Salama, M., A. E. Hassanien, and Adel Alimi,
"Formal concept analysis approach for comparison between mutagenicity and carcinogenicity in Cheminformatics. ",
13th IEEE International Conference on Hybrid Intelligent Systems |(HIS13) Tunisia, 4-6 Dec. pp. 268-273, 2013, Tunisia, , 4-6 Dec, 2013.
Radhwan, A., M. Kamel, M. Y. Dahab, and A. E. Hassanien,
"Forecasting Exchange Rates: A Chaos-Based Regression Approach",
International Journal of Rough Sets and Data Analysis (IJRSDA), vol. 2, no. 1: IGI Global, pp. 38–57, 2015.
Abstractn/a
Fouad, M. M., H. M. Zawbaa, T. Gaber, V. Snasel, and A. E. Hassanien,
"A Fish Detection Approach Based on BAT Algorithm",
the 1st International Conference on Advanced Intelligent Systems and Informatics (AISI’15) Springer, Beni Suef University, Beni Suef, Eg, Nov. 28-30, 2015.
AbstractFish detection and identication are important steps towards
monitoring sh behavior. The importance of such monitoring step comes
from the need for better understanding of the sh ecology and issuing
conservative actions for keeping the safety of this vital food resource.
The recent advances in machine learning approaches allow many appli-
cations to easily analyze and detect a number of sh species. The main
competence between these approaches is based on two main detection
parameters: the time and the accuracy measurements. Therefore, this
paper proposes a sh detection approach based on BAT optimization
algorithm (BA). This approach aims to reduce the classication time
within the sh detection process. The performance of this system was
evaluated by a number of well-known machine learning classiers, KNN,
ANN, and SVM. The approach was tested with 151 images to detect the
Nile Tilapia sh species and the results showed that k-NN can achieve
high accuracy 90%, with feature reduction ratio
Fouad, M. M., H. M. Zawbaa, T. Gaber, V. Snasel, and A. E. Hassanien,
"A Fish Detection Approach Based on BAT Algorithm",
The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015), November 28-30, 2015, Beni Suef, Egypt: Springer International Publishing, pp. 273–283, 2016.
Abstractn/a
Emary, E., H. M. Zawbaa, C. Grosan, and A. E. H. Ali,
"Feature subset selection approach by Gray-wolf optimization",
The 1st Afro-European Conference for Industrial Advancement, , Addis Ababa, Ethiopia, November 17-19, , 2014.
Hamad, A., E. H. Houssein, A. E. Hassanien, and A. A. Fahmy,
"Feature extraction of epilepsy EEG using discrete wavelet transform",
IEEE International Conference on Systems, Man, and Cybernetics (SMC), 9, Cairo, 28-29 Dec. , 2016.
AbstractEpilepsy is one of the most common a chronic neurological disorders of the brain that affect millions of the world's populations. It is characterized by recurrent seizures, which are physical reactions to sudden, usually brief, excessive electrical discharges in a group of brain cells. Hence, seizure identification has great importance in clinical therapy of epileptic patients. Electroencephalogram (EEG) is most commonly used in epilepsy detection since it includes precious physiological information of the brain. However, it could be a challenge to detect the subtle but critical changes included in EEG signals. Feature extraction of EEG signals is core trouble on EEG-based brain mapping analysis. This paper will extract ten features from EEG signal based on discrete wavelet transform (DWT) for epilepsy detection. These numerous features will help the classifiers to achieve a good accuracy when utilize to classify EEG signal to detect epilepsy. Subsequently, the results have illustrated that DWT has been adopted to extract various features i.e., Entropy, Min, Max, Mean, Median, Standard deviation, Variance, Skewness, Energy and Relative Wave Energy (RWE).
Hassanien, A. E.,
"A Fast and Secure One-Way Hash Function",
Security Technology - International Conference, SecTech 2011, Jeju Island, Korea, 8-10 December, 2011.
AbstractOne way hash functions play a fundamental role for data integrity, message authentication, and digital signature in modern information security. In this paper we proposed a fast one-way hash function to optimize the time delay with strong collision resistance, assures a good compression and one-way resistance. It is based on the standard secure hash function (SHA-1) algorithm. The analysis indicates that the proposed algorithm which we called (fSHA-1) is collision resistant and assures a good compression and pre-image resistance. In addition, the executing time compared with the standard secure hash function is much shorter.