default search action
Hamdy S. Soliman
Person information
- affiliation: New Mexico Institute of Mining and Technology, Socorro, USA
Other persons with the same name
- Hamdy Soliman 0002 — Sakhr Software, Cairo, Egypt
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Ahshanul Haque, Md Naseef-Ur-Rahman Chowdhury, Hamdy Soliman, Mohammad Sahinur Hossen, Tanjim Fatima, Imtiaz Ahmed:
Wireless Sensor Networks Anomaly Detection Using Machine Learning: A Survey. IntelliSys (3) 2023: 491-506 - [c25]Md Naseef-Ur-Rahman Chowdhury, Ahshanul Haque, Hamdy Soliman, Mohammad Sahinur Hossen, Tanjim Fatima, Imtiaz Ahmed:
Android Malware Detection Using Machine Learning: A Review. IntelliSys (3) 2023: 507-522 - [i2]Ahsnaul Haque, Md Naseef-Ur-Rahman Chowdhury, Hamdy Soliman, Mohammad Sahinur Hossen, Tanjim Fatima, Imtiaz Ahmed:
Wireless Sensor Networks anomaly detection using Machine Learning: A Survey. CoRR abs/2303.08823 (2023) - [i1]Md Naseef-Ur-Rahman Chowdhury, Ahshanul Haque, Hamdy Soliman, Mohammad Sahinur Hossen, Tanjim Fatima, Imtiaz Ahmed:
Android Malware Detection using Machine learning: A Review. CoRR abs/2307.02412 (2023) - 2020
- [j10]Abdelmounaam Rezgui, Nickolas Davis, Zaki Malik, Brahim Medjahed, Hamdy S. Soliman:
CloudFinder: A System for Processing Big Data Workloads on Volunteered Federated Clouds. IEEE Trans. Big Data 6(2): 347-358 (2020)
2010 – 2019
- 2019
- [c24]Andres Quan, Charles Herrmann, Hamdy Soliman:
Project Vulture: A Prototype for Using Drones in Search and Rescue Operations. DCOSS 2019: 619-624 - 2018
- [c23]Peshal Pokhrel, Hamdy Soliman:
Advancing Early Forest Fire Detection Utilizing Smart Wireless Sensor Networks. AmI 2018: 63-73 - 2017
- [c22]Nickolas Allen Davis, Abdelmounaam Rezgui, Hamdy Soliman, Skyler Manzanares, Milagre Coates:
FailureSim: A System for Predicting Hardware Failures in Cloud Data Centers Using Neural Networks. CLOUD 2017: 544-551 - 2013
- [j9]Mohammad Alotaibi, Hamdy Soliman:
Modeling and Simulation Analysis of an Efficient MASNET Routeless Routing Protocol. IEEE Commun. Lett. 17(12): 2324-2327 (2013) - [c21]Omar Soliman, Abdelmounaam Rezgui, Hamdy Soliman, Najib Manea:
Mobile Cloud Gaming: Issues and Challenges. MobiWIS 2013: 121-128 - 2011
- [j8]Mohammad Al-Otaibi, Hamdy S. Soliman, Jun Zheng:
A multipath routeless routing protocol with an efficient location update mechanism. Int. J. Internet Protoc. Technol. 6(1/2): 75-82 (2011) - [j7]Hamdy S. Soliman, Mohammad Al-Otaibi:
Enhancing AODV routing protocol over mobile ad hoc sensor networks. Int. J. Sens. Networks 10(1/2): 36-41 (2011) - 2010
- [j6]Mohammad Al-Otaibi, Hamdy S. Soliman:
Efficient geographic routeless routing protocols with enhanced location update mechanism. Int. J. Sens. Networks 8(3/4): 160-171 (2010) - [c20]Mohammad Alotaibi, Hamdy Soliman:
Adaptive Channel Width for MASNET Routeless Routing Protocol. CCNC 2010: 1-6 - [c19]Mohammad Alotaibi, Hamdy Soliman:
Static Channel Width Routeless Routing with Network Holes Avoidance (SCWRRHA) Protocol. CCNC 2010: 1-2 - [c18]Mohammad Alotaibi, Hamdy Soliman:
Static Channel Width Routeless Routing with Obstacle Avoidance (SCWRROA) Protocol. CCNC 2010: 1-2 - [c17]Komal Sudan, Ashish Mishra, Hamdy Soliman:
Using Wireless Sensor Networks and Artificial Neural Networks for Implementing a Border Intrusion Detection System. ICWN 2010: 478-482
2000 – 2009
- 2009
- [c16]Hamdy Soliman, Mohammad Alotaibi:
An Efficient Routing Approach over Mobile Wireless Ad-Hoc Sensor Networks. CCNC 2009: 1-5 - [c15]Mohammad Al-Otaibi, Hamdy S. Soliman:
Efficient Controlled Routeless Routing Protocol With Fixed Channel's Width for Mobile Ad Hoc Sensor Networks. ICCCN 2009: 1-7 - [c14]Mohammad Al-Otaibi, Hamdy S. Soliman:
Adaptive versus Static Channel Width for MASNET Routless Routing Protocol. SNA 2009: 166-171 - 2007
- [j5]Ahmed Abdelali, Jim Cowie, Hamdy S. Soliman:
Improving query precision using semantic expansion. Inf. Process. Manag. 43(3): 705-716 (2007) - 2006
- [j4]Hamdy S. Soliman, Mohammed Omari:
A neural networks approach to image data compression. Appl. Soft Comput. 6(3): 258-271 (2006) - [j3]Hamdy S. Soliman, Mohammed Omari:
Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks. Int. J. Netw. Secur. 3(2): 160-171 (2006) - 2005
- [c13]Hamdy S. Soliman, Mohammed Omari:
Application of synchronous dynamic encryption system in mobile wireless domains. Q2SWinet 2005: 24-30 - [c12]Hamdy S. Soliman, Mohammed Omari:
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks. PE-WASUN 2005: 250-254 - 2004
- [c11]Hamdy S. Soliman, Mohammed Omari:
An efficient application of a dynamic crypto system in mobile wireless security. WCNC 2004: 837-842 - 2002
- [c10]Hamdy S. Soliman, Chad Peyton:
A Link-Labeling Algorithm for Computing the Shortest Path based upon Edge and Turn Constraints. CATA 2002: 82-85 - [c9]Hamdy S. Soliman, Chad Peyton:
An Efficient Routing Algorithm for All-Optical Networks with Turn Constraints. MASCOTS 2002: 161-166 - 2001
- [c8]Hamdy S. Soliman:
Neural Net Simulation: SFSN Model For Image Compression. Annual Simulation Symposium 2001: 325-332 - [c7]Chad Peyton, Hamdy S. Soliman:
Modeling technological limitations in all-optical networks. CATA 2001: 280-283 - [c6]Hamdy S. Soliman:
Emulation of task flow distributed system over TCP/IP. CATA 2001: 330-333
1990 – 1999
- 1997
- [j2]Willie Chang, Hamdy S. Soliman:
Image Coding by a Neural Net Classification Process. Appl. Artif. Intell. 11(1): 33-58 (1997) - 1996
- [j1]Willie Chang, Hamdy S. Soliman:
A neural synaptic compression codec for efficient image transmission. Wirel. Pers. Commun. 3(3): 199-214 (1996) - 1994
- [c5]Willie Chang, Hamdy S. Soliman, Andrew H. Sung:
Fingerprint Image Compression by a Natural Clustering Neural Network. ICIP (2) 1994: 341-345 - [c4]Willie Chang, Hamdy S. Soliman, Andrew H. Sung:
Fingerprint Image Compression by a Clustering Learning Network. IEA/AIE 1994: 51-56 - 1993
- [c3]Willie Chang, Hamdy S. Soliman, Andrew H. Sung:
Preserving visual perception by learning natural clustering. ICNN 1993: 661-666 - 1992
- [c2]Vladimir I. Ivanov, Hamdy S. Soliman:
The effect of strict firing and real characteristics of multiprocessors on performance - a simulation approach. Annual Simulation Symposium 1992: 172-182 - [c1]Hamdy S. Soliman, John B. Johnston:
Dynamic Genericity in Imperative Languages: Example in CML. ICCI 1992: 96-99
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint