Skip to main content

Showing 1–3 of 3 results for author: Abdelrahim, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1709.08375  [pdf

    cs.CG

    Shadow Detection and Geo-tagged Image Information Based Strategic Infrastructure Characterization

    Authors: E. MD. Abdelrahim, Romany F. Mansour

    Abstract: Exploring the significance of geo-tagged information of a satellite image and associated shadow information in the image to enable man-made infrastructure dimensional characterization, in this paper a novel approach has been developed to estimate the height of a man-made structure accurately. Our proposed method applies shadow detection and shadow feature along with geo-tagged information retrieve… ▽ More

    Submitted 19 March, 2018; v1 submitted 25 September, 2017; originally announced September 2017.

    Comments: Internation Conference On Recent Innovations in Engineering and Technology (ICRIET), Netherlands on 9-10 March 2018

  2. An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

    Authors: Romany F. Mansour, Elsaid MD. Abdelrahim

    Abstract: The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices being located remotely. However, to ensure accurate and optimal telemedicine there is the requirement of seamless or flawless biomedical informat… ▽ More

    Submitted 30 April, 2018; v1 submitted 25 September, 2017; originally announced September 2017.

    Comments: 14 page / 3 figures / 6 tables, Multidimensional Systems and Signal Processing 2018

  3. arXiv:1709.05793  [pdf, other

    cs.MA math.OC

    MAX-consensus in open multi-agent systems with gossip interactions

    Authors: Mahmoud Abdelrahim, Julien M. Hendrickx, W. P. M. H. Heemels

    Abstract: We study the problem of distributed maximum computation in an open multi-agent system, where agents can leave and arrive during the execution of the algorithm. The main challenge comes from the possibility that the agent holding the largest value leaves the system, which changes the value to be computed. The algorithms must as a result be endowed with mechanisms allowing to forget outdated informa… ▽ More

    Submitted 18 September, 2017; originally announced September 2017.

    Comments: To appear in the proceedings of the 56th IEEE Conference on Decision and Control (CDC 17). 8 pages, 3 figures