Publications

Export 106 results:
Sort by: Author [ Title  (Asc)] Type Year
A B [C] D E F G H I J K L M N O P Q R S T U V W X Y Z   [Show ALL]
C
Abraham, A., A. - E. Hassanien, V. Sná, and others, Computational social network analysis: Trends, tools and research advances, : Springer Science & Business Media, 2009. Abstract
n/a
Hassanien, A. - E., Computational Social Networks Analysis, , London, Computer Communications and Networks Series - Springer, 2010. AbstractWebsite

Social networks provide a powerful abstraction of the structure and dynamics of diverse kinds of people or people-to-technology interaction. Web 2.0 has enabled a new generation of web-based communities, social networks, and folksonomies to facilitate collaboration among different communities. This unique text/reference compares and contrasts the ethological approach to social behavior in animals with web-based evidence of social interaction, perceptual learning, information granulation, the behavior of humans and affinities between web-based social networks. An international team of leading experts present the latest advances of various topics in intelligent-social-networks and illustrates how organizations can gain competitive advantages by applying the different emergent techniques in real-world scenarios. The work incorporates experience reports, survey articles, and intelligence techniques and theories with specific network technology problems.

Hassanien, A. - E., Computational Social Networks Analysis, : Computer Communications and Networks Series-Springer, 2010. Abstract
n/a
Salama, M., M. Panda, Y. Elbarawy, A. E. Hassanien, and A. Abraham, "Computational Social Networks: Security and Privacy", Computational Social Networks: Springer London, pp. 3–21, 2012. Abstract
n/a
Salama, M., M. Panda, Y. Elbarawy, A. E. Hassanien, and A. Abraham, "Computational Social Networks: Security and Privacy", Computational Social Networks: Springer London, pp. 3–21, 2012. Abstract
n/a
Abraham, A., and A. - E. Hassanien, Computational social networks: Tools, perspectives and applications, : Springer Science & Business Media, 2012. Abstract
n/a
Abraham, A., and A. - E. Hassanien, Computational social networks: Tools, perspectives and applications, : Springer Science & Business Media, 2012. Abstract
n/a
Panda, M., N. El-Bendary, M. A. Salama, A. E. Hassanien, and A. Abraham, "Computational social networks: Tools, perspectives, and challenges", Computational Social Networks: Springer London, pp. 3–23, 2012. Abstract
n/a
Panda, M., N. El-Bendary, M. A. Salama, A. E. Hassanien, and A. Abraham, "Computational social networks: Tools, perspectives, and challenges", Computational Social Networks: Springer London, pp. 3–23, 2012. Abstract
n/a
Panda, M., N. El-Bendary, M. A. Salama, A. E. Hassanien, and A. Abraham, "Computational social networks: Tools, perspectives, and challenges", Computational Social Networks: Springer London, pp. 3–23, 2012. Abstract
n/a
Ashour, A. S., S. Samanta, N. Dey, N. Kausar, W. B. Abdessalemkaraa, and A. E. Hassanien, "Computed Tomography Image Enhancement Using Cuckoo Search: A Log Transform Based Approach", Journal of Signal and Information Processing, vol. 6, pp. 244-257, 2015. Abstractjsip_2015083113193757_1.pdfWebsite

Medical image enhancement is an essential process for superior disease diagnosis as well as for
detection of pathological lesion accurately. Computed Tomography (CT) is considered a vital medical
imaging modality to evaluate numerous diseases such as tumors and vascular lesions. However,
speckle noise corrupts the CT images and makes the clinical data analysis ambiguous.
Therefore, for accurate diagnosis, medical image enhancement is a must for noise removal and
sharp/clear images. In this work, a medical image enhancement algorithm has been proposed using
log transform in an optimization framework. In order to achieve optimization, a well-known
meta-heuristic algorithm, namely: Cuckoo search (CS) algorithm is used to determine the optimal
parameter settings for log transform. The performance of the proposed technique is studied on a
low contrast CT image dataset. Besides this, the results clearly show that the CS based approach
has superior convergence and fitness values compared to PSO as the CS converge faster that
proves the efficacy of the CS based technique. Finally, Image Quality Analysis (IQA) justifies the robustness >
of the proposed enhancement technique.

Ashour, A. S., S. Samanta, N. Dey, N. Kausar, W. B. Abdessalemkaraa, A. E. Hassanien, and others, "Computed tomography image enhancement using cuckoo search: a log transform based approach", Journal of Signal and Information Processing, vol. 6, no. 03: Scientific Research Publishing, pp. 244, 2015. Abstract
n/a
Soliman, O. S., and A. E. Hassanien, "A Computer Aided Diagnosis System for Breast Cancer Using Support Vector Machine", International Conference on Rough Sets and Current Trends in Computing: Springer Berlin Heidelberg, pp. 106–115, 2012. Abstract
n/a
Soliman, O. S., and A. E. Hassanien, "A Computer Aided Diagnosis System for Breast Cancer Using Support Vector Machine", International Conference on Rough Sets and Current Trends in Computing: Springer Berlin Heidelberg, pp. 106–115, 2012. Abstract
n/a
Soliman, O. S., and A. E. Hassanien, "A Computer Aided Diagnosis System for Breast Cancer Using Support Vector Machine", International Conference on Rough Sets and Current Trends in Computing: Springer Berlin Heidelberg, pp. 106–115, 2012. Abstract
n/a
Aziz, A. S. A., A. T. Azar, A. E. Hassanien, and S. E. - O. Hanafy, "Continuous features discretization for anomaly intrusion detectors generation", Soft computing in industrial applications: Springer International Publishing, pp. 209–221, 2014. Abstract
n/a
Aziz, A. S. A., A. T. Azar, A. E. Hassanien, and S. E. - O. Hanafy, "Continuous features discretization for anomaly intrusion detectors generation", Soft computing in industrial applications: Springer International Publishing, pp. 209–221, 2014. Abstract
n/a
Aziz, A. S. A., A. T. Azar, A. E. Hassanien, and S. E. - O. Hanafy, "Continuous features discretization for anomaly intrusion detectors generation", Soft computing in industrial applications: Springer International Publishing, pp. 209–221, 2014. Abstract
n/a
Hassanien, A. E., O. S. Soliman, and N. El-Bendary, "Contrast enhancement of breast MRI images based on fuzzy type-II", Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011: Springer Berlin Heidelberg, pp. 77–83, 2011. Abstract
n/a
Ibrahim, R. A., H. A. Hefny, and A. E. Hassanien, "Controlling Rumor Cascade over Social Networks", International Conference on Advanced Intelligent Systems and Informatics: Springer International Publishing, pp. 456–466, 2016. Abstract
n/a
Hassanien, A. E., "A Copyright Protection using Watermarking Algorithm", Informatica, vol. 17 , issue 2, pp. 187-198, 2006. AbstractWebsite

In this paper, a digital watermarking algorithm for copyright protection based on the concept of embed digital watermark and modifying frequency coefficients in discrete wavelet transform (DWT) domain is presented. We embed the watermark into the detail wavelet coefficients of the original image with the use of a key. This key is randomly generated and is used to select the exact locations in the wavelet domain in which to embed the watermark. The corresponding watermark detection algorithm is presented. A new metric that measure the objective quality of the image based on the detected watermark bit is introduced, which the original unmarked image is not required for watermark extraction. The performance of the proposed watermarking algorithm is robust to variety of signal distortions, such a JPEG, image cropping, geometric transformations and noises.

Hassanien, A. E., "A copyright protection using watermarking algorithm", Informatica, vol. 17, no. 2: Institute of Mathematics and Informatics, pp. 187–198, 2006. Abstract
n/a
Davendra, D., A. El-Atta, H. Ahmed, M. A. Abu ElSoud, M. Adamek, M. Adhikari, A. Adl, H. Aldosari, Abder-Rahman Ali, A. F. Ali, et al., "Cordeschi, Nicola 43 Couceiro, Micael 83, 131 Czopik, Jan 365 Dasgupta, Kousik 271", Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2014, vol. 303: Springer, pp. 439, 2014. Abstract
n/a
Torky, M., R. Baberse, R. Ibrahim, A. E. Hassanien, G. Schaefer, I. Korovin, and S. Y. Zhu, "Credibility investigation of newsworthy tweets using a visualising Petri net model", Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on: IEEE, pp. 003894–003898, 2016. Abstract
n/a
Hamdy, E., A. Adl, A. E. Hassanien, O. Hegazy, and T. - H. Kim, "Criminal Act Detection and Identification Model", Advanced Communication and Networking (ACN), 2015 Seventh International Conference on: IEEE, pp. 79–83, 2015. Abstract
n/a