.

Browsing by Author "Haraty, Ramzi A."

LAUR Repository

Browsing by Author "Haraty, Ramzi A."

Sort by: Order: Results:

  • ADD 
    Haraty, Ramzi A.; Varjabedian, Ralph (IEEE Computer Society, 2018-02-21)
  • Haraty, Ramzi A.; Khatib, Samer A. (International Society for Computers and Their Applications (ISCA), 2018-02-13)
  • Haraty, Ramzi A.; Mansour, Nashat; Daher, Walid (ACTA Press, 2018-02-19)
  • Haraty, Ramzi A.; Bitar, Georges (2019-03-15)
    Today, there is a great urge to “Go Green” in many facets in our life, such as reducing the consumption of energy and creating more eco-friendly products as a solution to reduce the crisis that we might face in the future. ...
  • Haraty, Ramzi A.; Naous, Mirna F.; Mourad, Azzam (2015-11-24)
    Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. Ordinary users ...
  • El-Kassar, A. N.; Haraty, Ramzi A.; Otrok, Hadi (IEEE, 2017-04-05)
    Summary form only given. In 1985 a powerful and practical public-key scheme was produced by ElGamal; his work was applied using large prime integers. El-Kassar et al. and El-Kassar and Haraty modified the ElGamal public-key ...
  • Mansour, Nashat; Haraty, Ramzi A.; Daher, Walid; Houri, Manal (2016-05-09)
    This work addresses the information retrieval problem of auto-indexing Arabic documents. Auto-indexing a text document refers to automatically extracting words that are suitable for building an index for the document. In ...
  • Haidar, Imane; Haidar, Ali Massoud; Haraty, Ramzi A. (IEEE, 2019-03-18)
    Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. Nowadays, security has become an essential part in our daily life; from protecting mobile chats ...
  • Haraty, Ramzi A.; Hammoud, Ahmad (2018-02-05)
  • BIRP 
    Haraty, Ramzi A.; Sadek, Rabie; Lee, Ilhyun (IEEE, 2018-01-25)
    SWIFT is a financial institution, which provides an interface for banks in order to communicate and transfer money worldwide. These banks, together with their branches incur significant expenses including security ...
  • Haraty, Ramzi A.; Rahhal, Imad (International Association for Computer and Information Science, 2018-02-16)
  • Haraty, Ramzi A.; Abbass, Jad F. (IEEE, 2018-02-19)
    Multitasking in both uniprocessor (multithreading) and multiprocessor (multiprocessing) systems have been attracted by many applications. Database systems are somewhat the most important in this regard, especially in ...
  • BVA+ 
    Haraty, Ramzi A.; Zeitunlian, Arda (INSTICC, 2018-02-16)
  • Haraty, Ramzi A. (Association for Computing Machinery, 2018-02-12)
  • CASRA+ 
    Haraty, Ramzi A.; El Ariss, Omar (2015-10-23)
    The research proposed here is for an Arabic speech recognition application, concentrating on the Lebanese dialect. The system starts by sampling the speech, which is the process of transforming the sound from analog to ...
  • Haraty, Ramzi A.; Zantout, Bassem (2017-02-01)
    The paper introduces a new collaborative technique for assuring data integrity while avoiding traffic analysis and other types of similar attacks (e.g., man-in-the-middle, data source fingerprinting, etc.). The new ...
  • Haraty, Ramzi A.; Zantout, Bassam (2017-01-31)
    This paper presents two of the most common and existing techniques (BitTorrent and NetCamo) used during data communication for avoiding traffic analysis as well as assuring data integrity. The paper also discusses these ...
  • Haraty, Ramzi A.; El-Kassar, A. N.; Otrok, Hadi (INSTICC, 2017-06-29)
    In 1985 a powerful and practical public-key scheme was produced by ElGamal; his work was applied using large prime integers. El-Kassar et al. and El-Kassar and Haraty modified the ElGamal public-key encryption scheme from ...
  • Haraty, Ramzi A.; El-Kassar, A. N.; Otrok, Hadi (2018-03-22)
  • Haraty, Ramzi A.; El-Kassar, A. N.; Shebaro, Bilal M. (2016-05-13)
    A powerful and practical public-key and digital signature scheme was produced by ElGamal. ElGamal public-key and digital signature scheme were modified from the domain of natural integers, Z, to the domains of Gaussian ...