Publications

Export 39 results:
Sort by: [ Author  (Asc)] Title Type Year
A B C D E F [G] H I J K L M N O P Q R S T U V W X Y Z   [Show ALL]
G
Ghany, K. K. A., H. A. Hefny, A. E. Hassanien, and M. F. Tolba, "Kekre's transform for protecting fingerprint template", Hybrid Intelligent Systems (HIS), 2013 13th International Conference on: IEEE, pp. 185–190, 2013. Abstract
n/a
Ghany, K. K. A., H. A. Hefny, A. E. Hassanien, and N. I. Ghali, "A hybrid approach for biometric template security", Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012): IEEE Computer Society, pp. 941–942, 2012. Abstract
n/a
Ghany, K. K. A., H. A. Hefny, A. E. Hassanien, and N. I. Ghali, "A hybrid approach for biometric template security", Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012): IEEE Computer Society, pp. 941–942, 2012. Abstract
n/a
Ghany, K. K. A., A. E. Hassanien, and G. Schaefer, "Similarity measures for fingerprint matching", Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV): The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), pp. 1, 2014. Abstract
n/a
Ghany, K. K. A., G. Hassan, A. E. Hassanien, H. A. Hefny, G. Schaefer, and M. A. R. Ahad, "A hybrid biometric approach embedding DNA data in fingerprint images", Informatics, Electronics & Vision (ICIEV), 2014 International Conference on: IEEE, pp. 1–5, 2014. Abstract
n/a
Ghnaim, W. A. - E., N. I. Ghali, and A. E. Hassanien, "Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique", Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on: IEEE, pp. 600–603, 2010. Abstract
n/a
Ghnaim, W. A. - E., N. I. Ghali, and A. E. Hassanien, "Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique", Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on: IEEE, pp. 600–603, 2010. Abstract
n/a
Ghonaim, W., N. I. Ghali, A. E. Hassanien, and S. Banerjee, "An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack", Memetic Computing, vol. 5, no. 3: Springer Berlin Heidelberg, pp. 179–185, 2013. Abstract
n/a
Ghonaim, W., N. I. Ghali, A. E. Hassanien, and S. Banerjee, "An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack", Memetic Computing, vol. 5, no. 3: Springer Berlin Heidelberg, pp. 179–185, 2013. Abstract
n/a
Grosan, C., and A. E. Hassanien, "Hybrid Self Organizing Neurons and Evolutionary Algorithms for Global Optimization", Journal of Computational and Theoretical Nanoscience, vol. 9, no. 2: American Scientific Publishers, pp. 304–309, 2012. Abstract
n/a
Grosan, C., and A. E. Hassanien, "Hybrid Self Organizing Neurons and Evolutionary Algorithms for Global Optimization", Journal of Computational and Theoretical Nanoscience, vol. 9, issue 2, pp. 304-309, 2012. AbstractWebsite

In this work a new algorithm inspired by the self organizing maps combined with evolutionary algorithms is lined up. A neuron in the map is not evolving by itself but it is the result of the application of an evolutionary algorithm during a set of iterations. This idea really helps to increasing the performance of both self organizing maps and evolutionary algorithms while considered individually. The experiments performed in this research envisage test functions having a single criteria but a high number of dimensions. Comparisons with four other well known metaheuristics for optimization (such as differential evolution, particle swarm optimization, simulated annealing) show the performance and efficiency of the proposed approach.

Grosan, C., and A. E. Hassanien, "Hybrid Self Organizing Neurons and Evolutionary Algorithms for Global Optimization", Journal of Computational and Theoretical Nanoscience, vol. 9, no. 2: American Scientific Publishers, pp. 304–309, 2012. Abstract
n/a
Grosan, C., A. Abraham, and A. - E. Hassanien, "Designing resilient networks using multicriteria metaheuristics", Telecommunication Systems , vol. 40, issue 1-2, pp. 75-88, 2009. AbstractWebsite

The paper deals with the design of resilient networks that are fault tolerant against link failures. Usually,
fault tolerance is achieved by providing backup paths, which are used in case of an edge failure on a primary path. We consider this task as a multiobjective optimization problem: to provide resilience in networks while minimizing the cost subject to capacity constraint. We propose a stochastic approach,
which can generate multiple Pareto solutions in a single run. The feasibility of the proposed method is illustrated by considering several network design problems using a single weighted average of objectives and a direct multiobjective optimization approach using the Pareto dominance concept.

Guangyao Dai, H. L.  Zongmei Wang, Chao Yang, Aboul Ella Hassanieny, and W. Yang, "A Multi-granularity Rough Set Algorithm for Attribute Reduction through Particles Particle Swarm Optimization", IEEE iInternational Computer Engineering Conference - ICENCO , Cairo, 30 Dec, 2015.