Volgen
Rasha Elsayed Sakr
Rasha Elsayed Sakr
Assoc.Prof. at Computer Science Department, Faculty of Computers and Information Sciences, Mansoura
Geverifieerd e-mailadres voor mans.edu.eg
Titel
Geciteerd door
Geciteerd door
Jaar
Optimizing hyperparameters of deep reinforcement learning for autonomous driving based on whale optimization algorithm
NM Ashraf, RR Mostafa, RH Sakr, MZ Rashad
Plos one 16 (6), e0252754, 2021
792021
Skin lesion segmentation and classification using conventional and deep learning based framework
A Bibi, MA Khan, MY Javed, U Tariq, BG Kang, Y Nam, RR Mostafa, ...
Comput. Mater. Contin 71 (2), 2477-2495, 2022
512022
An Ensemble of Optimal Deep Learning Features for Brain Tumor Classification.
A Aziz, M Attique, U Tariq, Y Nam, M Nazir, CW Jeong, RR Mostafa, ...
Computers, Materials & Continua 69 (2), 2021
432021
COVID19 classification using CT images via ensembles of deep learning models.
A Majid, MA Khan, Y Nam, U Tariq, S Roy, RR Mostafa, RH Sakr
Computers, Materials & Continua 69 (1), 2021
302021
An ensemble of CNNs with self-attention mechanism for DeepFake video detection
K Omar, RH Sakr, MF Alrahmawy
Neural Computing and Applications 36 (6), 2749-2765, 2024
132024
An optimized technique for secure data over cloud os
RH Sakr, F Omara, O Nomir
International Journal of Emerging Trends & Technology in Computer Science …, 0
7
A state-of-the-art review of deep reinforcement learning techniques for real-time strategy games
NM Ashraf, RR Mostafa, RH Sakr, MZ Rashad
Applications of Artificial Intelligence in Business, Education and …, 2021
62021
Identifying the most accurate machine learning classification technique to detect network threats
RHSNH Mohamed Farouk
Neural Computing and Applications, 2024
42024
An offline direct authentication scheme for the internet of medical things based on elliptic curve cryptography
A Maarouf, R Sakr, S Elmougy
IEEe Access, 2024
32024
Implementing and Comparing LIDBPP (Local Intrusion Detection by Bluff Probe Packet)
II Saada, MZ Rashad, RH Sakr
International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016
22016
Authentication Using Fingerprint and Rivest-Shamir-Adleman Encryption in Mobile Ad Hoc Network
II Saada, RH Sakr, MZ Rashad
Journal of Computational and Theoretical Nanoscience 15 (8), 2510-2514, 2018
12018
A COMPARATIVE STUDY OF SECURITY ALGORITHMS FOR CLOUD COMPUTING
RHSF Omara, O Nomir
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–12