scispace - formally typeset
Search or ask a question
Author

Zyad Shaaban

Bio: Zyad Shaaban is an academic researcher from Information Technology University. The author has contributed to research in topics: Normalization (statistics) & Digital watermarking. The author has an hindex of 8, co-authored 11 publications receiving 615 citations. Previous affiliations of Zyad Shaaban include Applied Science Private University.

Papers
More filters
Journal ArticleDOI
TL;DR: This study emphasized on different types of normalization, each of which was tested against the ID3 methodology using the HSV data set, and recommendations were concluded on the best normalization method based on the factors and their priorities.
Abstract: This study is emphasized on different types of normalization. Each of which was tested against the ID3 methodology using the HSV data set. Number of leaf nodes, accuracy and tree growing time are three factors that were taken into account. Comparisons between different learning methods were accomplished as they were applied to each normalization method. A new matrix was designed to check for the best normalization method based on the factors and their priorities. Recommendations were concluded.

391 citations

Proceedings ArticleDOI
25 May 2006
TL;DR: This study emphasized on different types of normalization, each of which was tested against the ID3 methodology using the HSV data set, and recommended methods based on the factors and their priorities.
Abstract: This study is emphasized on different types of normalization. Each of which was tested against the ID3 methodology using the HSV data set. Number of leaf nodes, accuracy, and tree growing time are three factors that were taken into account. Comparisons between different learning methods were accomplished as they were applied to each normalization method. A simple matrix was designed to check for the best normalization method based on the factors and their priorities. Recommendations were concluded.

181 citations

01 Jan 2009
TL;DR: Three kinds of moments: Geometrical, Zernike and Legendre Moments have been evaluated for classifying 3D object images using Nearest Neighbor classifier.
Abstract: In many applications, different kinds of moments have been utilized to classify images and object shapes. Moments are important features used in recognition of different types of images. In this paper, three kinds of moments: Geometrical, Zernike and Legendre Moments have been evaluated for classifying 3D object images using Nearest Neighbor classifier. Experiments are conducted using ETH-80 database, which contains 80 objects.

36 citations

01 Jan 2010
TL;DR: The experimental results indicated that the image faces can be recognized by the proposed face recognition system effectively.
Abstract: In this paper, a new face recognition system based on Haar wavelet transform (HWT) and Principal Component Analysis (PCA) using Levenberg-Marquardt backpropagation (LMBP) neural network is presented. The image face is preprocessed and detected. The Haar wavelet is used to form the coefficient matrix for the detected face. The image feature vector is obtained by computing PCA for the coefficient matrix of DWT. A comparison between the proposed recognition system using DWT, PCA and Discrete Cosine Transform (DCT) is also made. The experimental results indicated that the image faces can be recognized by the proposed face recognition system effectively.

33 citations

Journal ArticleDOI
TL;DR: The bits of the logo image are embedded in random color components of the original image, as well as in random positions in each selected block of the discrete cosine transform matrices from its blocks.
Abstract: Invisible watermarking methods have been applied in frequency domains, trying to embed a small image inside a large original image. The original bitmap image will be converted into frequency domain to obtain the discrete cosine transform (DCT) matrices from its blocks. The bits of the logo image are embedded in random color components of the original image, as well as in random positions in each selected block. These positions are alternating current (AC) coefficients of the DCT matrix. The randomness is obtained from RC4 pseudorandom bit generator that determines in which color component this logo image bits will be embedded. The embedded bits have been hidden in random blocks in the image, which are chosen according to a (semi-random) function proposed in this work.

26 citations


Cited by
More filters
01 Jan 2002

9,314 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Reference EntryDOI
15 Oct 2004

2,118 citations

Journal ArticleDOI
TL;DR: A survey of integration components: Cloud platforms, Cloud infrastructures and IoT Middleware is presented and some integration proposals and data analytics techniques are surveyed as well as different challenges and open research issues are pointed out.

574 citations

Journal ArticleDOI
TL;DR: This study aims to investigate the impact of fourteen data normalization methods on classification performance considering full feature set, feature selection, and feature weighting and suggests a set of the best and the worst methods combining the normalization procedure and empirical analysis of results.

469 citations