Personal Information
Organización/Lugar de trabajo
Egypt, 12111 Egypt
Sitio web
mloey.github.io
Acerca de
http://www.bu.edu.eg
http://www.bu.edu.eg/staff/mloey
https://mloey.github.io/
Etiquetas
deep learning
machine learning
convolutional neural network
google
facebook
computer
des key creation
programming
data encryption standard
des algorithm
analysis of algorithms
computer security
analytics and design of algorithms
symmetric encryption
css
html 5
html
data science
big data
data mining
caesar cipher
playfair cipher
hill cipher
polyalphabetic ciphers
substitution techniques
monoalphabetic cipher
security structure scheme
finally our book
asymmetric encryption
key properties
cryptography
osi security architecture
closing process
knowledge areas
initiating process
simplified advanced encryption standard
s-aes key generation
develop project management plan
monitor and control project work
direct and manage project work
develop project charter
close project or phase
perform integrated change control
des encryption
stream ciphers and block ciphers
the strength of des
rail fence cipher
vigenere cipher
autokey cipher
transposition techniques
row transposition cipher
vernam cipher
facebook marketing
فيس بوك
فيسبوك
مواقع التواصل
data
course
c++
presentation skills
cv
resume
php
examples
twitter bootstrap
jquery
javascript
html5
gps
system
operating
android
project management process and knowledge area mapp
project management processes
executing process
monitoring and controlling process
planning process
matrix organization
functional organization
organization
organizational structures
projectized organization
influence of organizational structures on projects
program management
pmbok
project management
portfolio management
pmi
project management office
data visualization
stacked autoencoder
ccnas
tools.
hackers tools
threats landscape
we will discuss the following: ccnas overview
ccna security
computer security ccna security lecture 1
pattern searching
regular expression.
naive pattern searching
we will discuss the following:
detect cycle in a directed graph.
depth first traversal
breadth first traversal
search vs traversal
backedge
acyclic vs cyclic graph
directed vs undirected graph
we will discuss the following: graph
and interpolation search
jump search
binary search
intelligence
cancer diseases
tacacs+ and radius.
server based aaa
local based aaa
aaa characteristic
accounting
authorization
authentication
aaa
we will discuss the following: classical security
phishing
pharming
smishing
vishing
distributed dos
denial of service distributed dos man in the middl
wireshark
cisco packet tracer
parrot linux
kali linux
cisco
linear search
growth orders
big o notation
asymptotic notations
analysis and design of algorithms
data structure
googlenet
vggnet
ilsvrc
image processing
zfnet
alexnet
resnet
computer vision
we will discuss the following: rsa key generation
rsa decryption
a real world example
rsa security.
rsa encryption
aes encryption
s-aes decryption
s-aes encryption and decryption
s-aes encryption
we will discuss the following: search algorithms
anaconda.
python
programming languages
some algorithm types
algorithm vs pseudocode
time complexity & space complexity
algorithms
merge sort.
radix sort
counting sort
we will discuss the following: sorting algorithms
insertion sort
selection sort
bubble sort
sorting algorithms
naive algorithm is too slow. the efficient algorit
greatest common divisors
fibonacci
maximum pairwise pr
time complexity
problems.
social media
Ver más
Presentaciones
(49)Recomendaciones
(23)Algorithms Lecture 2: Analysis of Algorithms I
Mohamed Loey
•
Hace 7 años
Convolutional Neural Network Models - Deep Learning
Mohamed Loey
•
Hace 8 años
Deep Learning - Overview of my work II
Mohamed Loey
•
Hace 8 años
PMP Lecture 1: Introduction to Project Management
Mohamed Loey
•
Hace 8 años
Data science
Mohamed Loey
•
Hace 8 años
C++ Programming Language
Mohamed Loey
•
Hace 9 años
Deep learning
Mohamed Loey
•
Hace 8 años
A Pen Based Intelligent System for Educating Arabic Handwriting Deep Learning
Mohamed Loey
•
Hace 8 años
HTML Comprehensive Overview
Mohamed Loey
•
Hace 11 años
HTML + CSS Examples
Mohamed Loey
•
Hace 11 años
PHP Comprehensive Overview
Mohamed Loey
•
Hace 11 años
Writing Professional Resume - CV
Mohamed Loey
•
Hace 10 años
16 Tips of Presentation Skills
Mohamed Loey
•
Hace 10 años
Operating Systems
IES Aramo
•
Hace 10 años
Twitter Bootstrap Comprehensive Overview
Mohamed Loey
•
Hace 11 años
CSS Comprehensive Overview
Mohamed Loey
•
Hace 11 años
JavaScript Comprehensive Overview
Mohamed Loey
•
Hace 11 años
JQuery Comprehensive Overview
Mohamed Loey
•
Hace 11 años
Puzzles for Brain Fitness
scottekim
•
Hace 16 años
Anti GPS
Mohamed Loey
•
Hace 15 años
Operating Systems
Mohamed Loey
•
Hace 15 años
Google Android
Mohamed Loey
•
Hace 15 años
Web 3.0 The Semantic Web
Hatem Mahmoud
•
Hace 16 años
Personal Information
Organización/Lugar de trabajo
Egypt, 12111 Egypt
Sitio web
mloey.github.io
Acerca de
http://www.bu.edu.eg
http://www.bu.edu.eg/staff/mloey
https://mloey.github.io/
Etiquetas
deep learning
machine learning
convolutional neural network
google
facebook
computer
des key creation
programming
data encryption standard
des algorithm
analysis of algorithms
computer security
analytics and design of algorithms
symmetric encryption
css
html 5
html
data science
big data
data mining
caesar cipher
playfair cipher
hill cipher
polyalphabetic ciphers
substitution techniques
monoalphabetic cipher
security structure scheme
finally our book
asymmetric encryption
key properties
cryptography
osi security architecture
closing process
knowledge areas
initiating process
simplified advanced encryption standard
s-aes key generation
develop project management plan
monitor and control project work
direct and manage project work
develop project charter
close project or phase
perform integrated change control
des encryption
stream ciphers and block ciphers
the strength of des
rail fence cipher
vigenere cipher
autokey cipher
transposition techniques
row transposition cipher
vernam cipher
facebook marketing
فيس بوك
فيسبوك
مواقع التواصل
data
course
c++
presentation skills
cv
resume
php
examples
twitter bootstrap
jquery
javascript
html5
gps
system
operating
android
project management process and knowledge area mapp
project management processes
executing process
monitoring and controlling process
planning process
matrix organization
functional organization
organization
organizational structures
projectized organization
influence of organizational structures on projects
program management
pmbok
project management
portfolio management
pmi
project management office
data visualization
stacked autoencoder
ccnas
tools.
hackers tools
threats landscape
we will discuss the following: ccnas overview
ccna security
computer security ccna security lecture 1
pattern searching
regular expression.
naive pattern searching
we will discuss the following:
detect cycle in a directed graph.
depth first traversal
breadth first traversal
search vs traversal
backedge
acyclic vs cyclic graph
directed vs undirected graph
we will discuss the following: graph
and interpolation search
jump search
binary search
intelligence
cancer diseases
tacacs+ and radius.
server based aaa
local based aaa
aaa characteristic
accounting
authorization
authentication
aaa
we will discuss the following: classical security
phishing
pharming
smishing
vishing
distributed dos
denial of service distributed dos man in the middl
wireshark
cisco packet tracer
parrot linux
kali linux
cisco
linear search
growth orders
big o notation
asymptotic notations
analysis and design of algorithms
data structure
googlenet
vggnet
ilsvrc
image processing
zfnet
alexnet
resnet
computer vision
we will discuss the following: rsa key generation
rsa decryption
a real world example
rsa security.
rsa encryption
aes encryption
s-aes decryption
s-aes encryption and decryption
s-aes encryption
we will discuss the following: search algorithms
anaconda.
python
programming languages
some algorithm types
algorithm vs pseudocode
time complexity & space complexity
algorithms
merge sort.
radix sort
counting sort
we will discuss the following: sorting algorithms
insertion sort
selection sort
bubble sort
sorting algorithms
naive algorithm is too slow. the efficient algorit
greatest common divisors
fibonacci
maximum pairwise pr
time complexity
problems.
social media
Ver más