default search action
Neveen I. Ghali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Mahmoud Magdy, Neveen I. Ghali, Said Ghoniemy, Khalid M. Hosny:
Multiple Zero-Watermarking of Medical Images for Internet of Medical Things. IEEE Access 10: 38821-38831 (2022) - [j9]Mahmoud Magdy, Khalid M. Hosny, Neveen I. Ghali, Said Ghoniemy:
Security of medical images for telemedicine: a systematic review. Multim. Tools Appl. 81(18): 25101-25145 (2022)
2010 – 2019
- 2017
- [j8]Shereen A. El-aal, Rabie A. Ramadan, Neveen I. Ghali:
EEG signals classifications of motor imagery using adaptive neuro-fuzzy inference system and interval type-2 fuzzy system. Int. J. Intell. Syst. Technol. Appl. 16(2): 106-126 (2017) - 2016
- [j7]Mohamed S. Farag, M. M. Mohie-Eldin, Neveen I. Ghali, O. M. Hassan:
Improving Analysis and Visualizing of JVM Profiling Logs Using Process Mining. Comput. Inf. Sci. 9(1): 54-69 (2016) - [j6]Shereen A. El-aal, Rabie A. Ramadan, Neveen I. Ghali:
Classification of EEG Signals for Motor Imagery based on Mutual Information and Adaptive Neuro Fuzzy Inference System. Int. J. Syst. Dyn. Appl. 5(4): 64-82 (2016) - 2015
- [j5]Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien:
Intelligent Machine Learning in Image Authentication. J. Signal Process. Syst. 78(2): 223-237 (2015) - [c20]Shereen A. El-aal, Rabie A. Ramadan, Neveen I. Ghali:
EEG Signals of Motor Imagery Classification Using Adaptive Neuro-Fuzzy Inference System. NaBIC 2015: 105-116 - 2014
- [j4]Hossam M. Moftah, Ahmad Taher Azar, Eiman Tamah Al-Shammari, Neveen I. Ghali, Aboul Ella Hassanien, Mahmoud Shoman:
Adaptive k-means clustering algorithm for MR breast image segmentation. Neural Comput. Appl. 24(7-8): 1917-1928 (2014) - 2013
- [j3]Aboul Ella Hassanien, Eiman Tamah Al-Shammari, Neveen I. Ghali:
Computational intelligence techniques in bioinformatics. Comput. Biol. Chem. 47: 37-47 (2013) - [j2]Lamiaa M. El Bakrawy, Neveen I. Ghali:
An Improved Hashing Function for Human Authentication System: Near Set Approach. Int. J. Comput. Vis. Image Process. 3(2): 32-42 (2013) - [j1]Wafa Ghonaim, Neveen I. Ghali, Aboul Ella Hassanien, Soumya Banerjee:
An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack. Memetic Comput. 5(3): 179-185 (2013) - 2012
- [c19]Kareem Kamal A. Ghany, Hesham A. Hefny, Aboul Ella Hassanien, Neveen I. Ghali:
A Hybrid Approach for Biometric Template Security. ASONAM 2012: 941-942 - [c18]Sara A. Ahmed, Tamer M. Nassef, Neveen I. Ghali, Gerald Schaefer, Aboul Ella Hassanien:
Determining protrusion cephalometric readings from panoramic radiographic images. BHI 2012: 321-324 - [c17]Abdalla Mostafa, Hesham A. Hefny, Neveen I. Ghali, Aboul Ella Hassanien, Gerald Schaefer:
Evaluating the effects of image filters in CT Liver CAD system. BHI 2012: 448-451 - [c16]Mona Nagy Elbedwehy, Hossam M. Zawbaa, Neveen I. Ghali, Aboul Ella Hassanien:
Detection of Heart Disease using Binary Particle Swarm Optimization. FedCSIS 2012: 177-182 - [c15]Rasha Wahid, Neveen I. Ghali, Hala S. Own, Tai-Hoon Kim, Aboul Ella Hassanien:
A Gaussian Mixture Models Approach to Human Heart Signal Verification Using Different Feature Extraction Algorithms. FGIT-MulGraB/BSBT/IUrC 2012: 16-24 - [c14]Sara A. Ahmed, Neveen I. Ghali, Aboul Ella Hassanien:
Optimize the correspondence using Particle Swarm Optimization for medical image registration. HIS 2012: 80-84 - [c13]Abdalla Zidan, Neveen I. Ghali, Aboul Ella Hassanien, Hesham A. Hefny:
Level set-based CT liver image segmentation with watershed and artificial neural networks. HIS 2012: 96-102 - [c12]Hossam M. Moftah, Neveen I. Ghali, Aboul Ella Hassanien, Mahmoud A. Ismail:
Volume identification and estimation of MRI brain tumor. HIS 2012: 120-124 - [c11]Soumya Banerjee, Neveen I. Ghali, Arup Roy, Aboul Ella Hassanien:
A bio-inspired perspective towards retail recommender system: Investigating optimization in retail inventory. ISDA 2012: 161-165 - [c10]Ahmed Ibrahem Hafez, Neveen I. Ghali, Aboul Ella Hassanien, Aly A. Fahmy:
Genetic Algorithms for community detection in social networks. ISDA 2012: 460-465 - [p1]Neveen I. Ghali, Mrutyunjaya Panda, Aboul Ella Hassanien, Ajith Abraham, Václav Snásel:
Social Networks Analysis: Tools, Measures and Visualization. Computational Social Networks 2012: 3-23 - 2011
- [c9]Nashwa El-Bendary, Václav Snásel, Ghada Adam, Fatma Mansour, Neveen I. Ghali, Omar S. Soliman, Aboul Ella Hassanien:
E-Contract Securing System Using Digital Signature Approach. ACN 2011: 183-189 - [c8]Neveen I. Ghali, Lamiaa M. El Bakrawy, Aboul Ella Hassanien:
Associative Watermarking Scheme for Medical Image Authentication. DCAI 2011: 43-50 - [c7]Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Tai-Hoon Kim:
A rough k-means fragile watermarking approach for image authentication. FedCSIS 2011: 19-23 - [c6]Kai Xiao, Neveen I. Ghali, Aboul Ella Hassanien:
Medical Image Segmentation Using Information Extracted from Deformation. FedCSIS 2011: 157-163 - [c5]Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Tai-Hoon Kim:
A Fast and Secure One-Way Hash Function. FGIT-SecTech 2011: 85-93 - [c4]Wafaa G. Abd-Elmonim, Neveen I. Ghali, Aboul Ella Hassanien, Ajith Abraham:
Known-plaintext attack of DES-16 using Particle Swarm Optimization. NaBIC 2011: 12-16 - [c3]Omar S. Soliman, Aboul Ella Hassanien, Neveen I. Ghali, Nashwa El-Bendary, Ruhul A. Sarker:
A Model-Based Decision Support Tool Using Fuzzy Optimization for Climate Change. RSKT 2011: 388-393 - 2010
- [c2]Wafaa Abd-Elmonim Ghnaim, Neveen I. Ghali, Aboul Ella Hassanien:
Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique. CISIM 2010: 600-603 - [c1]Lamiaa M. El Bakrawy, Neveen I. Ghali, Aboul Ella Hassanien, Ajith Abraham:
An associative watermarking based image authentication scheme. ISDA 2010: 823-828
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint