Publications

Export 1250 results:
Sort by: Author Title [ Type  (Desc)] Year
Thesis
Zawbaa, H. M., and A. E. Hassanien, Automatic Soccer Video Summarization, , Cairo, Cairo Unversity, 2012. Abstract

This thesis presents an automatic soccer video summarization system using machine learning (ML) techniques. The proposed system is composed of ve phases. Namely; in the pre-processing phase, the system segments the whole video stream into small video shots. Then, in the shot processing
phase, it applies two types of classi cation (shot type classi cation and play / break classification) to the video shots resulted from the pre-processing phase. Afterwards, in the replay detection phase, the proposed system applies two machine learning algorithms, namely; support vector machine (SVM) and arti cial neural network (ANN), for emphasizing important segments with championship logo appearance. Also, in the excitement event detection phase, the proposed system uses both machine learning algorithms for detecting the scoreboard which contain an information about the score of the game. The proposed system also uses k-means algorithm and Hough line transform for detecting vertical goal posts and Gabor lter for detecting goal net. Finally, in the event detection and summarization phase, the proposed system highlights the most important events during the match. Experiments on real soccer videos demonstrate encouraging results. The event detection and summarization has attained recall 94% and precision 97.3% for soccer match videos from ve international soccer championships.

Salama, M., Data Mining for Medical Informatics, , Cairo, Cairo Unv, 2012. AbstractThesis.pdfPresentation.pdf

The work presented in this thesis investigates the nature of real-life data, mainly in the medical field, and the problems in handling such nature by the conventional data mining techniques. Accordingly, a set of alternative techniques are proposed in this thesis to handle the medical data in the three stages of data mining process. In the first stage which is preprocessing, a proposed technique named as interval-based feature evaluation technique that depends on a hypothesis that the decrease of the overlapped interval of values for every class label leads to increase the importance of such attribute. Such technique handles the difficulty of dealing with continuous data attributes without the need of applying discretization of the input and it is proved by comparing the results of the proposed technique to other attribute evaluation and selection techniques. Also in the preprocessing stage, the negative effect of normalization algorithm before applying the conventional PCA has been investigated and how the avoidance of such algorithm enhances the resulted classification accuracy. Finally in the preprocessing stage, an experimental analysis introduces the ability of rough set methodology to successfully classify data without the need of applying feature reduction technique. It shows that the overall classification accuracy offered by the employed rough set approach is high compared with other machine learning techniques including Support Vector Machine, Hidden Naive Bayesian network, Bayesian network and other techniques.
In the machine learning stage, frequent pattern-based classification technique is proposed; it depends on the detection of variation of attributes among objects of the same class. The preprocessing of the data like standardization, normalization, discretization or feature reduction is not required in this technique which enhances the performance in time and keeps the original data without being distorted. Another contribution has been proposed in the machine learning stage including the support vector machine and fuzzy c-mean clustering techniques; this contribution is about the enhancement of the Euclidean space calculations through applying the fuzzy logic in such calculations. This enhancement has used chimerge feature evaluation techniques in applying fuzzification on the level of features. A comparison is applied on these enhanced techniques to the other classical data mining techniques and the results shows that classical models suffers from low classification accuracy due to the dependence of un-existed presumption.
Finally, in the visualization stage, a proposed technique is presented to visualize the continuous data using Formal Concept Analysis that is better than the complications resulted from the scaling algorithms.

Abdo, W., Evolutionary Computation in Cryptanalysis, , Cairo Egypt, Al Azhar University and Scientific Research Group in Egypt (SRGE), 2013. ppt_phd_thesis_on_EC_CA.pdfphd_thesis_EC_CA_2013.pdf
Kareem Kamal A.Ghany, and A. E. Hassanien, An Intelligent Hybrid Biometrics System, , Cairo, EGYPT , Cairo University , 2014. thesis_presentation.pdf
Bakrawy, L. M. E., A. - E. " "Hassanien, and N. I. Ghali, Machine Learning in Image Authentication, , Cairo, Al-Azhar University, 2012. Abstract

In recent years image authentication has gained substantial attraction by the research community. It promises the solution to many problems such as content piracy, illicit manipulation of medical/legal documents, content security and so on. As watermark-based image authentication approaches are efficient and attractive, some types of watermarks such as logos, labels, trademark, or random sequence representing the author’s ownership, are mbedded into the desired digital image. Generally, a registration to the authentication center is necessary, which helps to solve ownership disputes by identifying the owner of the disputed media. If necessary, the embedded watermark in the digital image can be used to verify ownership Due to the open environment of Internet downloading, copyright protection introduces a new set of challenging problems regarding security and illegal distribution of privately owned images. One solution to these problems is digital watermarking, i.e., the insertion of information into the image data in such a way that the added information is not visible and yet resistant to image alterations. A watermarking technique is to prevent digital images that belong to rightful owners from being illegally commercialized or used, and it can verify the intellectual property right. The watermark should be robust and transparent, but the ways of pursuing transparency and robustness are conflict. For instance, if we would like to concentrate on the transparency issue, it is natural to embed the smallest modulation into images whenever possible. However, due to such small values in the embedded watermark, attacks can easily destroy the problems The first proposed solution is based on the associative watermarking and vector quantization. It achieves more effective against several images processing such as blurring, sharpening adding in Gaussian noise, cropping, and JPEG lossy compression especially in case of Gaussian noise and blurring. Also this technique is implemented to hide biometric data, fingerprint image, over three different types of medical images: CT, MRI and interventional images. It also achieves an effective resistance against several images processing such as JPEG lossy compression, sharpening, blurring and adding in Gaussian noise The second contribution in this thesis is strict authentication of multimodal biometric images using an improved secure hash function (ISHA-1) and near sets. It indicates that the proposed hash function is collision resistant and assures a good compression and preimage resistance. Also it reduces the time of implementation comparing to standard secure hash function. Moreover, the difference in time between SHA-1 and ISHA-1 increases by increasing the number of letters in message since the running time of implementation of ISHA-1 is limited compared to the running time of implementation of SHA-1. Also the proposed approach guarantees the security assurance and reduces the time of implementation. The third proposed contribution is fragile watermarking approach for image authentication based on rough k-means only and hybridization of rough k-means and particle swarm optimization. It can embed watermark without causing noticeable visual artifacts, and does not only achieve superior tamper detection in images accurately, it also recovers tampered regions effectively. In addition, it shows that the proposed approach can effectively thwart different attacks, such as the cut-and paste attack and collage attack, while sustaining superior tamper detection and localization accuracy. Moreover, the running time of implemented hybrid system is limited compared to the running time of the implemented rough k-means only. Especially, when we used exponential particle swarm optimization to optimize the parameters of rough k-means.

Report
Newspaper Article
Hassanien, A. E., "الطريق الى جوائز البحث العلمى", جوائز البحث العلمى, 2015. Abstract

ستناقش المحاضرة اهمية البحث العلمى والابداع وانواع الجوائز العلمية وتصنيفاتها وانواعها وشروطها بداية من جوائز الجامعة (تشجيعية - تقديرية - تفوق) ثم الدولة (تشجيعية - تفوق - تقديرية - النيل) جوائز على مستوى العالم الاسلامى(الايسيسكووالمصطفى الايرانية) وجوائز على مستوى الدول العربية (جائزة عبد الحميد شومان) وجوائز الاتحاد الافريقى على مستوى القارة الافريقية والعالمية (فيصل ونوبل)

Miscellaneous
Smolinski, T. G., M. G. Milanova, and A. - E. Hassanien, Applications of Computational Intelligence in Biology: Current Trends and Open Problems, : Springer, 2008. Abstract
n/a
Smolinski, T. G., M. G. Milanova, and A. - E. Hassanien, Applications of Computational Intelligence in Biology: Current Trends and Open Problems, : Springer, 2008. Abstract
n/a
Hassanien, A. - E., A. T. Azar, V. Snasel, J. Kacprzyk, and J. H. Abawajy, Big data in complex systems: challenges and opportunities, : Springer, 2015. Abstract
n/a
Hassanien, A. E., T. - H. Kim, J. Kacprzyk, and A. I. Awad, Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, : Springer, 2014. Abstract
n/a
Hassanien, A. E., and A. A. A. T. Az Ar, Brain-Computer Interfaces, : Springer International Publishing, 2015. Abstract
n/a
Smolinski, T. G., M. G. Milanova, and A. - E. Hassanien, Computational Intelligence in Biomedicine and Bioinformatics: Current trends and applications, : Springer, 2009. Abstract
n/a
Smolinski, T. G., M. G. Milanova, and A. - E. Hassanien, Computational Intelligence in Biomedicine and Bioinformatics: Current trends and applications, : Springer, 2009. Abstract
n/a
Schaefer, G., A. Hassanien, and J. Jiang, Computational Intelligence in Medical Imaging: Techniques and Applications, : CRC press, 2009. Abstract
n/a
Hassanien, A. - E., and A. Abraham, Computational intelligence in multimedia processing: recent advances, : Springer, 2008. Abstract
n/a
Hassanien, A. - E., and A. Abraham, Computational intelligence in multimedia processing: recent advances, : Springer, 2008. Abstract
n/a
Tourism