Hamdy K. Elminir
Mansoura University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hamdy K. Elminir.
IEEE Communications Letters | 2015
Mohamed Elhoseny; Xiaohui Yuan; Zhengtao Yu; Cunli Mao; Hamdy K. Elminir; A. M. Riad
In a heterogeneous Wireless Sensor Network (WSN), factors such as initial energy, data processing capability, etc. greatly influence the network lifespan. Despite the success of various clustering strategies of WSN, the numerous possible sensor clusters make searching for an optimal network structure an open challenge. In this paper, we propose a Genetic Algorithm based method that optimizes heterogeneous sensor node clustering. Compared with five state-of-the-art methods, our proposed method greatly extends the network life, and the average improvement with respect to the second best performance based on the first-node-die and the last-node-die is 33.8% and 13%, respectively. The balanced energy consumption greatly improves the network life and allows the sensor energy to deplete evenly. The computational efficiency of our method is comparable to the others and the overall average time across all experiments is 0.6 seconds with a standard deviation of 0.06.
International Journal of Computer Applications | 2013
A. M. Riad; Hamdy K. Elminir; Mohamed Elhoseny
Wireless Sensor Networks (WSNs) have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. Recently, there is a great interest related to routing process in WSNs. Security aspects in routing protocols have not been given enough attention, since most of the routing protocols in WSNs have not been designed with security requirements in mind. This paper surveys the current challenges of WSN. It will focus on the attempts of building an Artificial Intelligence (AI) based routing protocols in WSNs. This paper also identifies the WSN security trends and threats. The paper also addresses some examples of how to use artificial intelligence in the routing algorithms and shows the advantages and the drawbacks of each. A proposed framework also has been introduced. Finally, the future directions of WSNs have been declared.
Intelligent Automation and Soft Computing | 2015
Samaa M. Shohieb; Hamdy K. Elminir
Live facial expression recognition is an effective and essential research area in human computer interaction (HCI), and the automatic sign language recognition (ASLR) fields. This paper presents a fully automatic facial expression and direction of sight recognition system, that we called SignsWorld Facial Expression Recognition System (FERS). The SignsWorld FERS is divided into three main components: Face detection that is robust to occlusion, key facial features points extraction and facial expression with direction of sight recognition. We present a powerful multi-detector technique to localize the key facial feature points so that contours of the facial components such as the eyes, nostrils, chin, and mouth are sampled. Based on the extracted 66 facial features points, 20 geometric formulas (GFs), 15 ratios (Rs) are calculated, and the classifier based on rule-based reasoning approach are then formed for both of the gaze direction and the facial expression (Normal, Smiling, Sadness or Surprising). Sign...
Journal of Electrical Engineering-elektrotechnicky Casopis | 2013
Alaa E Din Riad; Hamdy K. Elminir; Alaa R. Shehata; Taha R. Ibrahim
The trend toward converged networks where voice,IP,video and wireless are combined over the same network infrastructure offers significant - and highly attractive - benefits.But this union introduces new vulnerabilities and new opportunities to break into the network and so we need converged security.In this paper we investigate the possibility of using RC4 as a stream key generator for converged network applications.The RC4 was statistically tested against wide range of tests for inspecting the validity of the encryption,and it’s mathematically measured for encryption efficiency.All the consequent proves that RC4with suitable key length is highly secure and efficient enough to be used within the converged network.
International Journal of Applied Information Systems | 2013
A. M. Riad; Hamdy K. Elminir; Sameh Abd-Elghany
The goal of object level annotation is to locate and identify instances of an object category within an image. Nowadays, Most of the current object level annotation systems annotate the object according to the visual appearance in the image. Recognizing an object in an image based visual appearance yield ambiguity in object detection due to appearance confusion for example “sky” object may be annotated as “water” according to similarity in visual appearance. As a result, these systems don’t recognize the objects in an image accurately due to the lack of scene context. In the task of visual object recognition, scene context can play important role in resolving the ambiguities in object detection. In order to solve the ambiguity problem, this paper presents a new technique for a context based object level annotation that considers both the semantic context and spatial context analysis to reduce ambiguous in object annotation. General Terms Image Annotation and Retrieval
Journal of Network and Systems Management | 2017
Xiaohui Yuan; Mohamed Elhoseny; Hamdy K. Elminir; A. M. Riad
Security and Communication Networks | 2016
Mohamed Elhoseny; Xiaohui Yuan; Hamdy K. Elminir; A. M. Riad
Journal of King Saud University - Computer and Information Sciences archive | 2016
Mohamed Elhoseny; Hamdy K. Elminir; A. M. Riad; Xiaohui Yuan
Journal of Convergence Information Technology | 2009
A. M. Riad; Hamdy K. Elminir; Haitham A. El-Ghareeb
Archive | 2012
Hamdy K. Elminir; Mohamed Abu ElSoud; L. M. Abou El-Maged