Publications

Export 159 results:
Sort by: Author [ Title  (Desc)] Type Year
A B C D E F G H I J [K] L M N O P Q R S T U V W X Y Z   [Show ALL]
B
Hassanien, A. E., N. El-Bendary, M. Kudělka, and Václav Snášel, "Breast cancer detection and classification using support vector machines and pulse coupled neural network", Proceedings of the Third International Conference on Intelligent Human Computer Interaction (IHCI 2011), Prague, Czech Republic, August, 2011: Springer Berlin Heidelberg, pp. 269–279, 2013. Abstract
n/a
Hassanien, A. E., N. El-Bendary, M. Kudělka, and Václav Snášel, "Breast cancer detection and classification using support vector machines and pulse coupled neural network", Proceedings of the Third International Conference on Intelligent Human Computer Interaction (IHCI 2011), Prague, Czech Republic, August, 2011: Springer Berlin Heidelberg, pp. 269–279, 2013. Abstract
n/a
Ismail, F. H., E. A. Hassan, A. E. Hassanien, and T. - H. Kim, "Blog Clustering with Committee Approach", 2015 Fourth International Conference on Information Science and Industrial Applications (ISI): IEEE, pp. 61–64, 2015. Abstract
n/a
Lamiaa M. El Bakrawy, N. I.Ghali, T. - H. Kim, and A. E. Hassanien, "A Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization ", Journal of Future Generation Communication and Networking, , vol. 4, issue 4, 2011. Abstractblock-wise-based_fragile_watermarking.pdf

In this paper, we propose a fragile watermarking hybrid approach using rough set kmeans and exponential particle swarm optimization (EPSO) systems. It is based on a block-wise dependency mechanism which can detect any alterations made to the protected image. Initially, the input image is divided into blocks with equal size in order to improve image tamper localization precision. Then feature sequence is generated by applying rough k-means and EPSO clustering to create the relationship between all image blocks and cluster
all of them since EPSO is used to optimize the parameters of rough k-means. Both feature sequence and generated secret key are used to construct the authentication data. Each resultant 8-bit authentication data is embedded into the eight least significant bits (LSBs) of the corresponding image block. We gives experimental results which show the feasibility of using these optimization algorithms for the fragile watermarking and demonstrate the
accuracy of the proposed approach. The performance comparison of the approach was also realized. The performance of a fragile watermarking approach has been improved in this paper by using exponential particle swarm optimization (EPSO) to optimize the rough kmean parameters. The proposed approach can embed watermark without causing noticeable visual artifacts, and does not only achieve superior tamper detection in images accurately,
it also recovers tampered regions effectively. In addition, the results show that the proposed approach can effectively thwart different attacks, such as the cut-and paste attack and collage attack, while sustaining superior tamper detection and localization accuracy.

El Bakrawy, L. M., N. I. Ghali, T. - H. Kim, and A. E. Hassanien, "A Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization", International Journal of Future Generation Communication and Networking, vol. 4, no. 4, pp. 77–88, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, T. - H. Kim, and A. E. Hassanien, "A Block-wise-based Fragile Watermarking Hybrid Approach using Rough Sets and Exponential Particle Swarm Optimization", International Journal of Future Generation Communication and Networking, vol. 4, no. 4, pp. 77–88, 2011. Abstract
n/a
Hassanien, A. E., T. - H. Kim, J. Kacprzyk, and A. I. Awad, Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, : Springer, 2014. Abstract
n/a
Amin, I. I., A. E. Hassanien, S. K. Kassim, and H. A. Hefny, "Big DNA Methylation data analysis and visualizing in a common form of breast cancer", Big Data in Complex Systems: Springer International Publishing, pp. 375–392, 2015. Abstract
n/a
Hassanien, A. - E., A. T. Azar, V. Snasel, J. Kacprzyk, and J. H. Abawajy, Big data in complex systems: challenges and opportunities, : Springer, 2015. Abstract
n/a
Heba, E., M. Salama, A. E. Hassanien, and T. - H. Kim, "Bi-Layer Behavioral-Based Feature Selection Approach for Network Intrusion Classification", Security Technology - International Conference, SecTech 2011, pp.195-203, Jeju Island, Korea, December 8-10,, 2011. Abstract

To satisfy the ever growing need for effective screening and diagnostic tests, medical practitioners have turned their attention to high resolution, high throughput methods. One approach is to use mass spectrometry based methods for disease diagnosis. Effective diagnosis is achieved by classifying the mass spectra as belonging to healthy or diseased individuals. Unfortunately, the high resolution mass spectrometry data contains a large degree of noisy, redundant and irrelevant information, making accurate classification difficult. To overcome these obstacles, feature extraction methods are used to select or create small sets of relevant features. This paper compares existing feature selection methods to a novel wrapper-based feature selection and centroid-based classification method. A key contribution is the exposition of different feature extraction techniques, which encompass dimensionality reduction and feature selection methods. The experiments, on two cancer data sets, indicate that feature selection algorithms tend to both reduce data dimensionality and increase classification accuracy, while the dimensionality reduction techniques sacrifice performance as a result of lowering the number of features. In order to evaluate the dimensionality reduction and feature selection techniques, we use a simple classifier, thereby making the approach tractable. In relation to previous research, the proposed algorithm is very competitive in terms of (i) classification accuracy, (ii) size of feature sets, (iii) usage of computational resources during both training and classification phases.

Eid, H. F., M. A. Salama, A. E. Hassanien, and T. - H. Kim, "Bi-layer behavioral-based feature selection approach for network intrusion classification", International Conference on Security Technology: Springer Berlin Heidelberg, pp. 195–203, 2011. Abstract
n/a
Eid, H. F., M. A. Salama, A. E. Hassanien, and T. - H. Kim, "Bi-layer behavioral-based feature selection approach for network intrusion classification", International Conference on Security Technology: Springer Berlin Heidelberg, pp. 195–203, 2011. Abstract
n/a
Kilany, M., A. E. Hassanien, A. Badr, P. - W. Tsai, and J. - S. Pan, "A Behavioral Action Sequences Process Design", International Conference on Advanced Intelligent Systems and Informatics: Springer International Publishing, pp. 502–512, 2016. Abstract
n/a
A
El-Bendary, N., T. - H. Kim, A. E. Hassanien, and M. Sami, "Automatic image annotation approach based on optimization of classes scores", Computing -Spriner , vol. 96, issue 5, pp. 381-402 , 2014. Website
El-Bendary, N., T. - H. Kim, A. E. Hassanien, and M. Sami, "Automatic image annotation approach based on optimization of classes scores", Computing, vol. 96, no. 5: Springer Vienna, pp. 381–402, 2014. Abstract
n/a
Fattah, M. A., M. A. A. ELsoud, A. E. Hassanien, and T. - H. Kim, "Automated classification of galaxies using invariant moments", International Conference on Future Generation Information Technology: Springer Berlin Heidelberg, pp. 103–111, 2012. Abstract
n/a
Fattah, M. A., M. A. A. ELsoud, A. E. Hassanien, and T. - H. Kim, "Automated classification of galaxies using invariant moments", International Conference on Future Generation Information Technology: Springer Berlin Heidelberg, pp. 103–111, 2012. Abstract
n/a
Václav Snášel, A. Keprt, A. Abraham, and A. E. Hassanien, "Approximate string matching by fuzzy automata", Man-Machine Interactions: Springer Berlin Heidelberg, pp. 281–290, 2009. Abstract
n/a
Václav Snášel, A. Keprt, A. Abraham, and A. E. Hassanien, "Approximate string matching by fuzzy automata", Man-Machine Interactions: Springer Berlin Heidelberg, pp. 281–290, 2009. Abstract
n/a
Amin, I. I., S. K. Kassim, A. E. Hassanien, and H. A. Hefny, "Applying formal concept analysis for visualizing DNA methylation statusamong breast cancer tumors subtypes", The 9th IEEE International Computer Engineering Conference (ICENCO 2013) pp. 37 - 42, Cairo, EGYPT -, December 29-30, , 2013.
Amin, I. I., S. K. Kassim, A. E. Hassanien, and H. A. Hefny, "Applying formal concept analysis for visualizing DNA methylation status in breast cancer tumor subtypes", Computer Engineering Conference (ICENCO), 2013 9th International: IEEE, pp. 37–42, 2013. Abstract
n/a
Hossam Moftah, Walaa Elmasry, A. E. Hassanien, Adel Alimi, H. Karray, and M. Tolba, "Ant-based clustering algorithm for magnetic resonance breast image segmentation", 13th IEEE International Conference on Hybrid Intelligent Systems | (HIS13) . pp. 162-167, Tunisia, , 4-6 Dec, 2013.
Moftah, H. M., A. E. Hassanien, A. M. Alimi, H. Karray, and M. F. Tolba, "Ant-based clustering algorithm for magnetic resonance breast image segmentation", Hybrid Intelligent Systems (HIS), 2013 13th International Conference on: IEEE, pp. 161–166, 2013. Abstract
n/a
Karam, H., A. - E. Hassanien, and M. Nakajima, "Animation of linear fractal shapes using polar decomposistion interpolation", Journal of ITE, vol. 53, no. 3, 1999. Abstract
n/a
Hassanien, A. E., T. - H. Kim, P. S. Rajan, and K. K. K. Hari, "Analysis of Energy Utilization through Mobile Ad Hoc Network with AODV", Proc. of the Intl. Conf. on Computer Applications, vol. 1, 2012. Abstract

n/a