scroll to top
0

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "El-Shafai, Walid"

1 - 10 of 170 results for
 "El-Shafai, Walid"
Results per page:

Reconfigurable intelligent surface‐aided millimetre wave communications utilizing two‐phase minimax optimal stochastic strategy bandit

Publication Type: Academic Journal

Source(s): IET Communications, Vol 16, Iss 18, Pp 2200-2207 (2022)

Abstract: Abstract Millimetre wave (mmWave) communications, that is, 30 to 300 GHz, have intermittent short‐range transmissions, so the use of reconfigurable intelligent surface (RIS) seems to be a promising solution to extend its coverage. However, optimizing p...

View details

Multi-Objective Evolution of Strong S-Boxes Using Non-Dominated Sorting Genetic Algorithm-II and Chaos for Secure Telemedicine

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 10, Pp 112757-112775 (2022)

Abstract: There exist several performance criteria for cryptographically-strong substitution boxes (S-boxes), which are often conflicting with each other. Constructing S-boxes that satisfy multiple criteria with optimal tradeoffs is one of the challenging tasks ...

View details

Three-Dimensional Video Super-Resolution Reconstruction Scheme Based on Histogram Matching and Recursive Bayesian Algorithms

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 10, Pp 41935-41951 (2022)

Abstract: Multimedia Super-Resolution (SR) reconstruction is an essential and mandatory process for different visualization functions. Recently, several schemes have been suggested for single- and multi-image SR reconstruction. This work presents an effective SR...

View details

An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 10, Pp 2700-2720 (2022)

Abstract: Recently, cybersecurity experts and researchers have given special attention to developing cost-effective deep learning (DL)-based algorithms for Android malware detection (AMD) systems. However, the conventional AMD solutions necessitate extensive com...

View details

Proposal of Hybrid NOAM-MPPM Technique for Gamma-Gamma Turbulence Channel With Pointing Error and Different Deep Learning Techniques

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 10, Pp 10295-10309 (2022)

Abstract: A hybrid multi-state orbital angular momentum-multi pulse-position modulation ( $N$ OAM-MPPM) scheme over gamma-gamma free-space optical ( ${\Gamma \Gamma }$ -FSO) channel is studied in this paper. In our study, all atmospheric and pointing error impac...

View details

A Cancelable Biometric Security Framework Based on RNA Encryption and Genetic Algorithms

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 10, Pp 55933-55957 (2022)

Abstract: Cancelable biometric recognition techniques play a vital role in the privacy and security of remote surveillance systems to keep the genuine users’ confidential data safe and away from intruders. This research work presents an efficient cancelable biom...

View details

Bio-Inspired Dynamic Trust and Congestion-Aware Zone-Based Secured Internet of Drone Things (SIoDT)

Publication Type: Academic Journal

Source(s): Drones, Vol 6, Iss 337, p 337 (2022)

Abstract: The Internet of Drone Things (IoDT) is a trending research area where drones are used to gather information from ground networks. In order to overcome the drawbacks of the Internet of Vehicles (IoV), such as congestion issues, security issues, and ener...

View details

Android malware analysis in a nutshell.

Publication Type: Academic Journal

Source(s): PLoS ONE, Vol 17, Iss 7, p e0270647 (2022)

Abstract: This paper offers a comprehensive analysis model for android malware. The model presents the essential factors affecting the analysis results of android malware that are vision-based. Current android malware analysis and solutions might consider one or...

Subjects:
View details

Optical Bit-Plane-Based 3D-JST Cryptography Algorithm With Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 9, Pp 35004-35026 (2021)

Abstract: The rapid growth of multimedia communication systems has expanded the High-Efficiency Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent, elevated need to protect and secure the HEVC content during streaming and comm...

View details

Efficient and Secure Cancelable Biometric Authentication Framework Based on Genetic Encryption Algorithm

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 9, Pp 77675-77692 (2021)

Abstract: Various cancelable biometric techniques have been proposed to maintain user data security. In this work, a cancelable biometric framework is introduced to satisfy user data security and keeping the original biometric template safe away from intruders. ...

View details
sponsored