Publications

Export 60 results:
Sort by: Author [ Title  (Asc)] Type Year
A B C D E F G H I J K L M N O P Q R [S] T U V W X Y Z   [Show ALL]
S
El-Gayyar, M., H. F. ElYamany, T. Gaber, and A. E. Hassanien, "Social network framework for deaf and blind people based on cloud computing", Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on: IEEE, pp. 1313–1319, 2013. Abstract
n/a
Panda, M., N. El-Bendary, M. Salama, A. E. Hassanien, and A. Abraham, "Social Networks Analysis: Basics, Measures and Visualizing Authorship Networks in DBLP Data", Computational Social Networks: Mining and Visualization, London, Series in Computer Communications and Networks, Springer Verlag, 2012. Abstract

Social Network Analysis (SNA) is becoming an important tool for investigators, but all the necessary information is often available in a distributed environment. Currently there is no information system that helps managers and team leaders to monitor the status of a social network. This chapter presents an overview of the basic concepts of social networks in data analysis including social networks analysis metrics and performances. Different problems in social networks are discussed such as uncertainty, missing data and finding the shortest path in social network. Community structure, detection and visualization in social network analysis is also discussed and reviewed. This chapter bridges the gap among the users by combining social network analysis methods and information visualization technology to help user visually identify the occurrence of a possible relationship amongst the members in a social network. In addition, briefly describing the different performance measures that have been encountered during any network analysis in order to understand the fundamental behind the comprehension. This chapter also, presents an online analysis tool called Forcoa.NET, which is built over the DBLP dataset of publications from the field of computer science, which is focused on the analysis and visualization of the co-authorship relationship based on the intensity and topic of joint publications. Challenges to be ad dressed and future directions of research are also presented and an extensive bibliography is included.order to understand the fundamental behind the comprehension. This chapter also, presents an online analysis tool called Forcoa.NET, which is built over the DBLP dataset of publications from the field of computer science, which is focused on the analysis and visualization of the co-authorship relationship based on the intensity and topic of joint publications. Challenges to be ad dressed and future directions of research are also presented and an extensive bibliography is included.

Ghali, N., M. Panda, A. E. Hassanien, A. Abraham, and V. Snasel, "Social networks analysis: Tools, measures and visualization", Computational Social Networks: Springer London, pp. 3–23, 2012. Abstract
n/a
Ghali, N., M. Panda, A. E. Hassanien, A. Abraham, and V. Snasel, "Social networks analysis: Tools, measures and visualization", Computational Social Networks: Springer London, pp. 3–23, 2012. Abstract
n/a
Salama, M., M. Panda, Y. Elbarawy, A. E. Hassanien, and A. Abraham, "Social Networks Security and Privacy: Basics,Threats and Case Study to Visualize Foreign Terrorist Network dataset", Computational Social Networks: Security and Privacy, London, Series in Computer Communications and Networks, Springer Verlag, , 2012. Abstract

The continuous self-growing nature of social networks makes it hard to define a line of safety around these networks. Users in social networks are not interacting with the web only, but also with trusted groups that may contain enemies. There are different kinds of attacks on these networks including causing damage to the computer systems and steeling information about users. These attacks are not affecting individuals only, but also the organizations they are belonging to. Protection from these attacks should be performed by the users and security experts of the network. Advices should be provided to users of these social networks. Also security-experts should be sure that the contents transmitted through the network do not contain malicious or harmful data. This chapter shows the security risks and the tasks applied to minimize those risks. Explain the most famous ways that attackers and malicious use. Then show the security measures for each way. Also present a security guide and a social network security and privacy made in 2011, and finally a case study about the list of Foreign Terrorist Network dataset.

Ghali, N., M. Panda, A. E. Hassanien, A. Abraham, and V. Snasel, "Social Networks: Computational Aspects and Mining", Computational Social Networks: Tools, Perspectives and Applications, London, Computer and Communication Networks Springer Series, 2012. Abstract

Computational social science is a new emerging field that has overlapping regions from Mathematics, Psychology, Computer Sciences, Sociology,and Management. Social computing is concerned with the intersection of social behavior and computational systems. It supports any sort of social behavior in or through computational systems. It is based on creating or recreating social conventions and social contexts through the use of software and technology. Thus, blogs, email, instant messaging, social network services, wikis, social bookmarking, and other instances of what is often called social software illustrate ideas from social computing. Social network analysis is the study of relationships among social entities. It is becoming an important tool for investigators. However all the necessary information is often distributed over a number of Web sites. Interest in this field is blossoming as traditional practitioners in the social and behavioral sciences are being joined by researchers from statistics, graph theory, machine learning and data mining. In this chapter, we illustrate the concept of social networks from a computational point of view, with a focus on practical services, tools, and applications and open avenues for further research. Challenges to be addressed and future directions of research are presented and an extensive bibliography is also included.

Moustafa Zein, A. Adl, A. E. Hassanien, A. Badr, and T. - H. Kim, "A Social Relationship Modifiers Modeller", Computer, Information and Application (CIA), 2015 3rd International Conference on: IEEE, pp. 33–37, 2015. Abstract
n/a
Hassanien, A., M. Nachtegael, D. VAN DER WEKEN, H. NOBUHARA, and E. Kerre, Soft Computing in Image Processing, : Springer, 2006. Abstract
n/a
Hassanien, A., M. Nachtegael, D. VAN DER WEKEN, H. NOBUHARA, and E. Kerre, Soft Computing in Image Processing, : Springer, 2006. Abstract
n/a
Corchado, E. S., V. Snasel, J. Sedano, A. E. Hassanien, J. L. Calvo, and D. Slezak, Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, : Springer Science & Business Media, 2011. Abstract
n/a
Corchado, E. S., V. Snasel, J. Sedano, A. E. Hassanien, J. L. Calvo, and D. Slezak, Soft Computing Models in Industrial and Environmental Applications, 6th International Conference SOCO 2011, : Springer Science & Business Media, 2011. Abstract
n/a
H. Hannah Inbarani, S. Senthil Kumar, A. E. Hassanien, and A. T. Azar, "Soft Rough Sets for Heart Valve Disease Diagnosis ", The 2nd International Conference on Advanced Machine Learning Technologies and Applications , Egypt, November 17-19, , 2014.
Inbarani, H. H., S. S. Kumar, A. T. Azar, and A. E. Hassanien, "Soft rough sets for heart valve disease diagnosis", International Conference on Advanced Machine Learning Technologies and Applications: Springer International Publishing, pp. 347–356, 2014. Abstract
n/a
Liang Chen, S. Feng, W. Zhang, A. E. Hassanien, and H. Liu, "Sparse ICA based on Infinite Norm for fMRI Analysis ", The 2nd International Conference on Advanced Machine Learning Technologies and Applications , Egypt, November 17-19, , 2014.
Liang Chen, S. Feng, W. Zhang, A. E. Hassanien, and H. Liu, "Sparse ICA Based on Infinite Norm for fMRI Analysis", International Conference on Advanced Machine Learning Technologies and Applications: Springer International Publishing, pp. 379–388, 2014. Abstract
n/a
Hassanien, A. E., H. Sakai, D. Slezak, M. K. Chakraborty, and W. Zhu, "Special issue: Rough and Fuzzy Methods for Data Mining", International Journal of Hybrid Intelligent Systems, vol. 8, no. 1, pp. 1, 2011. Abstract
n/a
Hassanien, A. E., H. Sakai, D. Slezak, M. K. Chakraborty, and W. Zhu, "Special issue: Rough and Fuzzy Methods for Data Mining", International Journal of Hybrid Intelligent Systems, vol. 8, no. 1, pp. 1, 2011. Abstract
n/a
Egiazarian, K., and A. E. Hassanien, "Special Issue: Soft Computing in Multimedia Processing", Informatica, vol. 29, issue 3, 2005. Abstractspecial_issue_soft_computing_in_multimedia_process.pdf

n/a

Abdelhameed Ibrahim, T. Horiuchi, S. Tominaga, and A. E. Hassanien, "Spectral Reflectance Images and Applications", Image Feature Detectors and Descriptors: Springer International Publishing, pp. 227–254, 2016. Abstract
n/a
Hassanien, A. E., A. Abraham, and C. Grosan, "Spiking neural network and wavelets for hiding iris data in digital images", Soft Computing-A Fusion of Foundations, Methodologies and Applications, vol. 13, no. 4: Springer Berlin/Heidelberg, pp. 401–416, 2009. Abstract
n/a
Hassanien, A. E., A. Abraham, and C. Grosan, "Spiking neural network and wavelets for hiding iris data in digital images", Soft Computing-A Fusion of Foundations, Methodologies and Applications, vol. 13, no. 4: Springer Berlin/Heidelberg, pp. 401–416, 2009. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and J. F. Peters, "Strict authentication of multimodal biometric images using near sets", Soft Computing in Industrial Applications: Springer Berlin Heidelberg, pp. 249–258, 2011. Abstract
n/a
El Bakrawy, L. M., N. I. Ghali, A. E. Hassanien, and J. F. Peters, "Strict authentication of multimodal biometric images using near sets", Soft Computing in Industrial Applications: Springer Berlin Heidelberg, pp. 249–258, 2011. Abstract
n/a
Zawbaa, H. M., N. El-Bendary, A. E. Hassanien, G. Schaefer, and S. - S. Yeo, "Support Vector Machine based Logo Detection in Broadcast Soccer Videos", The 16th Online World Conference on Soft Computing in Industrial Applications (WSC16) Advances in Intelligent and Soft Computing, , 5-6 Dec, 2011. Abstract

n/a