Skip to main content

Showing 1–4 of 4 results for author: Mahdi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1705.00761  [pdf

    cs.DB

    F-tree: an algorithm for clustering transactional data using frequency tree

    Authors: Mahmoud Mahdi, Samir Abdelrahman, Reem Bahgat, Ismail Ismail

    Abstract: Clustering is an important data mining technique that groups similar data records, recently categorical transaction clustering is received more attention. In this research, we study the problem of categorical data clustering for transactional data characterized with high dimensionality and large volume. We propose a novel algorithm for clustering transactional data called F-Tree, which is based on… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: Appeared at Al-Azhar University Engineering Journal, JAUES, Vol.5, No. 8, Dec 2010

  2. arXiv:1703.01534  [pdf, other

    cs.CR

    Secure Count Query on Encrypted Genomic Data

    Authors: Mohammad Zahidul Hasan, Md Safiur Rahman Mahdi, Noman Mohammed

    Abstract: Capturing the vast amount of meaningful information encoded in the human genome is a fascinating research problem. The outcome of these researches have significant influences in a number of health related fields --- personalized medicine, paternity testing and disease susceptibility testing are a few to be named. To facilitate these types of large scale biomedical research projects, it oftentimes… ▽ More

    Submitted 4 March, 2017; originally announced March 2017.

    Comments: 19 pages, 7 figures, 3rd International Workshop on Genome Privacy and Security (GenoPri'16)

  3. arXiv:1401.5246  [pdf

    cs.NE

    Genetic Algorithms and its use with back-propagation network

    Authors: Ayman M. Bahaa-Eldin, A. M. A. Wahdan, H. M. K. Mahdi

    Abstract: Genetic algorithms are considered as one of the most efficient search techniques. Although they do not offer an optimal solution, their ability to reach a suitable solution in considerably short time gives them their respectable role in many AI techniques. This work introduces genetic algorithms and describes their characteristics. Then a novel method using genetic algorithm in best training set g… ▽ More

    Submitted 21 January, 2014; originally announced January 2014.

    Journal ref: AIN Shams University, Faculty of Engineering Scientific Bulletin, Volume 35, Issue 3, pp 337-348 (2000)

  4. arXiv:1401.5245  [pdf

    cs.CV

    Edge detection of binary images using the method of masks

    Authors: Ayman M Bahaa-Eldeen, Abdel-Moneim A. Wahdan, Hani M. K. Mahdi

    Abstract: In this work the method of masks, creating and using of inverted image masks, together with binary operation of image data are used in edge detection of binary images, monochrome images, which yields about 300 times faster than ordinary methods. The method is divided into three stages: Mask construction, Fundamental edge detection, and Edge Construction Comparison with an ordinary method and a fuz… ▽ More

    Submitted 21 January, 2014; originally announced January 2014.

    Journal ref: Ain Shams University, Faculty of Engineering Scientific Bulletin, Volume 35, Issue 3, pp 349-355, (2000)