Publications

Export 159 results:
Sort by: Author Title Type [ Year  (Desc)]
2012
Sami, M., N. El-Bendary, T. - H. Kim, and A. E. Hassanien, "Using particle swarm optimization for image regions annotation", International Conference on Future Generation Information Technology: Springer Berlin Heidelberg, pp. 241–250, 2012. Abstract
n/a
2011
Heba, E., M. Salama, A. E. Hassanien, and T. - H. Kim, "Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification", Security Technology - International Conference, SecTech 2011, pp.195-203, Jeju Island, Korea, December 8-10,, 2011. Abstract

To satisfy the ever growing need for effective screening and diagnostic tests, medical practitioners have turned their attention to high resolution, high throughput methods. One approach is to use mass spectrometry based methods for disease diagnosis. Effective diagnosis is achieved by classifying the mass spectra as belonging to healthy or diseased individuals. Unfortunately, the high resolution mass spectrometry data contains a large degree of noisy, redundant and irrelevant information, making accurate classification difficult. To overcome these obstacles, feature extraction methods are used to select or create small sets of relevant features. This paper compares existing feature selection methods to a novel wrapper-based feature selection and centroid-based classification method. A key contribution is the exposition of different feature extraction techniques, which encompass dimensionality reduction and feature selection methods. The experiments, on two cancer data sets, indicate that feature selection algorithms tend to both reduce data dimensionality and increase classification accuracy, while the dimensionality reduction techniques sacrifice performance as a result of lowering the number of features. In order to evaluate the dimensionality reduction and feature selection techniques, we use a simple classifier, thereby making the approach tractable. In relation to previous research, the proposed algorithm is very competitive in terms of (i) classification accuracy, (ii) size of feature sets, (iii) usage of computational resources during both training and classification phases.

Banerjee, S., N. El-Bendary, A. E. Hassanien, and T. - H. Kim, "A modified pheromone dominant ant colony algorithm for computer virus detection", IEEE 14th International on Multitopic Conference (INMIC), pp. 35-40, Packistan, , 22-24 Dec., 2011. Abstract

This paper proposes an elementary pattern detection approach for viruses propagated through e-mail and address books using the non-uniform pheromone deposition mechanism of ant colony. The local temporary tabu memory has been used to learn the pattern and it can combine known information from past viruses with a type of prediction for future viruses. This is achieved through certain generated test signature of viruses associated with e-mail over landscape. A non-uniform and non-decreasing time function for pheromone deposition and evaporation ensures that subsequent ants who are close enough to a previously selected trial solution will follow the trajectory or test landscape. They are capable to examine gradually thicker deposition of pheromone over the trajectory. It is empirically shown that the proposed modified pheromone learning mechanism can be an alternative approach to detect virus pattern for e-mail messages.

Banerjee, S., N. El-Bendary, A. E. Hassanien, and T. - H. Kim, "A modified pheromone dominant ant colony algorithm for computer virus detection", 2011 IEEE 14th International Multitopic Conference (INMIC), PP. 35-40 , Karachi, Pakistan , 22-24 Dec. 2011. Abstract

This paper proposes an elementary pattern detection approach for viruses propagated through e-mail and address books using the non-uniform pheromone deposition mechanism of ant colony. The local temporary tabu memory has been used to learn the pattern and it can combine known information from past viruses with a type of prediction for future viruses. This is achieved through certain generated test signature of viruses associated with e-mail over landscape. A non-uniform and non-decreasing time function for pheromone deposition and evaporation ensures that subsequent ants who are close enough to a previously selected trial solution will follow the trajectory or test landscape. They are capable to examine gradually thicker deposition of pheromone over the trajectory. It is empirically shown that the proposed modified pheromone learning mechanism can be an alternative approach to detect virus pattern for e-mail messages.

Lamiaa M. El Bakrawy, N. I.Ghali, T. - H. Kim, and A. E. Hassanien, "A Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization ", Journal of Future Generation Communication and Networking, , vol. 4, issue 4, 2011. Abstractblock-wise-based_fragile_watermarking.pdf

In this paper, we propose a fragile watermarking hybrid approach using rough set kmeans and exponential particle swarm optimization (EPSO) systems. It is based on a block-wise dependency mechanism which can detect any alterations made to the protected image. Initially, the input image is divided into blocks with equal size in order to improve image tamper localization precision. Then feature sequence is generated by applying rough k-means and EPSO clustering to create the relationship between all image blocks and cluster
all of them since EPSO is used to optimize the parameters of rough k-means. Both feature sequence and generated secret key are used to construct the authentication data. Each resultant 8-bit authentication data is embedded into the eight least significant bits (LSBs) of the corresponding image block. We gives experimental results which show the feasibility of using these optimization algorithms for the fragile watermarking and demonstrate the
accuracy of the proposed approach. The performance comparison of the approach was also realized. The performance of a fragile watermarking approach has been improved in this paper by using exponential particle swarm optimization (EPSO) to optimize the rough kmean parameters. The proposed approach can embed watermark without causing noticeable visual artifacts, and does not only achieve superior tamper detection in images accurately,
it also recovers tampered regions effectively. In addition, the results show that the proposed approach can effectively thwart different attacks, such as the cut-and paste attack and collage attack, while sustaining superior tamper detection and localization accuracy.

Eid, H. F., M. A. Salama, A. E. Hassanien, and T. - H. Kim, "Bi-layer behavioral-based feature selection approach for network intrusion classification", International Conference on Security Technology: Springer Berlin Heidelberg, pp. 195–203, 2011. Abstract
n/a
Eid, H. F., M. A. Salama, A. E. Hassanien, and T. - H. Kim, "Bi-layer behavioral-based feature selection approach for network intrusion classification", International Conference on Security Technology: Springer Berlin Heidelberg, pp. 195–203, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, T. - H. Kim, and A. E. Hassanien, "A Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization", International Journal of Future Generation Communication and Networking, vol. 4, no. 4, pp. 77–88, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, T. - H. Kim, and A. E. Hassanien, "A Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization", International Journal of Future Generation Communication and Networking, vol. 4, no. 4, pp. 77–88, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and T. - H. Kim, "A fast and secure one-way hash function", International Conference on Security Technology: Springer Berlin Heidelberg, pp. 85–93, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and T. - H. Kim, "A fast and secure one-way hash function", International Conference on Security Technology: Springer Berlin Heidelberg, pp. 85–93, 2011. Abstract
n/a
Salama, M. A., A. E. Hassanien, A. A. Fahmy, and T. - H. Kim, "Heart Sound Feature Reduction Approach for Improving the Heart Valve Diseases Identification", Signal Processing, Image Processing and Pattern Recognition: Springer Berlin Heidelberg, pp. 280–290, 2011. Abstract
n/a
Salama, M. A., A. E. Hassanien, A. A. Fahmy, and T. - H. Kim, "Heart Sound Feature Reduction Approach for Improving the Heart Valve Diseases Identification", Signal Processing, Image Processing and Pattern Recognition: Springer Berlin Heidelberg, pp. 280–290, 2011. Abstract
n/a
Zawbaa, H. M., N. El-Bendary, A. E. Hassanien, and T. - H. Kim, "Machine learning-based soccer video summarization system", Multimedia, Computer Graphics and Broadcasting: Springer Berlin Heidelberg, pp. 19–28, 2011. Abstract
n/a
Zawbaa, H. M., N. El-Bendary, A. E. Hassanien, and T. - H. Kim, "Machine learning-based soccer video summarization system", Multimedia, Computer Graphics and Broadcasting: Springer Berlin Heidelberg, pp. 19–28, 2011. Abstract
n/a
Banerjee, S., N. El-Bendary, A. E. Hassanien, and T. - H. Kim, "A modified pheromone dominant ant colony algorithm for computer virus detection", Multitopic Conference (INMIC), 2011 IEEE 14th International: IEEE, pp. 35–40, 2011. Abstract
n/a
Banerjee, S., N. El-Bendary, A. E. Hassanien, and T. - H. Kim, "A modified pheromone dominant ant colony algorithm for computer virus detection", Multitopic Conference (INMIC), 2011 IEEE 14th International: IEEE, pp. 35–40, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and T. - H. Kim, "A rough k-means fragile watermarking approach for image authentication", Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on: IEEE, pp. 19–23, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and T. - H. Kim, "A rough k-means fragile watermarking approach for image authentication", Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on: IEEE, pp. 19–23, 2011. Abstract
n/a
KAMAL, K. A. R. E. E. M., A. GHANY, M. A. Moneim, N. I. Ghali, A. E. Hassanien, and H. A. Hefny, A symmetric bio-hash function based on fingerprint minutiae and principal curves approach, , 2011. Abstract
n/a
KAMAL, K. A. R. E. E. M., A. GHANY, M. A. Moneim, N. I. Ghali, A. E. Hassanien, and H. A. Hefny, A symmetric bio-hash function based on fingerprint minutiae and principal curves approach, , 2011. Abstract
n/a
2010
Kudělka, M., Václav Snášel, Z. Horák, A. E. Hassanien, and A. Abraham, "Web communities defined by web page content", Computational Social Network Analysis: Springer London, pp. 349–370, 2010. Abstract
n/a
Kudělka, M., Václav Snášel, Z. Horák, A. E. Hassanien, and A. Abraham, "Web communities defined by web page content", Computational Social Network Analysis: Springer London, pp. 349–370, 2010. Abstract
n/a
2009
Kudelka, M., V. Snásel, Z. Horak, and A. E. Hassanien, "From Web Pages to Web Communities", Annual International Workshop on DAtabases, TExts, Specifications and Objects, Spindleruv Mlyn, Czech Republic , April 15-17, 2009. Abstract

In this paper we are looking for a relationship between the intent of Web pages, their architecture and the communities who take part in their usage and creation. From our point of view, the Web page is entity carrying information about these communities and this paper describes techniques, which can be used to extract mentioned information as well as tools usable in analysis of these information. Information about communities could be used in several ways thanks to our approach. Finally we present an experiment which illustrates the benefits of our approach.

Hassanien, A. E., A. Abraham, J. F. Peters, and J. Kacprzyk, "Rough Sets in Medical Imaging: Foundations and Trends", Computational Intelligence in Medical Imaging: Techniques and Applications, USA, CRC, 2009. Abstract

n/a

Tourism