition and Nonnegative Matrix Factorization
37. Cluster-Based Online Routing Protocols for Ad Hoc Network
38. Spectral Graph and Minimal Spanning Tree for 3D Polygonal Meshes Fingerprinting
39. Automated labelling and severity prediction of software bug reports
40. An intelligent system for author attribution based on a hybrid feature set
41. Greedy cylinder routing algorithm for mobile network devices
42. Normal vectors and spanning tree for 3D object fingerprinting
43. Texture recognition by using a non-linear kernel
44. Simplified approach for generating integrity tests in distributed database systems
45. Secure local algorithm for establishing a virtual backbone in 3D ad hoc network
46. Simplified features for email authorship identification
47. An Energy-Efficient Threshold-Based Clustering Protocol for Wireless Sensor Networks
48. Checking the efficiency of integrity tests in distributed and parallel database
49. Video watermarking using wavelet transform and tensor algebra
50. Watermarking 3D models using spectral mesh compression
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.