Showing papers in "Egyptian Informatics Journal in 2018"
••
TL;DR: This work presents a comprehensive overview of various feature selection methods and their inherent pros and cons, and analyzes adaptive classification systems and parallel classification systems for chronic disease prediction.
238 citations
••
TL;DR: Hybrid Ant colony optimization and particle swarm optimization and PSO based energy efficient clustering and tree based routing protocol is proposed and considerably enhances network lifetime over other techniques.
110 citations
••
TL;DR: The experimental results prove that the proposed CDE algorithms are able to provide very competitive results for numerical optimization problems based on the IEEE Congress on Evolutionary Computation (CEC) 2014 test suite.
26 citations
••
TL;DR: In this model, a novel gene feature clustering with ensemble document classification was implemented on biomedical repositories (PubMed and Medline) using the MapReduce framework and Experimental results show that the proposed model has a high computational cluster quality rate and true positive classification rate compared to traditional document clustering and classification models.
16 citations
••
TL;DR: The experimental results show that bilateral filter based Laws’ mask feature extraction technique provides better classification accuracy for all the four databases for various combinations of bilateral filter range and domain parameters.
15 citations
••
TL;DR: The definition of topological information retrieval systems (TIRS) is introduced as a generalization of the information retrieval system and some topological near open sets are applied to these systems for feature selection.
8 citations
••
TL;DR: A comparative study is made between four different approaches: TWEDistance operator, regression, interpolation and curve barcoding, and results show that interpolation achieves the highest accuracy compared to the other approaches with an average accuracy up to 90%.
4 citations
••
TL;DR: In Mid-DRRQ mechanism, the protocol-level attacks are prevented by using indistinguishability obfuscation model which generates the fake traffic within the middle relay which is allowed on outgoing connections without any cover traffic.
2 citations