Hesham A. Hefny
Professor of Computer Science, Cairo University
5 zweil st. - Orman - Giza - Egypt
(email)
Fuzzy logic
Showing results in 'Publications'.
Show all posts
Sayedahmed, H. A. M., E. M. Elgamal, and H. A. Hefny,
"
F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMMUNICATIONS
",
International Journal of Computer Networks & Communications (IJCNC)
, vol. 14, issue 4, pp. 19-40, 2022.
Sayedahmed, H. A. M., E. M. Elgamal, and H. A. Hefny,
"
F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMMUNICATIONS
",
International Journal of Computer Networks & Communications (IJCNC)
, vol. 14, issue 4, pp. 19-40, 2022.
Sayedahmed, H. A. M., E. M. Elgamal, and H. A. Hefny,
"
F-802.11P: A FUZZY ENHANCEMENT FOR IEEE 802.11P IN VEHICLE-TO-EVERYTHING COMMUNICATIONS
",
International Journal of Computer Networks & Communications (IJCNC)
, vol. 14, issue 4, pp. 19-40, 2022.
Publications
Bio
Links
Tags
Attack Chain
(1)
Autism
(1)
Big Data; Traffic Prediction; Conceptual Framework; Processing Frameworks; Transportation
(1)
collaborative recommender system
(1)
Cybercriminals
(1)
Cybersecurity
(1)
Deep learning
(1)
DSRC
(3)
Dynamic Analysis
(1)
Encryption
(1)
Ensemble deep learning approaches.
(1)
ensemble method.
(1)
Fuzzy logic
(3)
IEEE 802.11p
(3)
IoT intrusion detection
(1)
LSTM and attention
(1)
machine learning
(1)
machine learning.
(1)
Malware
(1)
Molecular dynamic simulation
(1)
multicast routing; internet of things; IoT; neural network; quality of services; QoS; heuristic algorithms.
(1)
Neurexin1α
(1)
NLP
(1)
Non-syndromic intellectual disability
(1)
profile injection
(2)
Q&A Arabic corpus
(1)
Ransomware
(1)
recommender system
(1)
Shilling attack
(1)
Shilling attack detection
(1)
Static Analysis
(1)
Transformers
(1)
vehicle-to-everything.
(3)
Recent Publications
An Efficient Intrusion Detection Approach Using Ensemble Deep Learning models for IoT
A novel intelligent approach for fight delay prediction
Multimedia Transfer Over Wi-Fi Direct based on Fuzzy Clustering for Vehicular Communications
Crypto-Ransomware Detection and Prevention Techniques and Tools: A Survey
Traffic Flow Prediction Using Big Data and Geographic Information Systems: A Survey of Data Sources, Frameworks, Challenges, and Opportunities
more