default search action
Yasmine Abouelseoud
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Reem Nasser, Yasmine Abouelseoud, Mervat Mikhail:
Robust watermark based on Schur decomposition and dynamic weighting factors. Vis. Comput. 40(5): 3249-3269 (2024) - [j16]Ahmed El. Gouda, Yasmine Abouelseoud, Ahmed H. Abd El-Malek, Radwa Ahmed Osman:
Enhanced DV-Hop using shuffled shepherd algorithm for localizing sensor nodes in 3-D space. Wirel. Networks 30(1): 295-307 (2024) - 2023
- [j15]Mohamed Ahmed, Sara H. Kamel, Nabil H. Abbasy, Yasmine Abouelseoud:
A Gaussian random walk salp swarm algorithm for optimal dynamic charging of electric vehicles. Appl. Soft Comput. 147: 110838 (2023) - [j14]Gehan Abouelseoud, Yasmine Abouelseoud, Amin A. Shoukry, Nour Ismail, Jaidaa Mekky:
A mixed integer linear programming framework for improving cortical vision prosthesis designs. Biomed. Signal Process. Control. 80(Part): 104253 (2023) - 2022
- [j13]Safaa Magdy, Yasmine Abouelseoud, Mervat Mikhail:
Efficient spam and phishing emails filtering based on deep learning. Comput. Networks 206: 108826 (2022) - [j12]Hassan M. Elkamchouchi, Rosemarie Anton, Yasmine Abouelseoud:
New Encryption Algorithm for Secure Image Transmission Through Open Network. Wirel. Pers. Commun. 125(1): 45-62 (2022) - 2021
- [j11]Mohamed Ahmed, Yasmine Abouelseoud, Nabil H. Abbasy, Sara H. Kamel:
Hierarchical Distributed Framework for Optimal Dynamic Load Management of Electric Vehicles With Vehicle-to-Grid Technology. IEEE Access 9: 164643-164658 (2021) - [j10]Mohamed G. Abd El Ghafour, Sara H. Kamel, Yasmine Abouelseoud:
Improved DV-Hop based on Squirrel search algorithm for localization in wireless sensor networks. Wirel. Networks 27(4): 2743-2759 (2021) - 2020
- [j9]Gehan Abouelseoud, Yasmine Abouelseoud, Amin A. Shoukry, Nour Ismail, Jaidaa Mekky:
On the use of time division multiplexing to improve electrical brain stimulation focality. Biomed. Signal Process. Control. 61: 102048 (2020) - [j8]Hassan M. Elkamchouchi, Wessam M. Salama, Yasmine Abouelseoud:
New video encryption schemes based on chaotic maps. IET Image Process. 14(2): 397-406 (2020) - [j7]Safaa Magdy, Yasmine Abouelseoud, Mervat Mikhail:
Privacy preserving search index for image databases based on SURF and order preserving encryption. IET Image Process. 14(5): 874-881 (2020) - [c6]Hesham A. Elkaranshawy, Ahmed M. Makhlouf, Yasmine Abouelseoud:
Using Padé Approximant Method to Solve the Mathematical Model of Tumor-Immune Interactions. EMBC 2020: 2467-2470
2010 – 2019
- 2019
- [j6]Safaa Magdy, Yasmine Abouelseoud, Mervat Mikhail:
Effect of chosen features on performance of privacy preserving image retrieval systems. Comput. Electr. Eng. 76: 411-424 (2019) - [j5]Ahmed Y. Zakariya, Sherif I. Rabia, Yasmine Abouelseoud:
An optimized general target channel sequence for prioritized cognitive radio networks. Comput. Networks 155: 98-109 (2019) - [j4]Hassan M. Elkamchouchi, Wessam M. Salama, Yasmine Abouelseoud:
ArMTFr: a new permutation-based image encryption scheme. Int. J. Electron. Secur. Digit. Forensics 11(1): 1-28 (2019) - [c5]Ahmed El-Sherif, Galal A. Elkobrosy, Yasmine Abouelseoud, Yahya Helmy:
Optimal Placement and Settings of FACTS Devices for Reactive Power Compensation Using a Firefly Algorithm. ISGT Europe 2019: 1-5 - 2017
- [j3]Mervat Mikhail, Yasmine Abouelseoud, Galal A. Elkobrosy:
Two-Phase Image Encryption Scheme Based on FFCT and Fractals. Secur. Commun. Networks 2017: 7367518:1-7367518:13 (2017) - 2016
- [j2]Ahmed F. Tayel, Sherif I. Rabia, Yasmine Abouelseoud:
An Optimized Hybrid Approach for Spectrum Handoff in Cognitive Radio Networks With Non-Identical Channels. IEEE Trans. Commun. 64(11): 4487-4496 (2016) - [c4]R. Fakhry, M. A. Aboushal, Yasmine Abouelseoud, Emtethal Negm:
An efficient load flow algorithm for radial distribution networks. ICM 2016: 97-100 - 2015
- [c3]Amir Swidan, Sherif M. Khattab, Yasmine Abouelseoud, Hassan M. Elkamchouchi:
A secure geographical routing protocol for highly-dynamic aeronautical networks. MILCOM 2015: 708-713 - 2011
- [j1]Hassan M. Elkamchouchi, Yasmine Abouelseoud, Wafaa S. Shouaib:
A new proxy signcryption scheme using warrants. Int. J. Intell. Eng. Informatics 1(3/4): 309-327 (2011)
2000 – 2009
- 2008
- [c2]Hassan M. Elkamchouchi, Yasmine Abouelseoud:
A scalable trace and revoke scheme with security enhancements. CCNC 2008: 1091-1096 - [c1]Hassan M. Elkamchouchi, Yasmine Abouelseoud:
A New Blind Identity-Based Signature Scheme. CCNC 2008: 1102-1106 - [i2]Hassan M. Elkamchouchi, Yasmine Abouelseoud:
A New Blind Identity-Based Signature Scheme with Message Recovery. IACR Cryptol. ePrint Arch. 2008: 38 (2008) - [i1]Hassan M. Elkamchouchi, Yasmine Abouelseoud:
A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights. IACR Cryptol. ePrint Arch. 2008: 41 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint