scispace - formally typeset
M

Mohamed Elhoseny

Researcher at Mansoura University

Publications -  287
Citations -  11252

Mohamed Elhoseny is an academic researcher from Mansoura University. The author has contributed to research in topics: Computer science & Wireless sensor network. The author has an hindex of 49, co-authored 240 publications receiving 7044 citations. Previous affiliations of Mohamed Elhoseny include Maharaja Agrasen Institute of Technology & Cairo University.

Papers
More filters
Journal ArticleDOI

Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC–BA)

TL;DR: The Naive Bayes classifier with hybrid optimization using Artificial Bee Colony–Bat Algorithm (ABC–BA) was implemented to reduce the energy consumption in VM migration and it was understood that the model was able to achieve the minimum energy consumption and failure rate.
Journal ArticleDOI

Multi-object Detection and Tracking (MODT) Machine Learning Model for Real-Time Video Surveillance Systems

TL;DR: A new MODT methodology that uses an optimal Kalman filtering technique to track the moving objects in video frames using the region growing model and achieves maximum detection and tracking accuracies.
Journal ArticleDOI

Self-maintenance model for Wireless Sensor Networks

TL;DR: A distributed self-healing approach for both node and cluster head levels for wireless Sensor Networks, where, at node level, battery, sensor and receiver faults can be diagnosed while, at cluster head level, transmitter and mal-functional nodes can be detected and recovered.
Journal ArticleDOI

Challenges and recommended technologies for the industrial internet of things: A comprehensive review

TL;DR: This research presents a comprehensive review to study state-of-the-art challenges and recommended technologies for enabling data analysis and search in the future IoT presenting a framework for ICT integration in IoT layers.
Journal ArticleDOI

An energy efficient encryption method for secure dynamic WSN

TL;DR: Simulation results demonstrated that the proposed method exhibited much improved network lifetime and reduced the energy consumption most evenly among all sensor nodes, and overcame many security attacks including brute-force attack, HELLO flood attack, selective forwarding attack, and compromised cluster head attack.