scispace - formally typeset
G

Gamal Attiya

Researcher at Menoufia University

Publications -  73
Citations -  965

Gamal Attiya is an academic researcher from Menoufia University. The author has contributed to research in topics: Cloud computing & Scheduling (computing). The author has an hindex of 12, co-authored 65 publications receiving 711 citations. Previous affiliations of Gamal Attiya include ESIEE & ESIEE Paris.

Papers
More filters
Journal ArticleDOI

Classification of human cancer diseases by gene expression profiles

TL;DR: A new methodology based on the gene expression profiles to classify human cancer diseases is presented, which combines both Information Gain and Standard Genetic Algorithm and improves the classification performance of other classifiers generally.
Journal ArticleDOI

Task allocation for maximizing reliability of distributed systems: a simulated annealing approach

TL;DR: A heuristic algorithm derived from the well-known simulated annealing (SA) technique is presented to quickly solve the problem of task allocation in heterogeneous distributed systems and is compared with those derived by using the branch-and-bound (BB) technique.
Proceedings ArticleDOI

Two phase algorithm for load balancing in heterogeneous distributed systems

TL;DR: A mathematical model for load balancing problem is presented and an optimal, memory efficient, two phase algorithm for allocating program modules (tasks) onto processors of a heterogeneous distributed system to minimize the makespan is proposed.
Journal ArticleDOI

Arabic summarization in Twitter social network

TL;DR: A machine learning based solution for summarizing Arabic micro blogging posts and more specifically Egyptian dialect summarization is presented to produce short summary for Arabic tweets related to a specific topic in less time and effort.
Journal ArticleDOI

A secure cloud storage system combining time-based one-time password and automatic blocker protocol

TL;DR: The proposed system enhances the authentication level of security by using two authentication techniques; time-based one-time password (TOTP) for cloud users verification and automatic blocker protocol (ABP) to fully protect the system from unauthorized third party auditor.