G
Gamal Attiya
Researcher at Menoufia University
Publications - 73
Citations - 965
Gamal Attiya is an academic researcher from Menoufia University. The author has contributed to research in topics: Cloud computing & Scheduling (computing). The author has an hindex of 12, co-authored 65 publications receiving 711 citations. Previous affiliations of Gamal Attiya include ESIEE & ESIEE Paris.
Papers
More filters
Journal ArticleDOI
Classification of human cancer diseases by gene expression profiles
TL;DR: A new methodology based on the gene expression profiles to classify human cancer diseases is presented, which combines both Information Gain and Standard Genetic Algorithm and improves the classification performance of other classifiers generally.
Journal ArticleDOI
Task allocation for maximizing reliability of distributed systems: a simulated annealing approach
Gamal Attiya,Yskandar Hamam +1 more
TL;DR: A heuristic algorithm derived from the well-known simulated annealing (SA) technique is presented to quickly solve the problem of task allocation in heterogeneous distributed systems and is compared with those derived by using the branch-and-bound (BB) technique.
Proceedings ArticleDOI
Two phase algorithm for load balancing in heterogeneous distributed systems
Gamal Attiya,Yskandar Hamam +1 more
TL;DR: A mathematical model for load balancing problem is presented and an optimal, memory efficient, two phase algorithm for allocating program modules (tasks) onto processors of a heterogeneous distributed system to minimize the makespan is proposed.
Journal ArticleDOI
Arabic summarization in Twitter social network
TL;DR: A machine learning based solution for summarizing Arabic micro blogging posts and more specifically Egyptian dialect summarization is presented to produce short summary for Arabic tweets related to a specific topic in less time and effort.
Journal ArticleDOI
A secure cloud storage system combining time-based one-time password and automatic blocker protocol
TL;DR: The proposed system enhances the authentication level of security by using two authentication techniques; time-based one-time password (TOTP) for cloud users verification and automatic blocker protocol (ABP) to fully protect the system from unauthorized third party auditor.