default search action
El-Sayed M. El-Alfy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Jian Wang, Xiaofeng Xue, Zhixue Sun, Jun Yao, El-Sayed M. El-Alfy, Kai Zhang, Witold Pedrycz, Jacek Mandziuk:
Theory guided Lagrange programming neural network for subsurface flow problems. Eng. Appl. Artif. Intell. 134: 108656 (2024) - [j51]Xiaoling Gong, Jian Wang, Qilin Ren, Kai Zhang, El-Sayed M. El-Alfy, Jacek Mandziuk:
Embedded feature selection approach based on TSK fuzzy system with sparse rule base for high-dimensional classification problems. Knowl. Based Syst. 295: 111809 (2024) - [j50]Xuetao Xie, Yi-Fei Pu, Huaqing Zhang, Jacek Mandziuk, El-Sayed M. El-Alfy, Jian Wang:
An interpretable neural network for robustly determining the location and number of cluster centers. Int. J. Mach. Learn. Cybern. 15(4): 1473-1501 (2024) - 2023
- [j49]Mohammed Ayub, El-Sayed M. El-Alfy:
Contextual Sequence-to-Point Deep Learning for Household Energy Disaggregation. IEEE Access 11: 75599-75616 (2023) - [j48]Satheesh Abimannan, El-Sayed M. El-Alfy, Yue-Shan Chang, Shahid Hussain, Saurabh Shukla, Dhivyadharsini Satheesh:
Ensemble Multifeatured Deep Learning Models and Applications: A Survey. IEEE Access 11: 107194-107217 (2023) - [c56]Norah Ahmed Almubairik, El-Sayed M. El-Alfy:
RF-Based Drone Detection with Deep Neural Network: Review and Case Study. ICONIP (15) 2023: 16-27 - [c55]Satheesh Abimannan, El-Sayed M. El-Alfy, Saurabh Shukla, Dhivyadharsini Satheesh:
Spatiotemporal Particulate Matter Pollution Prediction Using Cloud-Edge Intelligence. ICONIP (11) 2023: 90-100 - [c54]Xiaofeng Xue, Xiaoling Gong, Jacek Mandziuk, Jun Yao, El-Sayed M. El-Alfy, Jian Wang:
Theory-Guided Convolutional Neural Network with an Enhanced Water Flow Optimizer. ICONIP (1) 2023: 448-461 - [c53]M. Faisal Nurnoby, El-Sayed M. El-Alfy:
Two-Stage Face Detection and Anti-spoofing. ISVC (1) 2023: 445-455 - 2022
- [j47]El-Sayed M. El-Alfy, Hamzah Luqman:
A comprehensive survey and taxonomy of sign language research. Eng. Appl. Artif. Intell. 114: 105198 (2022) - [j46]Hamzah Luqman, El-Sayed M. El-Alfy:
Utilizing motion and spatial features for sign language gesture recognition using cascaded CNN and LSTM models. Turkish J. Electr. Eng. Comput. Sci. 30(7): 2508-2525 (2022) - 2021
- [j45]Khaled A. Al-Thelaya, Salahadin Mohammed, El-Sayed M. El-Alfy:
Combining Deep Learning and Multiresolution Analysis for Stock Market Forecasting. IEEE Access 9: 13099-13111 (2021) - [j44]Sadam Al-Azani, El-Sayed M. El-Alfy:
Early and Late Fusion of Emojis and Text to Enhance Opinion Mining. IEEE Access 9: 121031-121045 (2021) - [j43]Sabu M. Thampi, El-Sayed M. El-Alfy, Ljiljana Trajkovic:
Soft computing and intelligent systems: Techniques and applications. J. Intell. Fuzzy Syst. 41(5): 5221-5234 (2021) - [j42]Mohammed Ayub, El-Sayed M. El-Alfy:
URLCam: Toolkit for malicious URL analysis and modeling. J. Intell. Fuzzy Syst. 41(5): 5535-5549 (2021) - [j41]Hamzah Luqman, El-Sayed M. El-Alfy, Galal M. BinMakhashen:
Joint space representation and recognition of sign language fingerspelling using Gabor filter and convolutional neural network. Multim. Tools Appl. 80(7): 10213-10234 (2021) - [j40]Atif Shah, El-Sayed M. El-Alfy:
Comparative analysis of feature extraction and fusion for blind authentication of digital images using chroma channels. Signal Process. Image Commun. 95: 116271 (2021) - 2020
- [j39]Sadam Al-Azani, El-Sayed M. El-Alfy:
Enhanced Video Analytics for Sentiment Analysis Based on Fusing Textual, Auditory and Visual Information. IEEE Access 8: 136843-136857 (2020) - [j38]Sabu M. Thampi, El-Sayed M. El-Alfy, Ljiljana Trajkovic:
Soft computing and intelligent systems: techniques and applications. J. Intell. Fuzzy Syst. 38(5): 6187-6191 (2020) - [j37]El-Sayed M. El-Alfy, Sadam Al-Azani:
Empirical study on imbalanced learning of Arabic sentiment polarity with neural word embedding. J. Intell. Fuzzy Syst. 38(5): 6211-6222 (2020) - [j36]El-Sayed M. El-Alfy, Salahadin Mohammed:
A review of machine learning for big data analytics: bibliometric approach. Technol. Anal. Strateg. Manag. 32(8): 984-1005 (2020) - [c52]Majed Al-Asiri, El-Sayed M. El-Alfy:
On Using Physical Based Intrusion Detection in SCADA Systems. ANT/EDI40 2020: 34-42 - [c51]Abdolmaged Alkhulaifi, El-Sayed M. El-Alfy:
Exploring Lattice-based Post-Quantum Signature for JWT Authentication: Review and Case Study. VTC Spring 2020: 1-5
2010 – 2019
- 2019
- [j35]Tingwen Huang, El-Sayed M. El-Alfy, Derong Liu:
Special issue on Neural Information Processing for Optimization and Applications. Appl. Soft Comput. 82 (2019) - [j34]Muhammad Ali Qureshi, El-Sayed M. El-Alfy:
Bibliography of digital image anti-forensics and anti-anti-forensics techniques. IET Image Process. 13(11): 1811-1823 (2019) - [j33]El-Sayed M. El-Alfy, Amer G. Binsaadoon:
Automated gait-based gender identification using fuzzy local binary patterns with tuned parameters. J. Ambient Intell. Humaniz. Comput. 10(7): 2495-2504 (2019) - [j32]Sabu M. Thampi, El-Sayed M. El-Alfy:
Soft computing and intelligent systems: techniques and applications. J. Intell. Fuzzy Syst. 36(3): 1939-1944 (2019) - [j31]Husain Naser, Wasan S. Awad, El-Sayed M. El-Alfy:
A multi-matching approximation algorithm for Symmetric Traveling Salesman Problem. J. Intell. Fuzzy Syst. 36(3): 2285-2295 (2019) - [j30]Feras N. Al-Obeidat, El-Sayed M. El-Alfy:
Hybrid multicriteria fuzzy classification of network traffic patterns, anomalies, and protocols. Pers. Ubiquitous Comput. 23(5-6): 777-791 (2019) - [c50]Sadam Al-Azani, El-Sayed M. El-Alfy:
Multimodal Sentiment and Gender Classification for Video Logs. ICAART (2) 2019: 907-914 - [c49]M. Faisal Nurnoby, El-Sayed M. El-Alfy:
Overview and Case Study for Ransomware Classification Using Deep Neural Network. MENACOMM 2019: 1-6 - [c48]Mohammed Samara, El-Sayed M. El-Alfy:
Benchmarking Open-Source Android Malware Detection Tools. MENACOMM 2019: 1-6 - [c47]Khaled A. Al-Thelaya, El-Sayed M. El-Alfy:
Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks. SSCC 2019: 309-321 - [c46]Sadam Al-Azani, El-Sayed M. El-Alfy:
Audio-Textual Arabic Dialect Identification for Opinion Mining Videos. SSCI 2019: 2470-2475 - 2018
- [j29]El-Sayed M. El-Alfy, Zubair A. Baig, Radwan E. Abdel-Aal:
A novel approach for face recognition using fused GMDH-based networks. Int. Arab J. Inf. Technol. 15(3): 369-377 (2018) - [j28]Sabu M. Thampi, El-Sayed M. El-Alfy, Sushmita Mitra, Ljiljana Trajkovic:
Soft computing and intelligent systems: Techniques and applications. J. Intell. Fuzzy Syst. 34(3): 1237-1241 (2018) - [j27]Khaled Abdul-Aziz Al-Utaibi, El-Sayed M. El-Alfy:
Intrusion detection taxonomy and data preprocessing mechanisms. J. Intell. Fuzzy Syst. 34(3): 1369-1383 (2018) - [j26]Khalifa Ahmed, El-Sayed M. El-Alfy, Wasan S. Awad:
Ant colony inspired method for reducing load imbalance in multiprocessor systems. J. Intell. Fuzzy Syst. 34(3): 1443-1451 (2018) - [c45]El-Sayed M. El-Alfy, Sadam Al-Azani:
Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets. SSCC 2018: 157-167 - [p2]Khaled Abdul-Aziz Al-Utaibi, El-Sayed M. El-Alfy:
Searching Encrypted Data on the Cloud. Computer and Network Security Essentials 2018: 221-236 - 2017
- [j25]El-Sayed M. El-Alfy:
Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering. Comput. J. 60(12): 1745-1759 (2017) - [j24]Mubasher Baig, Mian M. Awais, El-Sayed M. El-Alfy:
AdaBoost-based artificial neural network learning. Neurocomputing 248: 120-126 (2017) - [j23]Sabu M. Thampi, El-Sayed M. El-Alfy:
Special issue on soft computing and intelligent systems: Tools, techniques and applications. J. Intell. Fuzzy Syst. 32(4): 2791-2796 (2017) - [j22]Mirza Mubasher Baig, Mian M. Awais, El-Sayed M. El-Alfy:
A multiclass cascade of artificial neural network for network intrusion detection. J. Intell. Fuzzy Syst. 32(4): 2875-2883 (2017) - [j21]El-Sayed M. El-Alfy:
Evaluation of sequential adaptive testing with real-data simulation: A case study. J. Intell. Fuzzy Syst. 32(4): 2977-2986 (2017) - [j20]El-Sayed M. El-Alfy, Muhammad Ali Qureshi:
Robust content authentication of gray and color images using lbp-dct markov-based features. Multim. Tools Appl. 76(12): 14535-14556 (2017) - [c44]El-Sayed M. El-Alfy, Amer G. Binsaadoon:
Silhouette-Based Gender Recognition in Smart Environments Using Fuzzy Local Binary Patterns and Support Vector Machines. ANT/SEIT 2017: 164-171 - [c43]Sadam Al-Azani, El-Sayed M. El-Alfy:
Using Word Embedding and Ensemble Learning for Highly Imbalanced Data Sentiment Analysis in Short Arabic Text. ANT/SEIT 2017: 359-366 - [c42]El-Sayed M. El-Alfy, Khaled Abdul-Aziz Al-Utaibi:
Learning mechanisms for anomaly-based intruson detection: Updated review. ICACCI 2017: 1273-1281 - [c41]Sadam Al-Azani, El-Sayed M. El-Alfy:
Hybrid Deep Learning for Sentiment Polarity Determination of Arabic Microblogs. ICONIP (2) 2017: 491-500 - [e7]Derong Liu, Shengli Xie, Yuanqing Li, Dongbin Zhao, El-Sayed M. El-Alfy:
Neural Information Processing - 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10634, Springer 2017, ISBN 978-3-319-70086-1 [contents] - [e6]Derong Liu, Shengli Xie, Yuanqing Li, Dongbin Zhao, El-Sayed M. El-Alfy:
Neural Information Processing - 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10635, Springer 2017, ISBN 978-3-319-70095-3 [contents] - [e5]Derong Liu, Shengli Xie, Yuanqing Li, Dongbin Zhao, El-Sayed M. El-Alfy:
Neural Information Processing - 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10636, Springer 2017, ISBN 978-3-319-70089-2 [contents] - [e4]Derong Liu, Shengli Xie, Yuanqing Li, Dongbin Zhao, El-Sayed M. El-Alfy:
Neural Information Processing - 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part IV. Lecture Notes in Computer Science 10637, Springer 2017, ISBN 978-3-319-70092-2 [contents] - [e3]Derong Liu, Shengli Xie, Yuanqing Li, Dongbin Zhao, El-Sayed M. El-Alfy:
Neural Information Processing - 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part V. Lecture Notes in Computer Science 10638, Springer 2017, ISBN 978-3-319-70138-7 [contents] - [e2]Derong Liu, Shengli Xie, Yuanqing Li, Dongbin Zhao, El-Sayed M. El-Alfy:
Neural Information Processing - 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part VI. Lecture Notes in Computer Science 10639, Springer 2017, ISBN 978-3-319-70135-6 [contents] - 2016
- [j19]El-Sayed M. El-Alfy, Ali A. Al-Hasan:
Spam filtering framework for multimodal mobile communication based on dendritic cell algorithm. Future Gener. Comput. Syst. 64: 98-107 (2016) - [j18]El-Sayed M. El-Alfy, Salahadin Mohammed, Ahmad F. Barradah:
XHQE: A hybrid system for scalable selectivity estimation of XML queries. Inf. Syst. Frontiers 18(6): 1233-1249 (2016) - [j17]El-Sayed M. El-Alfy, Mashaan A. Alshammari:
Towards scalable rough set based attribute subset selection for intrusion detection using parallel genetic algorithm in MapReduce. Simul. Model. Pract. Theory 64: 18-29 (2016) - [j16]Salahadin Mohammed, Ahmad F. Barradah, El-Sayed M. El-Alfy:
Selectivity estimation of extended XML query tree patterns based on prime number labeling and synopsis modeling. Simul. Model. Pract. Theory 64: 30-42 (2016) - [c40]Amer G. Binsaadoon, El-Sayed M. El-Alfy:
Kernel-Based Fuzzy Local Binary Pattern for Gait Recognition. EMS 2016: 35-40 - [c39]Amer G. Binsaadoon, El-Sayed M. El-Alfy:
Gait-based Recognition for Human Identification using Fuzzy Local Binary Patterns. ICAART (2) 2016: 314-321 - [c38]Amer G. Binsaadoon, El-Sayed M. El-Alfy:
Multi-Kernel Fuzzy-Based Local Gabor Patterns for Gait Recognition. ISVC (1) 2016: 790-799 - 2015
- [j15]El-Sayed M. El-Alfy, Radwan E. Abdel-Aal, Wasfi G. Al-Khatib, Faisal Alvi:
Boosting paraphrase detection through textual similarity metrics with abductive networks. Appl. Soft Comput. 26: 444-453 (2015) - [j14]Sabu M. Thampi, El-Sayed M. El-Alfy:
Introduction to the special issue on Cognitive Radio Networks. Comput. Electr. Eng. 42: 115-116 (2015) - [j13]El-Sayed M. El-Alfy, Feras N. Al-Obeidat:
Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection. Mob. Inf. Syst. 2015: 585432:1-585432:13 (2015) - [j12]El-Sayed M. El-Alfy, Muhammad Ali Qureshi:
Combining spatial and DCT based Markov features for enhanced blind detection of image splicing. Pattern Anal. Appl. 18(3): 713-723 (2015) - [j11]Salahadin Mohammed, El-Sayed M. El-Alfy, Ahmad F. Barradah:
Improved selectivity estimator for XML queries based on structural synopsis. World Wide Web 18(4): 1123-1144 (2015) - [c37]Abdullah A. AlQahtani, El-Sayed M. El-Alfy:
Anonymous Connections Based on Onion Routing: A Review and a Visualization Tool. ANT/SEIT 2015: 121-128 - [c36]Ali A. Al-Hasan, El-Sayed M. El-Alfy:
Dendritic Cell Algorithm for Mobile Phone Spam Filtering. ANT/SEIT 2015: 244-251 - [c35]Binsaadoon A. G. Abdullah, El-Sayed M. El-Alfy:
Statistical Gabor-Based Gait Recognition Using Region-Level Analysis. EMS 2015: 137-141 - [c34]Mirza Mubasher Baig, El-Sayed M. El-Alfy, Mian M. Awais:
Learning Rule for Linear Multilayer Feedforward ANN by Boosted Decision Stumps. ICONIP (1) 2015: 345-353 - [e1]El-Sayed M. El-Alfy, Sabu M. Thampi, Hideyuki Takagi, Selwyn Piramuthu, Thomas Hanne:
Advances in Intelligent Informatics - Proceedings of the Third International Symposium on Intelligent Informatics, ISI 2014, September 24-27, 2014, Greater Noida, Delhi, India. Advances in Intelligent Systems and Computing 320, Springer 2015, ISBN 978-3-319-11217-6 [contents] - 2014
- [j10]El-Sayed M. El-Alfy, Radwan E. Abdel-Aal:
Abductive Learning Ensembles for Hand Shape Identification. Cogn. Comput. 6(3): 321-330 (2014) - [c33]Nedal T. Ratrout, Uneb Gazder, El-Sayed M. El-Alfy:
Effects of Using Average Annual Daily Traffic (AADT) with Exogenous Factors to Predict Daily Traffic. ANT/SEIT 2014: 325-330 - [c32]El-Sayed M. El-Alfy, Asem A. Ghaleb:
Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study. CICS 2014: 1-8 - [c31]El-Sayed M. El-Alfy, Ali A. Al-Hasan:
A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm. CICS 2014: 89-95 - [c30]El-Sayed M. El-Alfy, Feras N. Al-Obeidat:
A Multicriterion Fuzzy Classification Method with Greedy Attribute Selection for Anomaly-based Intrusion Detection. FNC/MobiSPC 2014: 55-62 - [c29]El-Sayed M. El-Alfy, Mohammed Rehan Riaz:
Image Quality Assessment using ANFIS Approach. ICAART (1) 2014: 169-177 - [c28]El-Sayed M. El-Alfy, Mohammed Rehan Riaz:
Full-Reference Predictive Modeling of Subjective Image Quality Assessment with ANFIS. ICAART (Revised Selected Papers) 2014: 296-311 - [c27]Mirza Mubasher Baig, Mian M. Awais, El-Sayed M. El-Alfy:
BOOSTRON: Boosting Based Perceptron Learning. ICONIP (1) 2014: 199-206 - [c26]El-Sayed M. El-Alfy:
ANFIS-Based Model for Improved Paraphrase Rating Prediction. ICONIP (1) 2014: 397-404 - [c25]Mubasher Baig, El-Sayed M. El-Alfy, Mian M. Awais:
Intrusion detection using a cascade of boosted classifiers (CBC). IJCNN 2014: 1386-1392 - [p1]Mohamed A. Abido, El-Sayed M. El-Alfy, Muhammad Sheraz:
Computational Intelligence in Smart Grids: Case Studies. Computational Intelligence for Decision Support in Cyber-Physical Systems 2014: 265-292 - 2013
- [j9]El-Sayed M. El-Alfy, Mujahid N. Syed, Shokri Z. Selim:
A Pareto-based hybrid multiobjective evolutionary approach for constrained multipath traffic engineering optimization in MPLS/GMPLS networks. J. Netw. Comput. Appl. 36(4): 1196-1207 (2013) - [c24]El-Sayed M. El-Alfy:
Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network. CIDM 2013: 160-165 - [c23]El-Sayed M. El-Alfy:
Enhanced Hand Shape Identification Using Random Forests. ICONIP (2) 2013: 441-447 - 2012
- [c22]El-Sayed M. El-Alfy:
Classification of Deformable Geometric Shapes - Using Radial-Basis Function Networks and Ring-wedge Energy Features. ICAART (1) 2012: 355-362 - [c21]Galal M. BinMakhashen, El-Sayed M. El-Alfy:
Fusion of Multiple Texture Representations for Palmprint Recognition Using Neural Networks. ICONIP (5) 2012: 410-417 - [c20]El-Sayed M. El-Alfy, Radwan E. Abdel-Aal, Zubair A. Baig:
Abductive Neural Network Modeling for Hand Recognition Using Geometric Features. ICONIP (4) 2012: 593-602 - [c19]El-Sayed M. El-Alfy, Azzat A. Al-Sadi:
High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function. NDT (2) 2012: 243-252 - [c18]El-Sayed M. El-Alfy, Galal M. BinMakhashen:
Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines. NDT (2) 2012: 253-261 - [c17]El-Sayed M. El-Alfy:
Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks. NTMS 2012: 1-5 - [c16]Faisal Alvi, El-Sayed M. El-Alfy, Wasfi G. Al-Khatib, Radwan E. Abdel-Aal:
Analysis and extraction of sentence-level paraphrase sub-corpus in CS education. SIGITE Conference 2012: 49-54 - 2011
- [j8]El-Sayed M. El-Alfy, Radwan E. Abdel-Aal:
Using GMDH-based networks for improved spam detection and email feature analysis. Appl. Soft Comput. 11(1): 477-488 (2011) - [j7]El-Sayed M. El-Alfy, Yu-Dong Yao:
Comparing a class of dynamic model-based reinforcement learning schemes for handoff prioritization in mobile communication networks. Expert Syst. Appl. 38(7): 8730-8737 (2011) - [c15]Azzat A. Al-Sadi, El-Sayed M. El-Alfy:
An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing. ACC (2) 2011: 535-544 - [c14]El-Sayed M. El-Alfy:
A reinforcement learning approach for sequential mastery testing. ADPRL 2011: 295-301 - [c13]El-Sayed M. El-Alfy, Azzat A. Al-Sadi:
A comparative study of PVD-based schemes for data hiding in digital images. AICCSA 2011: 144-149 - 2010
- [c12]El-Sayed M. El-Alfy:
Offline Recognition of Handwritten Numeral Characters with Polynomial Neural Networks Using Topological Features. Canadian AI 2010: 173-183 - [c11]Khaled Abdul-Aziz Al-Utaibi, El-Sayed M. El-Alfy:
A bio-inspired image encryption algorithm based on chaotic maps. IEEE Congress on Evolutionary Computation 2010: 1-6 - [c10]El-Sayed M. El-Alfy:
Flow-based path selection for Internet traffic engineering with NSGA-II. ICT 2010: 621-627 - [c9]El-Sayed M. El-Alfy:
A hierarchical GMDH-based polynomial neural network for handwritten numeral recognition using topological features. IJCNN 2010: 1-7
2000 – 2009
- 2009
- [j6]Radwan E. Abdel-Aal, El-Sayed M. El-Alfy:
Constructing optimal educational tests using GMDH-based item ranking and selection. Neurocomputing 72(4-6): 1184-1197 (2009) - [c8]El-Sayed M. El-Alfy:
Discovering classification rules for email spam filtering with an ant colony optimization algorithm. IEEE Congress on Evolutionary Computation 2009: 1778-1783 - 2008
- [j5]El-Sayed M. El-Alfy, Radwan E. Abdel-Aal:
Construction and analysis of educational tests using abductive machine learning. Comput. Educ. 51(1): 1-16 (2008) - [c7]El-Sayed M. El-Alfy, Fares S. Al-Qunaieer:
A fuzzy similarity approach for automated spam filtering. AICCSA 2008: 544-550 - [c6]El-Sayed M. El-Alfy, Radwan E. Abdel-Aal:
Spam filtering with abductive networks. IJCNN 2008: 165-170 - 2007
- [j4]El-Sayed M. El-Alfy:
Applications of genetic algorithms to optimal multilevel design of MPLS-based networks. Comput. Commun. 30(9): 2010-2020 (2007) - [j3]El-Sayed M. El-Alfy:
A Review of Network Security. IEEE Distributed Syst. Online 8(7) (2007) - [c5]El-Sayed M. El-Alfy, Shokri Z. Selim:
On Optimal Firewall Rule Ordering. AICCSA 2007: 819-824 - [c4]El-Sayed M. El-Alfy, Shokri Z. Selim, Mujahid N. Syed:
Solving the minimum-cost constrained multipath routing with load balancing in MPLS networks using an evolutionary method. IEEE Congress on Evolutionary Computation 2007: 4433-4438 - 2006
- [j2]El-Sayed M. El-Alfy, Yu-Dong Yao, Harry Heffes:
A learning approach for prioritized handoff channel allocation in mobile multimedia networks. IEEE Trans. Wirel. Commun. 5(7): 1651-1660 (2006) - [c3]El-Sayed M. El-Alfy:
MPLS Network Topology Design Using Genetic Algorithms. AICCSA 2006: 1059-1065 - 2005
- [j1]El-Sayed M. El-Alfy:
A General Look at Building Applications for Mobile Devices. IEEE Distributed Syst. Online 6(9) (2005) - 2001
- [c2]El-Sayed M. El-Alfy, Yu-Dong Yao, Harry Heffes:
Autonomous call admission control with prioritized handoff in cellular networks. ICC 2001: 1386-1390 - [c1]El-Sayed M. El-Alfy, Yu-Dong Yao, Harry Heffes:
Adaptive resource allocation with prioritized handoff in cellular mobile networks under QoS provisioning. VTC Fall 2001: 2113-2117
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint