Omar Reyad
Orcid: 0000-0003-3479-6986
According to our database1,
Omar Reyad
authored at least 19 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Efficient Intelligent E-Learning Behavior-Based Analytics of Student's Performance Using Deep Forest Model.
Comput. Syst. Sci. Eng., 2024
2023
Comput. Syst. Sci. Eng., 2023
2022
Software requirement selection using a combined multi-objective optimisation technique.
IET Softw., December, 2022
2021
A Pilot Study of Smart Agricultural Irrigation using Unmanned Aerial Vehicles and IoT-Based Cloud System.
CoRR, 2021
Genetic K-Means Adaption Algorithm for Clustering Stakeholders in System Requirements.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2021
2020
J. Intell. Fuzzy Syst., 2020
CoRR, 2020
CoRR, 2020
Novel Coronavirus COVID-19 Strike on Arab Countries and Territories: A Situation Report I.
CoRR, 2020
CoRR, 2020
2019
Proceedings of the International Conference on Advanced Machine Learning Technologies and Applications, 2019
Proceedings of the International Conference on Advanced Machine Learning Technologies and Applications, 2019
2018
A Novel Image Encryption Scheme Based on Different Block Sizes for Grayscale and Color Images.
CoRR, 2018
Proceedings of the International Conference on Advanced Machine Learning Technologies and Applications, 2018
2016
Pseudo-random Sequence Generation from Elliptic Curves over a Finite Field of Characteristic 2.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2016
2015
Image Encryption Using Koblitz's Encoding and New Mapping Method Based on Elliptic Curve Random Number Generator.
Proceedings of the Multimedia Communications, Services and Security, 2015
2014
Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014