Publications

Export 30 results:
Sort by: [ Author  (Desc)] Title Type Year
A B C D E [F] G H I J K L M N O P Q R S T U V W X Y Z   [Show ALL]
F
Fattah, M. A., A. E. Hassanien, A. Mostafa, A. F. Ali, K. M. Amin, and S. MOHAMED, "Artificial bee colony optimizer for historical Arabic manuscript images binarization", Computer Engineering Conference (ICENCO), 2015 11th International: IEEE, pp. 251–255, 2015. Abstract
n/a
Fattah, M. A., N. Elbendary, M. A. Elsoud, H. Aboul Ella, and M. Tolba, "An Intelligent Approach for Galaxies Images Classification.", 13th IEEE International Conference on Hybrid Intelligent Systems (HIS13) Tunisia, pp. 168-173, 2013, Tunisia, , 4-6 Dec., 2013.
Fatma Yakoub, Moustafa Zein, K. Y. A. A. A. E. H., "Predicting Personality Traits and Social Context Based on Mining the Smartphones SMS Data", Proceedings of the Second Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2015, , Ostrava, Czech Republic, , June 29 - July , 2015. Abstract

Reality Mining is one of the first efforts that have been exerted to utilize smartphone’s data; to analyze human behavior. The smartphone data are used to identify human behavior and discover more attributes about smartphone users, such as their personality traits and their relationship status. Text messages and SMS logs are two of the main data resources from the smartphones. In this paper, The proposed system define the user personality by observing behavioral characteristics derived from smartphone logs and the language used in text messages. Hence, The supervised machine learning methods (K-nearest nighbor (KNN), support vector machine, and Naive Bayes) and text mining techniques are used in studying the textual matter messages. From this study, The correlation between text messages and predicate users personality traits is broken down. The results provided an overview on how text messages and smartphone logs represent the user behavior; as they chew over the user personality traits with accuracy up to 70 %.

Farouk, A., M. Elhoseny, and A. E. Hassanien, "A Proposed Architecture for Key Management Schema in Centralized Quantum Network", Handbook of Research on Machine Learning Innovations and Trends, USA, IGI, 2017. Abstract

Most existing realizations of quantum key distribution (QKD) are point-to-point systems with one source transferring to only one destination. Growth of these single-receiver systems has now achieved a reasonably sophisticated point. However, many communication systems operate in a point-to-multi-point (Multicast) configuration rather than in point-to-point mode, so it is crucial to demonstrate compatibility with this type of network in order to maximize the application range for QKD. Therefore, this chapter proposed architecture for implementing a multicast quantum key distribution Schema. The proposed architecture is designed as a Multicast Centralized Key Management Scheme Using Quantum Key Distribution and Classical Symmetric Encryption. In this architecture, a secured key generation and distribution solution has been proposed for a single host sending to two or more (N) receivers using centralized Quantum Multicast Key Distribution Centre and classical symmetric encryption.

Farouk, A., M. Elhoseny, J. Batle, M. Naseri, and A. E. Hassanien, "A Proposed Architecture for Key Management Schema in Centralized Quantum Network", Handbook of Research on Machine Learning Innovations and Trends: IGI Global, pp. 997–1021, 2017. Abstract
n/a
Tourism