Yasmine Abouelseoud
Yasmine Abouelseoud
Associative Professor
Verified email at
Cited by
Cited by
Optimal capacitor placement and sizing in radial electric power systems
A Elsheikh, Y Helmy, Y Abouelseoud, A Elsherif
Alexandria Engineering Journal 53 (4), 809-816, 2014
A heuristics-based solution to the continuous berth allocation and crane assignment problem
MH Elwany, I Ali, Y Abouelseoud
Alexandria Engineering Journal 52 (4), 671-677, 2013
An optimized hybrid approach for spectrum handoff in cognitive radio networks with non-identical channels
AF Tayel, SI Rabia, Y Abouelseoud
IEEE transactions on communications 64 (11), 4487-4496, 2016
Two-phase image encryption scheme based on FFCT and fractals
M Mikhail, Y Abouelseoud, G ElKobrosy
Security and Communication Networks 2017, 2017
MIDSCYK: An efficient provably secure multi-recipient identity-based signcryption scheme
H Elkamchouchi, Y Abouelseoud
2009 International Conference on Networking and Media Convergence, 70-75, 2009
A new proxy identity-based signcryption scheme for partial delegation of signing rights
H Elkamchouchi, Y Abouelseoud
Cryptology ePrint Archive, 2008
Extension and application of El-Gamal encryption scheme
M Mikhail, Y Abouelseoud, G Elkobrosy
2014 World Congress on Computer Applications and Information Systems (WCCAIS …, 2014
A new blind identity-based signature scheme with message recovery
H Elkamchouchi, Y Abouelseoud
Cryptology ePrint Archive, 2008
New video encryption schemes based on chaotic maps
H Elkamchouchi, WM Salama, Y Abouelseoud
IET Image Processing 14 (2), 397-406, 2020
An efficient proxy signcryption scheme based on the discrete logarithm problem
HM Elkamchouchi, EFA Elkhair, Y Abouelseoud
International Journal of Information Technology, Modeling and Computing 1 (2 …, 2013
Improved DV-Hop based on Squirrel search algorithm for localization in wireless sensor networks
MG Abd El Ghafour, SH Kamel, Y Abouelseoud
Wireless Networks 27, 2743-2759, 2021
Data hiding in a digital cover image using chaotic maps and LSB technique
H Elkamchouchi, WM Salama, Y Abouelseoud
2017 12th International Conference on Computer Engineering and Systems …, 2017
Efficient spam and phishing emails filtering based on deep learning
S Magdy, Y Abouelseoud, M Mikhail
Computer Networks 206, 108826, 2022
A mixed integer linear programming approach to electrical stimulation optimization problems
G Abouelseoud, Y Abouelseoud, A Shoukry, N Ismail, J Mekky
IEEE Transactions on Neural Systems and Rehabilitation Engineering 26 (2 …, 2018
Optimal placement and settings of FACTS devices for reactive power compensation using a Firefly algorithm
A El-Sherif, G Elkobrosy, Y Abouelseoud, Y Helmy
2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 1-5, 2019
An optimized general target channel sequence for prioritized cognitive radio networks
AY Zakariya, SI Rabia, Y Abouelseoud
Computer Networks 155, 98-109, 2019
A secure geographical routing protocol for highly-dynamic aeronautical networks
A Swidan, S Khattab, Y Abouelseoud, H Elkamchouchi
MILCOM 2015-2015 IEEE Military Communications Conference, 708-713, 2015
A new proxy signcryption scheme using warrants
HM Elkamchouchi, Y Abouelseoud, WS Shouaib
International Journal of Intelligent Engineering Informatics 1 (3-4), 309-327, 2011
Privacy preserving search index for image databases based on SURF and order preserving encryption
S Magdy, Y Abouelseoud, M Mikhail
IET Image Processing 14 (5), 874-881, 2020
Innovative approximate analytical solution for standard model of viral dynamics: hepatitis C with direct-acting agents as an implemented case
HA Elkaranshawy, HM Ezzat, Y Abouelseoud, NN Ibrahim
Mathematical Problems in Engineering 2019, 2019
The system can't perform the operation now. Try again later.
Articles 1–20