Publications

Export 60 results:
Sort by: Author Title Type [ Year  (Desc)]
2013
El-Bendary, N., Mohamed Mostafa M. Fouad, Rabie A. Ramadan, S. Banerjee, and A. E. Hassanien, "Smart Environmental Monitoring Using Wireless Sensor Networks.", Wireless Sensor Networks: Theory and Applications, pp. 733-755, , USA, CRC Press, Taylor and Francis Group, 2013. k15146_c025.pdf
El-Bendary, N., M. M. M. Fouad, R. A. Ramadan, S. Banerjee, and A. E. Hassanien, "Smart environmental monitoring using wireless sensor networks", Wireless Sensor Networks: From Theory to Applications: CRC Press, pp. 731–754, 2013. Abstract
n/a
El-Bendary, N., M. M. M. Fouad, R. A. Ramadan, S. Banerjee, and A. E. Hassanien, "Smart environmental monitoring using wireless sensor networks", Wireless Sensor Networks: From Theory to Applications: CRC Press, pp. 731–754, 2013. Abstract
n/a
El-Gayyar, M., H. F. ElYamany, T. Gaber, and A. E. Hassanien, "Social network framework for deaf and blind people based on cloud computing", Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on: IEEE, pp. 1313–1319, 2013. Abstract
n/a
El-Gayyar, M., H. F. ElYamany, T. Gaber, and A. E. Hassanien, "Social network framework for deaf and blind people based on cloud computing", Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on: IEEE, pp. 1313–1319, 2013. Abstract
n/a
2012
Panda, M., N. El-Bendary, M. Salama, A. E. Hassanien, and A. Abraham, "Social Networks Analysis: Basics, Measures and Visualizing Authorship Networks in DBLP Data", Computational Social Networks: Mining and Visualization, London, Series in Computer Communications and Networks, Springer Verlag, 2012. Abstract

Social Network Analysis (SNA) is becoming an important tool for investigators, but all the necessary information is often available in a distributed environment. Currently there is no information system that helps managers and team leaders to monitor the status of a social network. This chapter presents an overview of the basic concepts of social networks in data analysis including social networks analysis metrics and performances. Different problems in social networks are discussed such as uncertainty, missing data and finding the shortest path in social network. Community structure, detection and visualization in social network analysis is also discussed and reviewed. This chapter bridges the gap among the users by combining social network analysis methods and information visualization technology to help user visually identify the occurrence of a possible relationship amongst the members in a social network. In addition, briefly describing the different performance measures that have been encountered during any network analysis in order to understand the fundamental behind the comprehension. This chapter also, presents an online analysis tool called Forcoa.NET, which is built over the DBLP dataset of publications from the field of computer science, which is focused on the analysis and visualization of the co-authorship relationship based on the intensity and topic of joint publications. Challenges to be ad dressed and future directions of research are also presented and an extensive bibliography is included.order to understand the fundamental behind the comprehension. This chapter also, presents an online analysis tool called Forcoa.NET, which is built over the DBLP dataset of publications from the field of computer science, which is focused on the analysis and visualization of the co-authorship relationship based on the intensity and topic of joint publications. Challenges to be ad dressed and future directions of research are also presented and an extensive bibliography is included.

Salama, M., M. Panda, Y. Elbarawy, A. E. Hassanien, and A. Abraham, "Social Networks Security and Privacy: Basics,Threats and Case Study to Visualize Foreign Terrorist Network dataset", Computational Social Networks: Security and Privacy, London, Series in Computer Communications and Networks, Springer Verlag, , 2012. Abstract

The continuous self-growing nature of social networks makes it hard to define a line of safety around these networks. Users in social networks are not interacting with the web only, but also with trusted groups that may contain enemies. There are different kinds of attacks on these networks including causing damage to the computer systems and steeling information about users. These attacks are not affecting individuals only, but also the organizations they are belonging to. Protection from these attacks should be performed by the users and security experts of the network. Advices should be provided to users of these social networks. Also security-experts should be sure that the contents transmitted through the network do not contain malicious or harmful data. This chapter shows the security risks and the tasks applied to minimize those risks. Explain the most famous ways that attackers and malicious use. Then show the security measures for each way. Also present a security guide and a social network security and privacy made in 2011, and finally a case study about the list of Foreign Terrorist Network dataset.

Ghali, N., M. Panda, A. E. Hassanien, A. Abraham, and V. Snasel, "Social Networks: Computational Aspects and Mining", Computational Social Networks: Tools, Perspectives and Applications, London, Computer and Communication Networks Springer Series, 2012. Abstract

Computational social science is a new emerging field that has overlapping regions from Mathematics, Psychology, Computer Sciences, Sociology,and Management. Social computing is concerned with the intersection of social behavior and computational systems. It supports any sort of social behavior in or through computational systems. It is based on creating or recreating social conventions and social contexts through the use of software and technology. Thus, blogs, email, instant messaging, social network services, wikis, social bookmarking, and other instances of what is often called social software illustrate ideas from social computing. Social network analysis is the study of relationships among social entities. It is becoming an important tool for investigators. However all the necessary information is often distributed over a number of Web sites. Interest in this field is blossoming as traditional practitioners in the social and behavioral sciences are being joined by researchers from statistics, graph theory, machine learning and data mining. In this chapter, we illustrate the concept of social networks from a computational point of view, with a focus on practical services, tools, and applications and open avenues for further research. Challenges to be addressed and future directions of research are presented and an extensive bibliography is also included.

Ghali, N., M. Panda, A. E. Hassanien, A. Abraham, and V. Snasel, "Social networks analysis: Tools, measures and visualization", Computational Social Networks: Springer London, pp. 3–23, 2012. Abstract
n/a
Ghali, N., M. Panda, A. E. Hassanien, A. Abraham, and V. Snasel, "Social networks analysis: Tools, measures and visualization", Computational Social Networks: Springer London, pp. 3–23, 2012. Abstract
n/a
Saad, O., A. Darwish, and R. Faraj, "A survey of machine learning techniques for Spam filtering", International Journal of Computer Science and Network Security (IJCSNS), vol. 12, no. 2: International Journal of Computer Science and Network Security, pp. 66, 2012. Abstract
n/a
2011
Zawbaa, H. M., N. El-Bendary, A. E. Hassanien, G. Schaefer, and S. - S. Yeo, "Support Vector Machine based Logo Detection in Broadcast Soccer Videos", The 16th Online World Conference on Soft Computing in Industrial Applications (WSC16) Advances in Intelligent and Soft Computing, , 5-6 Dec, 2011. Abstract

n/a

El-Bendary, N., O. S. Soliman, N. I. Ghali, A. E. Hassanien, V. Palade, and H. Liu, "A secure directed diffusion routing protocol for wireless sensor networks", Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on: IEEE, pp. 149–152, 2011. Abstract
n/a
El-Bendary, N., O. S. Soliman, N. I. Ghali, A. E. Hassanien, V. Palade, and H. Liu, "A secure directed diffusion routing protocol for wireless sensor networks", Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on: IEEE, pp. 149–152, 2011. Abstract
n/a
Darwish, A., A. E. Hassanien, Q. Tan, and N. R. Pal, "Securing patients medical images and authentication system based on public key infrastructure", Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011: Springer Berlin Heidelberg, pp. 27–34, 2011. Abstract
n/a
Darwish, A., A. E. Hassanien, Q. Tan, and N. R. Pal, "Securing patients medical images and authentication system based on public key infrastructure", Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011: Springer Berlin Heidelberg, pp. 27–34, 2011. Abstract
n/a
Corchado, E. S., V. Snasel, J. Sedano, A. E. Hassanien, J. L. Calvo, and D. Slezak, Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, : Springer Science & Business Media, 2011. Abstract
n/a
Corchado, E. S., V. Snasel, J. Sedano, A. E. Hassanien, J. L. Calvo, and D. Slezak, Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, : Springer Science & Business Media, 2011. Abstract
n/a
Hassanien, A. E., H. Sakai, D. Slezak, M. K. Chakraborty, and W. Zhu, "Special issue: Rough and Fuzzy Methods for Data Mining", International Journal of Hybrid Intelligent Systems, vol. 8, no. 1, pp. 1, 2011. Abstract
n/a
Hassanien, A. E., H. Sakai, D. Slezak, M. K. Chakraborty, and W. Zhu, "Special issue: Rough and Fuzzy Methods for Data Mining", International Journal of Hybrid Intelligent Systems, vol. 8, no. 1, pp. 1, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and J. F. Peters, "Strict authentication of multimodal biometric images using near sets", Soft Computing in Industrial Applications: Springer Berlin Heidelberg, pp. 249–258, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and J. F. Peters, "Strict authentication of multimodal biometric images using near sets", Soft Computing in Industrial Applications: Springer Berlin Heidelberg, pp. 249–258, 2011. Abstract
n/a
Zawbaa, H. M., N. El-Bendary, A. E. Hassanien, and A. Abraham, "SVM-based soccer video summarization system", Nature and Biologically Inspired Computing (NaBIC), 2011 Third World Congress on: IEEE, pp. 7–11, 2011. Abstract
n/a
Zawbaa, H. M., N. El-Bendary, A. E. Hassanien, and A. Abraham, "SVM-based soccer video summarization system", Nature and Biologically Inspired Computing (NaBIC), 2011 Third World Congress on: IEEE, pp. 7–11, 2011. Abstract
n/a
KAMAL, K. A. R. E. E. M., A. GHANY, M. A. Moneim, N. I. Ghali, A. E. Hassanien, and H. A. Hefny, A symmetric bio-hash function based on fingerprint minutiae and principal curves approach, , 2011. Abstract
n/a
Tourism