Publications

Export 165 results:
Sort by: [ Author  (Desc)] Title Type Year
A B C D [E] F G H I J K L M N O P Q R S T U V W X Y Z   [Show ALL]
E
El-Atta, A. A. H., M. I. Moussa, and A. E. Hassanien, "Predicting Biological Activity of 2, 4, 6-trisubstituted 1, 3, 5-triazines Using Random Forest", Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014: Springer International Publishing, pp. 101–110, 2014. Abstract
n/a
El Emary, I., and A. - E. Hassanien, "Guest editorial special issue on intelligent multimedia computing", Telecommunication Systems, vol. 40, no. 1: Springer, pp. 1–4, 2009. Abstract
n/a
El Emary, I. M. M., and A. E. Hassanien, "Intelligent agent in telecommunication systems", Telecommunication Systems, vol. 46, no. 3: Springer, pp. 191–193, 2011. Abstract
n/a
El Emary, I., and A. - E. Hassanien, "Guest editorial special issue on intelligent multimedia computing", Telecommunication Systems, vol. 40, no. 1: Springer, pp. 1–4, 2009. Abstract
n/a
El Emary, I. M. M., and A. E. Hassanien, "Intelligent agent in telecommunication systems", Telecommunication Systems, vol. 46, no. 3: Springer, pp. 191–193, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and T. - H. Kim, "A fast and secure one-way hash function", International Conference on Security Technology: Springer Berlin Heidelberg, pp. 85–93, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and J. F. Peters, "Strict authentication of multimodal biometric images using near sets", Soft Computing in Industrial Applications: Springer Berlin Heidelberg, pp. 249–258, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and A. Abraham, "An associative watermarking based image authentication scheme", Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on: IEEE, pp. 823–828, 2010. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and T. - H. Kim, "A rough k-means fragile watermarking approach for image authentication", Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on: IEEE, pp. 19–23, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and T. - H. Kim, "A rough k-means fragile watermarking approach for image authentication", Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on: IEEE, pp. 19–23, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, T. - H. Kim, and A. E. Hassanien, "A Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization", International Journal of Future Generation Communication and Networking, vol. 4, no. 4, pp. 77–88, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and J. F. Peters, "Strict authentication of multimodal biometric images using near sets", Soft Computing in Industrial Applications: Springer Berlin Heidelberg, pp. 249–258, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, T. - H. Kim, and A. E. Hassanien, "A Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization", International Journal of Future Generation Communication and Networking, vol. 4, no. 4, pp. 77–88, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, and A. E. Hassanien, "Intelligent Machine Learning in Image Authentication", Journal of Signal Processing Systems, vol. 78, no. 2: Springer US, pp. 223–237, 2015. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and T. - H. Kim, "A fast and secure one-way hash function", International Conference on Security Technology: Springer Berlin Heidelberg, pp. 85–93, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and A. Abraham, "An associative watermarking based image authentication scheme", Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on: IEEE, pp. 823–828, 2010. Abstract
n/a
Eid Emary, H. M. Zawbaa, A. E. Hassanien, G. Schaefer, and A. T. Azar, "Retinal blood vessel segmentation using bee colony optimisation and pattern search", Neural Networks (IJCNN), 2014 International Joint Conference on: IEEE, pp. 1001–1006, 2014. Abstract
n/a
Eid Emary, H. M. Zawbaa, and A. E. Hassanien, "Binary grey wolf optimization approaches for feature selection", Neurocomputing, vol. 172: Elsevier, pp. 371–381, 2016. Abstract
n/a
Eid Emary, H. M. Zawbaa, A. E. Hassanien, M. F. Tolba, and Václav Snášel, "Retinal vessel segmentation based on flower pollination search algorithm", Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014: Springer International Publishing, pp. 93–100, 2014. Abstract
n/a
Eid Emary, H. M. Zawbaa, A. E. Hassanien, G. Schaefer, and A. T. Azar, "Retinal vessel segmentation based on possibilistic fuzzy c-means clustering optimised with cuckoo search", Neural Networks (IJCNN), 2014 International Joint Conference on: IEEE, pp. 1792–1796, 2014. Abstract
n/a
Eid Emary, H. M. Zawbaa, K. K. A. Ghany, A. E. Hassanien, and B. Parv, "Firefly optimization algorithm for feature selection", Proceedings of the 7th Balkan Conference on Informatics Conference: ACM, pp. 26, 2015. Abstract
n/a
Eid Emary, H. zawbaa, A. E. Hassanien, G. Schaefer, and A. T. Azar, " Retinal Blood Vessel Segmentation using Bee Colony Optimisation and Pattern Search ", The annual IEEE International Joint Conference on Neural Networks (IJCNN) – July 6-, Beijing, China, 6 July, 2014.
Eid Emary, H. zawbaa, A. E. Hassanien, G. Schaefer, and A. T. Azar, " Retinal Vessel Segmentation based on Possibilistic Fuzzy c-means Clustering Optimised with Cuckoo Search", The annual IEEE International Joint Conference on Neural Networks (IJCNN) – July 6-, Beijing, China, 6 July, 2014.
Eid, H. F., A. T. Azar, and A. E. Hassanien, "Improved real-time discretize network intrusion detection system", Proceedings of seventh international conference on bio-inspired computing: theories and applications (BIC-TA 2012): Springer India, pp. 99–109, 2013. Abstract
n/a
Eid, H. F., M. A. Salama, and A. E. Hassanien, "A Feature Selection Approach for Network Intrusion Classification: The Bi-Layer Behavioral-Based", International Journal of Computer Vision and Image Processing (IJCVIP), vol. 3, no. 4: IGI Global, pp. 51–59, 2013. Abstract
n/a
Tourism