Nawal A. El-Fishawy

Orcid: 0000-0001-9098-5541

According to our database1, Nawal A. El-Fishawy authored at least 46 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An effective text plagiarism detection system based on feature selection and SVM techniques.
Multim. Tools Appl., January, 2024

2023
An efficient security system based on cancelable face recognition with blockchain over cognitive IoT.
Multim. Tools Appl., December, 2023

New weighted BERT features and multi-CNN models to enhance the performance of MOOC posts classification.
Neural Comput. Appl., August, 2023

Enhanced hybrid multi-objective workflow scheduling approach based artificial bee colony in cloud computing.
Computing, 2023

2022
Enhancing PM2.5 Prediction Using NARX-Based Combined CNN and LSTM Hybrid Model.
Sensors, 2022

A Hybrid Approach for Task Scheduling Based Particle Swarm and Chaotic Strategies in Cloud Computing Environment.
Parallel Process. Lett., 2022

Reliable plagiarism detection system based on deep learning approaches.
Neural Comput. Appl., 2022

RN-SMOTE: Reduced Noise SMOTE based on DBSCAN for enhancing imbalanced data classification.
J. King Saud Univ. Comput. Inf. Sci., 2022

Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things-based smart city security using blockchain.
Concurr. Comput. Pract. Exp., 2022

2021
Buffering_Slotted_ALOHA protocol for underwater acoustic sensor networks based on the slot status.
Wirel. Networks, 2021

An efficient machine learning model for malicious activities recognition in water-based industrial internet of things.
Secur. Priv., 2021

A novel deep autoencoder based survival analysis approach for microarray dataset.
PeerJ Comput. Sci., 2021

An efficient multi-factor authentication scheme based CNNs for securing ATMs over cognitive-IoT.
PeerJ Comput. Sci., 2021

Coronavirus disease 2019 (COVID-19): survival analysis using deep learning and Cox regression model.
Pattern Anal. Appl., 2021

An efficient CNN based encrypted Iris recognition approach in cognitive-IoT system.
Multim. Tools Appl., 2021

Anomaly events classification and detection system in critical industrial internet of things infrastructure using machine learning algorithms.
Multim. Tools Appl., 2021

A review study on blockchain-based IoT security and forensics.
Multim. Tools Appl., 2021

Efficient machine learning model for predicting drug-target interactions with case study for Covid-19.
Comput. Biol. Chem., 2021

2020
Feature Selection Ranking and Subset-Based Techniques with Different Classifiers for Intrusion Detection.
Wirel. Pers. Commun., 2020

Intelligence Is beyond Learning: A Context-Aware Artificial Intelligent System for Video Understanding.
Comput. Intell. Neurosci., 2020

2018
Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers.
Wirel. Pers. Commun., 2018

Load-Balance Energy Aware Ad-Hoc On Demand Multipath Distance Vector Routing Protocol (LBEA-AOMDV) for WSN.
Int. J. Wirel. Networks Broadband Technol., 2018

Iris Recognition Using Multi-Algorithmic Approaches for Cognitive Internet of things (CIoT) Framework.
Future Gener. Comput. Syst., 2018

End-to-End Indoor Navigation Assistance for the Visually Impaired Using Monocular Camera.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

2017
Early diagnosis of breast cancer by gene expression profiles.
Pattern Anal. Appl., 2017

Classification of human cancer diseases by gene expression profiles.
Appl. Soft Comput., 2017

Navigational path detection for the visually impaired using fully convolutional networks.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

2016
Encryption quality measurement of a proposed cryptosystem algorithm for the colored images compared with another algorithm.
Int. Arab J. Inf. Technol., 2016

A secure cloud storage system combining time-based one-time password and automatic blocker protocol.
EURASIP J. Inf. Secur., 2016

2015
Evaluating Social Media Information Usage in Ranking the Web.
Proceedings of the 25th International Conference on Computer Theory and Applications, 2015

FPGA Implementation of Iris Recognition Based on Fast DCT Coding.
Proceedings of the 25th International Conference on Computer Theory and Applications, 2015

2014
Homomorphic image watermarking with a singular value decomposition algorithm.
Inf. Process. Manag., 2014

An efficient designed prototype technique for OFDM PAPR reduction using FPGA.
Int. J. Commun. Syst., 2014

Using Patch Management Tools to Enhance the Signature Customization for IDS Based on Vulnerability Scanner.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

2013
Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving.
Wirel. Networks, 2013

Low complexity Wizard amplitude shaping system for peak-to-average power ratio reduction.
IET Commun., 2013

Performance enhancement of power line communication systems with efficient low density parity-check codes, noise removal, equalization, and chaotic interleaving.
Digit. Signal Process., 2013

Vulnerability Scanners Capabilities for Detecting Windows Missed Patches: Comparative Study.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

2012
Performance of the audio signals transmission over wireless networks with the channel interleaving considerations.
EURASIP J. Audio Speech Music. Process., 2012

2011
Enhancing the Image Transmission over Wireless Networks through a Novel Interleaver.
KSII Trans. Internet Inf. Syst., 2011

An SVD audio watermarking approach using chaotic encrypted images.
Digit. Signal Process., 2011

2010
An Efficient Technique for OFDM System Using Discrete Wavelet Transform.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010

2008
Quality of service investigation for multimedia transmission over UWB networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms.
Int. J. Netw. Secur., 2007

2003
An improvement on secure communication in PCS.
Proceedings of the 22nd IEEE International Performance Computing and Communications Conference, 2003

2002
An effective approach for authentication of mobile users.
Proceedings of the 55th IEEE Vehicular Technology Conference, 2002


  Loading...