Publications

Export 51 results:
Sort by: Author Title Type [ Year  (Asc)]
2007
Xiao, K., S. H. Ho, A. E. Hassanien, V. N. Du, and Q. Salih, " Fuzzy C-means clustering with adjustable feature weighting distribution for brain MRI ventricles segmentation. ", SIP 2007: 466-471, Honolulu, Hawaii, USA, August 20-22, 2007.
2010
El-Bendary, N., H. M. Zawbaa, M. S. Daoud, A. E. Hassanien, and K. Nakamatsu, "ArSLAT: Arabic sign language alphabets translator", Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on: IEEE, pp. 590–595, 2010. Abstract
n/a
El-Bendary, N., H. M. Zawbaa, M. S. Daoud, A. E. Hassanien, and K. Nakamatsu, "ArSLAT: Arabic sign language alphabets translator", Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on: IEEE, pp. 590–595, 2010. Abstract
n/a
Hassanien, A. E., G. Schaefer, and A. Darwish, "Computational intelligence in speech and audio processing: recent advances", Soft Computing in Industrial Applications: Springer Berlin Heidelberg, pp. 303–311, 2010. Abstract
n/a
Hassanien, A. E., G. Schaefer, and A. Darwish, "Computational intelligence in speech and audio processing: recent advances", Soft Computing in Industrial Applications: Springer Berlin Heidelberg, pp. 303–311, 2010. Abstract
n/a
Heba, E. F., A. Darwish, A. E. Hassanien, and A. Abraham, "Principle components analysis and support vector machine based intrusion detection system", Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on: IEEE, pp. 363–367, 2010. Abstract
n/a
Heba, E. F., A. Darwish, A. E. Hassanien, and A. Abraham, "Principle components analysis and support vector machine based intrusion detection system", Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on: IEEE, pp. 363–367, 2010. Abstract
n/a
2011
Salama, M. A., H. F. Eid, R. A. Ramadan, A. Darwish, and A. E. Hassanien, "Hybrid intelligent intrusion detection scheme", Soft computing in industrial applications: Springer Berlin Heidelberg, pp. 293–303, 2011. Abstract
n/a
Darwish, A., A. E. Hassanien, Q. Tan, and N. R. Pal, "Securing patients medical images and authentication system based on public key infrastructure", Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011: Springer Berlin Heidelberg, pp. 27–34, 2011. Abstract
n/a
Darwish, A., A. E. Hassanien, Q. Tan, and N. R. Pal, "Securing patients medical images and authentication system based on public key infrastructure", Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011: Springer Berlin Heidelberg, pp. 27–34, 2011. Abstract
n/a
Darwish, A., and A. E. Hassanien, "Wearable and implantable wireless sensor network solutions for healthcare monitoring", Sensors, vol. 11, no. 6: Molecular Diversity Preservation International, pp. 5561–5595, 2011. Abstract
n/a
Darwish, A., and A. E. Hassanien, "Wearable and implantable wireless sensor network solutions for healthcare monitoring", Sensors, vol. 11, no. 6: Molecular Diversity Preservation International, pp. 5561–5595, 2011. Abstract
n/a
2012
Li, J., B. Dai, K. Xiao, and A. E. Hassanien, "Density based fuzzy thresholding for image segmentation", International Conference on Advanced Machine Learning Technologies and Applications: Springer Berlin Heidelberg, pp. 118–127, 2012. Abstract
n/a
Li, J., B. Dai, K. Xiao, and A. E. Hassanien, "Density based fuzzy thresholding for image segmentation", International Conference on Advanced Machine Learning Technologies and Applications: Springer Berlin Heidelberg, pp. 118–127, 2012. Abstract
n/a
Eid, H. F., A. Darwish, A. E. Hassanien, and T. - H. Kim, "Intelligent hybrid anomaly network intrusion detection system", Communication and networking: Springer Berlin Heidelberg, pp. 209–218, 2012. Abstract
n/a
Eid, H. F., A. Darwish, A. E. Hassanien, and T. - H. Kim, "Intelligent hybrid anomaly network intrusion detection system", Communication and networking: Springer Berlin Heidelberg, pp. 209–218, 2012. Abstract
n/a
Saad, O., A. Darwish, and R. Faraj, "A survey of machine learning techniques for Spam filtering", International Journal of Computer Science and Network Security (IJCSNS), vol. 12, no. 2: International Journal of Computer Science and Network Security, pp. 66, 2012. Abstract
n/a
Li, J., B. Dai, K. Xiao, and A. E. Hassanien, "Density Based Fuzzy Thresholding for Image Segmentation", Advanced Machine Learning Technologies and Applications (AMLTA), Cairo Egypt, pp. 118--127, 2012. Abstract3220118.pdf

In this paper, we introduce an image segmentation framework which
applies automatic threshoding selection using fuzzy set theory and fuzzy
density model. With the use of different types of fuzzy membership function,
the proposed segmentation method in the framework is applicable for images of
unimodal, bimodal and multimodal histograms. The advantages of the method
are as follows: (1) the threshoding value is automatically retrieved thus requires
no prior knowledge of the image; (2) it is not based on the minimization of a
criterion function therefore is suitable for image intensity values distributed
gradually, for example, medical images; (3) it overcomes the problem of local
minima in the conventional methods. The experimental results have
demonstrated desired performance and effectiveness of the proposed approach.

2014
Schaefer, G., N. P. Doshi, Qinghua Hu, and A. E. Hassanien, "Classification of HEp-2 Cell Images Using Compact Multi-Scale Texture Information and Margin Distribution Based Bagging", International Conference on Advanced Machine Learning Technologies and Applications: Springer International Publishing, pp. 299–308, 2014. Abstract
n/a
Davendra, D., A. El-Atta, H. Ahmed, M. A. Abu ElSoud, M. Adamek, M. Adhikari, A. Adl, H. Aldosari, Abder-Rahman Ali, A. F. Ali, et al., "Cordeschi, Nicola 43 Couceiro, Micael 83, 131 Czopik, Jan 365 Dasgupta, Kousik 271", Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014, vol. 303: Springer, pp. 439, 2014. Abstract
n/a
Dadkhah, S., A. A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, "An effective SVD-based image tampering detection and self-recovery using active watermarking", Signal Processing: Image Communication, vol. 29, no. 10: Elsevier, pp. 1197–1210, 2014. Abstract
n/a
Acharjee, S., S. Chakraborty, S. Samanta, A. T. Azar, A. E. Hassanien, and N. Dey, "Highly secured multilayered motion vector watermarking", International Conference on Advanced Machine Learning Technologies and Applications: Springer International Publishing, pp. 121–134, 2014. Abstract
n/a
Acharjee, S., S. Chakraborty, S. Samanta, A. T. Azar, A. E. Hassanien, and N. Dey, "Highly secured multilayered motion vector watermarking", The 2nd International Conference on Advanced Machine Learning Technologies and Applications , Egypt, 28-30 Nov. 2014.
2015
Ashour, A. S., S. Samanta, N. Dey, N. Kausar, W. B. Abdessalemkaraa, A. E. Hassanien, and others, "Computed tomography image enhancement using cuckoo search: a log transform based approach", Journal of Signal and Information Processing, vol. 6, no. 03: Scientific Research Publishing, pp. 244, 2015. Abstract
n/a
Tourism