default search action
Mohamed Amin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Aya Zahra, Mohamed Amin, Fathi E. Abd El-Samie, Mahmoud Emam:
Efficient utilization of deep learning for the detection of fabric defects. Neural Comput. Appl. 36(11): 6037-6050 (2024) - [i4]Tao Tu, Anil Palepu, Mike Schaekermann, Khaled Saab, Jan Freyberg, Ryutaro Tanno, Amy Wang, Brenna Li, Mohamed Amin, Nenad Tomasev, Shekoofeh Azizi, Karan Singhal, Yong Cheng, Le Hou, Albert Webson, Kavita Kulkarni, S. Sara Mahdavi, Christopher Semturs, Juraj Gottweis, Joelle K. Barral, Katherine Chou, Gregory S. Corrado, Yossi Matias, Alan Karthikesalingam, Vivek Natarajan:
Towards Conversational Diagnostic AI. CoRR abs/2401.05654 (2024) - 2023
- [j23]Basma Abd El-Rahiem, Fathi E. Abd El-Samie, Mohamed Amin:
Efficient cancellable multi-biometric recognition system based on deep learning and bio-hashing. Appl. Intell. 53(2): 1792-1806 (2023) - [j22]Mohammed M. Nasef, Fatma T. Eid, Mohamed Amin, Amr M. Sauber:
An efficient segmentation technique for skeletal scintigraphy image based on sharpness index and salp swarm algorithm. Biomed. Signal Process. Control. 79(Part): 104046 (2023) - [j21]Basma Abd El-Rahiem, Ahmed Sedik, Ghada M. El Banby, Hani M. Ibrahem, Mohamed Amin, Oh-Young Song, Ashraf A. M. Khalaf, Fathi E. Abd El-Samie:
An efficient deep learning model for classification of thermal face images. J. Enterp. Inf. Manag. 36(3): 706-717 (2023) - [j20]Abdelazim G. Hussien, Ruba Abu Khurma, Abdullah Alzaqebah, Mohamed Amin, Fatma A. Hashim:
Novel memetic of beluga whale optimization with self-adaptive exploration-exploitation balance for global optimization and engineering problems. Soft Comput. 27(19): 13951-13989 (2023) - [i3]Karan Singhal, Tao Tu, Juraj Gottweis, Rory Sayres, Ellery Wulczyn, Le Hou, Kevin Clark, Stephen Pfohl, Heather Cole-Lewis, Darlene Neal, Mike Schaekermann, Amy Wang, Mohamed Amin, Sami Lachgar, Philip Andrew Mansfield, Sushant Prakash, Bradley Green, Ewa Dominowska, Blaise Agüera y Arcas, Nenad Tomasev, Yun Liu, Renee Wong, Christopher Semturs, S. Sara Mahdavi, Joelle K. Barral, Dale R. Webster, Gregory S. Corrado, Yossi Matias, Shekoofeh Azizi, Alan Karthikesalingam, Vivek Natarajan:
Towards Expert-Level Medical Question Answering with Large Language Models. CoRR abs/2305.09617 (2023) - [i2]Tao Tu, Shekoofeh Azizi, Danny Driess, Mike Schaekermann, Mohamed Amin, Pi-Chuan Chang, Andrew Carroll, Chuck Lau, Ryutaro Tanno, Ira Ktena, Basil Mustafa, Aakanksha Chowdhery, Yun Liu, Simon Kornblith, David J. Fleet, Philip Andrew Mansfield, Sushant Prakash, Renee Wong, Sunny Virmani, Christopher Semturs, S. Sara Mahdavi, Bradley Green, Ewa Dominowska, Blaise Agüera y Arcas, Joelle K. Barral, Dale R. Webster, Gregory S. Corrado, Yossi Matias, Karan Singhal, Pete Florence, Alan Karthikesalingam, Vivek Natarajan:
Towards Generalist Biomedical AI. CoRR abs/2307.14334 (2023) - 2022
- [j19]Basma Abd El-Rahiem, Mohamed Amin, Ahmed Sedik, Fathi E. Abd El-Samie, Abdullah M. Iliyasu:
An efficient multi-biometric cancellable biometric scheme based on deep fusion and deep dream. J. Ambient Intell. Humaniz. Comput. 13(4): 2177-2189 (2022) - [j18]Abdelazim G. Hussien, Mohamed Amin:
A self-adaptive Harris Hawks optimization algorithm with opposition-based learning and chaotic local search strategy for global optimization and feature selection. Int. J. Mach. Learn. Cybern. 13(2): 309-336 (2022) - [j17]Basma Abd El-Rahiem, Fathi E. Abd El-Samie, Mohamed Amin:
Multimodal biometric authentication based on deep fusion of electrocardiogram (ECG) and finger vein. Multim. Syst. 28(4): 1325-1337 (2022) - 2021
- [j16]Amr M. Sauber, Passent Mohammed El-Kafrawy, Amr F. Shawish, Mohamed Amin, Ismail M. Hagag:
A New Secure Model for Data Protection over Cloud Computing. Comput. Intell. Neurosci. 2021: 8113253:1-8113253:11 (2021) - 2020
- [j15]Adel Saad Assiri, Abdelazim G. Hussien, Mohamed Amin:
Ant Lion Optimization: Variants, Hybrids, and Applications. IEEE Access 8: 77746-77764 (2020) - [j14]Abdelazim G. Hussien, Mohamed Amin, Mingjing Wang, Guoxi Liang, Ahmed Alsanad, Abdu Gumaei, Huiling Chen:
Crow Search Algorithm: Theory, Recent Advances, and Applications. IEEE Access 8: 173548-173565 (2020) - [j13]Abdelazim G. Hussien, Mohamed Amin, Mohamed Abd El Aziz:
A comprehensive review of moth-flame optimisation: variants, hybrids, and applications. J. Exp. Theor. Artif. Intell. 32(4): 705-725 (2020) - [j12]Randa F. Soliman, Mohamed Amin, Fathi E. Abd El-Samie:
Cancelable Iris recognition system based on comb filter. Multim. Tools Appl. 79(3-4): 2521-2541 (2020)
2010 – 2019
- 2019
- [c9]Basma Abd El-Rahiem, Muhammad Atta Othman Ahmed, Omar Reyad, Hani Abd El-Rahaman, Mohamed Amin, Fathi E. Abd El-Samie:
An Efficient Deep Convolutional Neural Network for Visual Image Classification. AMLTA 2019: 23-31 - [c8]Bassem Abd-El-Atty, Mohamed Amin, Ahmed A. Abd El-Latif, Hassan Ugail, Irfan Mehmood:
An Efficient Cryptosystem based on the Logistic-Chebyshev Map. SKIMA 2019: 1-6 - 2018
- [c7]Randa F. Soliman, Mohamed Amin, Fathi E. Abd El-Samie:
On Mixing Iris-Codes. AISI 2018: 405-414 - 2016
- [j11]Mohamed Amin, Bosco Leung:
Design Techniques for Linearity in Time-Based ΣΔ Analog-to-Digital Converter. IEEE Trans. Circuits Syst. II Express Briefs 63-II(5): 433-437 (2016) - [c6]Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Mohamed Amin:
New Quantum Image Steganography Scheme with Hadamard Transformation. AISI 2016: 342-352 - [c5]Mohamed H. Beheri, Mohamed Amin, Xianhua Song, Ahmed A. Abd El-Latif:
Quantum image encryption based on scrambling-diffusion (SD) approach. ICFSP 2016: 43-47 - [c4]Michael Weiss, Ibrahim Y. Abualhaol, Mohamed Amin:
A Leader-Driven Open Collaboration Platform for Exploring New Domains. OpenSym 2016: 23:1-23:4 - 2015
- [j10]Ahmed Hagag, Mohamed Amin, Fathi E. Abd El-Samie:
Multispectral image compression with band ordering and wavelet transforms. Signal Image Video Process. 9(4): 769-778 (2015) - 2014
- [j9]Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, Ahmed S. Sakr:
A Steganographic Method Based on DCT and New Quantization Technique. Int. J. Netw. Secur. 16(3): 214-219 (2014) - [j8]Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, Ahmed S. Sakr:
A Steganographic Method Based on DCT, New Quantization Technique. Int. J. Netw. Secur. 16(4): 265-270 (2014) - [j7]Mohamed Amin, Doaa Shebl:
Reasoning dynamic fuzzy systems based on adaptive fuzzy higher order Petri nets. Inf. Sci. 286: 161-172 (2014) - [c3]Alaa Zaghloul, Tiejun Zhang, Mohamed Amin, Ahmed A. Abd El-Latif:
Color encryption scheme based on adapted quantum logistic map. ICDIP 2014: 915922 - 2013
- [j6]A. A. Abdo, Shiguo Lian, Ismail Amr Ismail, Mohamed Amin, Hossam Diab:
A cryptosystem based on elementary cellular automata. Commun. Nonlinear Sci. Numer. Simul. 18(1): 136-147 (2013) - 2012
- [j5]Khaled M. Alallayah, Alaa H. Alhamami, Waiel AbdElwahed, Mohamed Amin:
Applying neural networks for simplified data encryption standard (SDES) cipher system cryptanalysis. Int. Arab J. Inf. Technol. 9(2): 163-169 (2012) - 2011
- [c2]Susan F. Ellakwa, Passent Mohammed El-Kafrawy, Mohamed Amin, El-Sayed El-Azhary:
Establishing Global Ontology by Matching and Merging. SPIT/IPC 2011: 76-83 - 2010
- [j4]Khaled M. Alallayah, Mohamed Amin, Waiel F. Abd El-Wahed, Alaa H. Alhamami:
Attack and construction of simulator for some cipher systems using neuro-Identifier. Int. Arab J. Inf. Technol. 7(4): 365-372 (2010) - [j3]Mohamed Amin, Ahmed A. Abd El-Latif:
Efficient modified RC5 based on chaos adapted to image encryption. J. Electronic Imaging 19(1): 013012 (2010) - [i1]Ismail I. Amr, Mohamed Amin, Passent Mohammed El-Kafrawy, Amr M. Sauber:
Using Statistical Moment Invariants and Entropy in Image Retrieval. CoRR abs/1002.2193 (2010)
2000 – 2009
- 2004
- [j2]Mohamed Amin, Rokaia Abd-el-Mouaty:
Stratified Grammar Systems with Simple and Dynamically Organized Strata. Comput. Artif. Intell. 23(4): 355-362 (2004)
1990 – 1999
- 1998
- [j1]Mohamed Amin:
Remarks on the Relationship Between Cooperating Distributed Grammar Systems and Lindenmayer Systems. Fundam. Informaticae 36(2-3): 103-107 (1998) - 1997
- [c1]Mohamed Amin:
A Note on the Incomparability of the EOL Family with Certain Families of Languages Generated by Cooperating Grammar Systems. New Trends in Formal Languages 1997: 217-219
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint