and ella S. Udhaya Kumar, H. Hannah Inbarani, A. T. A. A. H.,
"Identification of Heart Valve Disease using Bijective, Soft sets Theory ",
International Journal of Rough Sets and Data Analysis, vol. 1, issue 2, pp. , 1(2), 1-13, 2014.
Abstract Major complication of heart valve diseases is congestive heart valve failure. The heart is of essential significance to human beings. Auscultation with a stethoscope is considered as one of the techniques used in the analysis of heart diseases. Heart auscultation is a difficult task to determine the heart condition and requires some superior training of medical doctors. Therefore, the use of computerized techniques in the diagnosis of heart sounds may help the doctors in a clinical environment. Hence, in this study computer-aided heart sound diagnosis is performed to give support to doctors in decision making. In this study, a novel hybrid Rough-Bijective soft set is developed for the classification of heart valve diseases. A rough set (Quick Reduct) based feature selection technique is applied before classification for increasing the classification accuracy. The experimental results demonstrate that the overall classification accuracy offered by the employed Improved Bijective soft set approach (IBISOCLASS) provides higher accuracy compared with other classification techniques including hybrid Rough-Bijective soft set (RBISOCLASS), Bijective soft set (BISOCLASS), Decision table (DT), Naïve Bayes (NB) and J48.
Sahlol, A. T., C. Y. Suen, H. M. Zawbaa, A. E. Hassanien, and M. A. Fattah,
"Bio-inspired BAT optimization algorithm for handwritten Arabic characters recognition",
Evolutionary Computation (CEC), 2016 IEEE Congress on: IEEE, pp. 1749–1756, 2016.
Abstractn/a
Sahlol, A. T., A. A. Ewees, A. M. H.;, and A. E. Hassanien,
"Training feedforward neural networks using Sine-Cosine algorithm to improve the prediction of liver enzymes on fish farmed on nano-selenite",
12th International Computer Engineering Conference (ICENCO),, Cairo, 28-29 Dec, 2016.
AbstractAnalytical prediction of oxidative stress biomarkers in ecosystem provides an expressive result for many stressors. These oxidative stress biomarkers including superoxide dismutase, glutathione peroxidase and catalase activity in fish liver tissue were analyzed within feeding different levels of selenium nanoparticles. Se-nanoparticles represent a salient defense mechanism in oxidative stress within certain limits; however, stress can be engendered from toxic levels of these nanoparticles. For instance, prediction of the level of pollution and/or stressors was elucidated to be improved with different levels of selenium nanoparticles using the bio-inspired Sine-Cosine algorithm (SCA). In this paper, we improved the prediction accuracy of liver enzymes of fish fed by nano-selenite by developing a neural network model based on SCA, that can train and update the weights and the biases of the network until reaching the optimum value. The performance of the proposed model is better and achieved more efficient than other models.
Salama, M., M. Panda, Y. Elbarawy, A. E. Hassanien, and A. Abraham,
"Social Networks Security and Privacy: Basics,Threats and Case Study to Visualize Foreign Terrorist Network dataset",
Computational Social Networks: Security and Privacy, London, Series in Computer Communications and Networks, Springer Verlag, , 2012.
AbstractThe continuous self-growing nature of social networks makes it hard to define a line of safety around these networks. Users in social networks are not interacting with the web only, but also with trusted groups that may contain enemies. There are different kinds of attacks on these networks including causing damage to the computer systems and steeling information about users. These attacks are not affecting individuals only, but also the organizations they are belonging to. Protection from these attacks should be performed by the users and security experts of the network. Advices should be provided to users of these social networks. Also security-experts should be sure that the contents transmitted through the network do not contain malicious or harmful data. This chapter shows the security risks and the tasks applied to minimize those risks. Explain the most famous ways that attackers and malicious use. Then show the security measures for each way. Also present a security guide and a social network security and privacy made in 2011, and finally a case study about the list of Foreign Terrorist Network dataset.