Secure data transmission in WSN: An overview

M Elhoseny, AE Hassanien, M Elhoseny… - … Sensor Networks: New …, 2019 - Springer
Building a secure routing protocol in WSN is not trivial process. Thee are two main types of
security attacks against WSNs: active and passive. WSN as a new category of computer …

A new binary salp swarm algorithm: development and application for optimization tasks

RM Rizk-Allah, AE Hassanien, M Elhoseny… - Neural Computing and …, 2019 - Springer
Salp swarm algorithm (SSA) is one of the recent meta-heuristic algorithms that imitate the
behaviors of salps during the navigating and foraging in oceans to perform global …

Quantum medical images processing foundations and applications

A Elaraby - IET Quantum Communication, 2022 - Wiley Online Library
Medical imaging is considered one of the most important areas within scientific imaging due
to the rapid and ongoing development in computer‐aided medical image visualisation …

A machine learning model for predicting of chronic kidney disease based internet of things and cloud computing in smart cities

A Abdelaziz, AS Salama, AM Riad… - Security in smart cities …, 2019 - Springer
Cloud computing and internet of things (IOT) plays an important role in health care services
especially in the prediction of diseases in smart cities. IOT devices (digital sensors and etc.) …

Multi-object intergroup gesture recognition combined with fusion feature and KNN algorithm

S Liao, G Li, J Li, D Jiang, G Jiang… - Journal of Intelligent …, 2020 - content.iospress.com
SEMG signal is a bioelectrical signal produced by the contraction of human surface muscles.
Human-computer interaction based on SEMG signal is of great significance in the field of …

Application of PSO-RBF neural network in gesture recognition of continuous surface EMG signals

M Yu, G Li, D Jiang, G Jiang, F Zeng… - Journal of Intelligent …, 2020 - content.iospress.com
In view of the fact that independent gesture recognition cannot fully meet the natural,
convenient and effective needs of actual human-computer interaction, this paper analyzes …

Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states

A Farouk, J Batle, M Elhoseny, M Naseri, M Lone… - Frontiers of …, 2018 - Springer
Quantum communication provides an enormous advantage over its classical counterpart:
security of communications based on the very principles of quantum mechanics …

Visualization of activated muscle area based on sEMG

Y Cheng, G Li, J Li, Y Sun, G Jiang… - Journal of Intelligent …, 2020 - content.iospress.com
Based on HSV gamut space, a visualization system of muscle activity is proposed to study
the mapping relationship between hand motion and active areas of upper arm muscle …

Healthcare analysis in smart big data analytics: reviews, challenges and recommendations

A Ismail, A Shehab, IM El-Henawy - Security in smart cities: models …, 2019 - Springer
Increasing demand and costs for healthcare is a challenge because of the high populations
and the difficulty to cover all patients by the available doctors. The healthcare data …

Two-stage data encryption using chaotic neural networks

G Srivastava, CNS Vinoth Kumar… - Journal of Intelligent …, 2020 - content.iospress.com
Securing a wireless sensor system is a hard task for researchers today. Strengthening the
authentication system before connection establishment is the right way to enhance the …