Publications

Export 39 results:
Sort by: [ Author  (Desc)] Title Type Year
A B C D E F [G] H I J K L M N O P Q R S T U V W X Y Z   [Show ALL]
G
Guangyao Dai, H. L.  Zongmei Wang, Chao Yang, Aboul Ella Hassanieny, and W. Yang, "A Multi-granularity Rough Set Algorithm for Attribute Reduction through Particles Particle Swarm Optimization", IEEE iInternational Computer Engineering Conference - ICENCO , Cairo, 30 Dec, 2015.
Grosan, C., and A. E. Hassanien, "Hybrid Self Organizing Neurons and Evolutionary Algorithms for Global Optimization", Journal of Computational and Theoretical Nanoscience, vol. 9, issue 2, pp. 304-309, 2012. AbstractWebsite

In this work a new algorithm inspired by the self organizing maps combined with evolutionary algorithms is lined up. A neuron in the map is not evolving by itself but it is the result of the application of an evolutionary algorithm during a set of iterations. This idea really helps to increasing the performance of both self organizing maps and evolutionary algorithms while considered individually. The experiments performed in this research envisage test functions having a single criteria but a high number of dimensions. Comparisons with four other well known metaheuristics for optimization (such as differential evolution, particle swarm optimization, simulated annealing) show the performance and efficiency of the proposed approach.

Grosan, C., and A. E. Hassanien, "Hybrid Self Organizing Neurons and Evolutionary Algorithms for Global Optimization", Journal of Computational and Theoretical Nanoscience, vol. 9, no. 2: American Scientific Publishers, pp. 304–309, 2012. Abstract
n/a
Grosan, C., A. Abraham, and A. - E. Hassanien, "Designing resilient networks using multicriteria metaheuristics", Telecommunication Systems , vol. 40, issue 1-2, pp. 75-88, 2009. AbstractWebsite

The paper deals with the design of resilient networks that are fault tolerant against link failures. Usually,
fault tolerance is achieved by providing backup paths, which are used in case of an edge failure on a primary path. We consider this task as a multiobjective optimization problem: to provide resilience in networks while minimizing the cost subject to capacity constraint. We propose a stochastic approach,
which can generate multiple Pareto solutions in a single run. The feasibility of the proposed method is illustrated by considering several network design problems using a single weighted average of objectives and a direct multiobjective optimization approach using the Pareto dominance concept.

Grosan, C., and A. E. Hassanien, "Hybrid Self Organizing Neurons and Evolutionary Algorithms for Global Optimization", Journal of Computational and Theoretical Nanoscience, vol. 9, no. 2: American Scientific Publishers, pp. 304–309, 2012. Abstract
n/a
Ghonaim, W., N. I. Ghali, A. E. Hassanien, and S. Banerjee, "An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack", Memetic Computing, vol. 5, no. 3: Springer Berlin Heidelberg, pp. 179–185, 2013. Abstract
n/a
Ghonaim, W., N. I. Ghali, A. E. Hassanien, and S. Banerjee, "An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack", Memetic Computing, vol. 5, no. 3: Springer Berlin Heidelberg, pp. 179–185, 2013. Abstract
n/a
Ghnaim, W. A. - E., N. I. Ghali, and A. E. Hassanien, "Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique", Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on: IEEE, pp. 600–603, 2010. Abstract
n/a
Ghnaim, W. A. - E., N. I. Ghali, and A. E. Hassanien, "Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique", Computer Information Systems and Industrial Management Applications (CISIM), 2010 International Conference on: IEEE, pp. 600–603, 2010. Abstract
n/a
Ghany, K. K. A., H. A. Hefny, A. E. Hassanien, and N. I. Ghali, "A hybrid approach for biometric template security", Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012): IEEE Computer Society, pp. 941–942, 2012. Abstract
n/a
Ghany, K. K. A., A. E. Hassanien, and G. Schaefer, "Similarity measures for fingerprint matching", Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV): The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), pp. 1, 2014. Abstract
n/a
Ghany, K. K. A., G. Hassan, A. E. Hassanien, H. A. Hefny, G. Schaefer, and M. A. R. Ahad, "A hybrid biometric approach embedding DNA data in fingerprint images", Informatics, Electronics & Vision (ICIEV), 2014 International Conference on: IEEE, pp. 1–5, 2014. Abstract
n/a
Ghany, K. K. A., H. A. Hefny, A. E. Hassanien, and M. F. Tolba, "Kekre's transform for protecting fingerprint template", Hybrid Intelligent Systems (HIS), 2013 13th International Conference on: IEEE, pp. 185–190, 2013. Abstract
n/a
Ghany, K. K. A., H. A. Hefny, A. E. Hassanien, and N. I. Ghali, "A hybrid approach for biometric template security", Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012): IEEE Computer Society, pp. 941–942, 2012. Abstract
n/a
Ghali, N., M. Panda, A. E. Hassanien, A. Abraham, and V. Snasel, "Social Networks: Computational Aspects and Mining", Computational Social Networks: Tools, Perspectives and Applications, London, Computer and Communication Networks Springer Series, 2012. Abstract

Computational social science is a new emerging field that has overlapping regions from Mathematics, Psychology, Computer Sciences, Sociology,and Management. Social computing is concerned with the intersection of social behavior and computational systems. It supports any sort of social behavior in or through computational systems. It is based on creating or recreating social conventions and social contexts through the use of software and technology. Thus, blogs, email, instant messaging, social network services, wikis, social bookmarking, and other instances of what is often called social software illustrate ideas from social computing. Social network analysis is the study of relationships among social entities. It is becoming an important tool for investigators. However all the necessary information is often distributed over a number of Web sites. Interest in this field is blossoming as traditional practitioners in the social and behavioral sciences are being joined by researchers from statistics, graph theory, machine learning and data mining. In this chapter, we illustrate the concept of social networks from a computational point of view, with a focus on practical services, tools, and applications and open avenues for further research. Challenges to be addressed and future directions of research are presented and an extensive bibliography is also included.

Ghali, N. I., R. Wahid, and A. E. Hassanien, "Heart Sounds Human Identification and Verification Approaches using Vector Quantization and Gaussian Mixture Models", International Journal of Systems Biology and Biomedical Technologies (IJSBBT), vol. 1, no. 4: IGI Global, pp. 74–87, 2012. Abstract
n/a
Ghali, N. I., L. M. El Bakrawy, and A. E. Hassanien, "Associative Watermarking Scheme for Medical Image Authentication", International Symposium on Distributed Computing and Artificial Intelligence: Springer Berlin Heidelberg, pp. 43–50, 2011. Abstract
n/a
Ghali, N. I., W. G. Abd-Elmonim, and A. E. Hassanien, "Object-based image retrieval system using rough set approach", Advances in Reasoning-Based Image Processing Intelligent Systems: Springer Berlin Heidelberg, pp. 315–329, 2012. Abstract
n/a
Ghali, N. I., R. Wahid, and A. E. Hassanien, "Heart Sounds Human Identification and Verification Approaches using Vector Quantization and Gaussian Mixture Models", International Journal of Systems Biology and Biomedical Technologies (IJSBBT), vol. 1, no. 4: IGI Global, pp. 74–87, 2012. Abstract
n/a
Ghali, N., M. Panda, A. E. Hassanien, A. Abraham, and V. Snasel, "Social networks analysis: Tools, measures and visualization", Computational Social Networks: Springer London, pp. 3–23, 2012. Abstract
n/a
Ghali, N. I., W. G. Abd-Elmonim, and A. E. Hassanien, "Object-based image retrieval system using rough set approach", Advances in Reasoning-Based Image Processing Intelligent Systems: Springer Berlin Heidelberg, pp. 315–329, 2012. Abstract
n/a
Ghali, N. I., O. Soluiman, N. El-Bendary, T. M. Nassef, S. A. Ahmed, Y. M. Elbarawy, and A. E. Hassanien, "Virtual reality technology for blind and visual impaired people: reviews and recent advances", Advances in Robotics and Virtual Reality: Springer Berlin Heidelberg, pp. 363–385, 2012. Abstract
n/a
Ghali, N. I., W. G. Abd-Elmonim, and A. E. Hassanien, Object-Based Image Retrieval System Using Rough Set Approach, , London, Advances in Reasoning-Based Image Processing Intelligent Systems Intelligent Systems Reference Library, 2012, Volume 29, Part 2, 315-329, 2012. Abstract

In this chapter, we present an object-based image retrieval system using the rough set theory. The system incorporates two major modules: Pre-processing and Object-based image retrieval. In pre processing, an image based object segmentation algorithm in the context of the rough set theory is used to segment the images into meaningful semantic regions. A new object similarity measure is proposed for the image retrieval. Performance is evaluated on an image database and the effectiveness of proposed image retrieval system is demonstrated. Experimental results show that the proposed system performs well in terms of speed and accuracy.

Ghali, N., M. Panda, A. E. Hassanien, A. Abraham, and V. Snasel, "Social networks analysis: Tools, measures and visualization", Computational Social Networks: Springer London, pp. 3–23, 2012. Abstract
n/a
Ghali, N. I., O. Soluiman, N. El-Bendary, T. M. Nassef, S. A. Ahmed, Y. M. Elbarawy, and A. E. Hassanien, "Virtual reality technology for blind and visual impaired people: Reviews and Recent Advances,", Engineering Advances in Robotics and Virtual Reality, Germany, Intelligent Systems Reference Library - Springer, 2012. Abstract

Virtual reality technology enables people to become immersed in a computer-simulated and three-dimensional environment. In this chapter, we investigate the effects of the virtual reality technology on disabled people such as blind and visually impaired people (VIP) in order to enhance their computer skills and prepare them to make use of recent technology in their daily life. As well as, they need to advance their information technology skills beyond the basic computer training and skills. This chapter describes what best tools and practices in information technology to support disabled people such as deaf-blind and visual impaired people in their activities such as mobility systems, computer games, accessibility of e-learning, web-based information system, and wearable finger-braille interface for navigation of deaf-blind. Moreover, we will show how physical disabled people can benefits from the innovative virtual reality techniques and discuss some representative examples to illustrate how virtual reality technology can be utilized to address the information technology problem of blind and visual impaired people. Challenges to be addressed and an extensive bibliography are included.

Tourism