scispace - formally typeset
Search or ask a question

Showing papers in "Egyptian Informatics Journal in 2018"


Journal ArticleDOI
TL;DR: This work presents a comprehensive overview of various feature selection methods and their inherent pros and cons, and analyzes adaptive classification systems and parallel classification systems for chronic disease prediction.

238 citations


Journal ArticleDOI
TL;DR: Hybrid Ant colony optimization and particle swarm optimization and PSO based energy efficient clustering and tree based routing protocol is proposed and considerably enhances network lifetime over other techniques.

110 citations


Journal ArticleDOI
TL;DR: The experimental results prove that the proposed CDE algorithms are able to provide very competitive results for numerical optimization problems based on the IEEE Congress on Evolutionary Computation (CEC) 2014 test suite.

26 citations


Journal ArticleDOI
TL;DR: In this model, a novel gene feature clustering with ensemble document classification was implemented on biomedical repositories (PubMed and Medline) using the MapReduce framework and Experimental results show that the proposed model has a high computational cluster quality rate and true positive classification rate compared to traditional document clustering and classification models.

16 citations


Journal ArticleDOI
TL;DR: The experimental results show that bilateral filter based Laws’ mask feature extraction technique provides better classification accuracy for all the four databases for various combinations of bilateral filter range and domain parameters.

15 citations


Journal ArticleDOI
TL;DR: The definition of topological information retrieval systems (TIRS) is introduced as a generalization of the information retrieval system and some topological near open sets are applied to these systems for feature selection.

8 citations


Journal ArticleDOI
TL;DR: A comparative study is made between four different approaches: TWEDistance operator, regression, interpolation and curve barcoding, and results show that interpolation achieves the highest accuracy compared to the other approaches with an average accuracy up to 90%.

4 citations


Journal ArticleDOI
TL;DR: In Mid-DRRQ mechanism, the protocol-level attacks are prevented by using indistinguishability obfuscation model which generates the fake traffic within the middle relay which is allowed on outgoing connections without any cover traffic.

2 citations