default search action
Hassan B. Kazemian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j37]Hassan B. Kazemian, Subeksha Shrestha:
Comparisons of machine learning techniques for detecting fraudulent criminal identities. Expert Syst. Appl. 229(Part A): 120591 (2023) - 2022
- [c28]Hassan B. Kazemian:
Machine Learning Approach to Detect Malicious Mobile Apps. AIAI (2) 2022: 124-135 - [c27]Hassan B. Kazemian, Mohammad Hossein Amirhosseini, Michael Phillips:
Application of Graph-Based Technique to Identity Resolution. AIAI (1) 2022: 471-482 - 2021
- [j36]Yang Ma, Hassan B. Kazemian:
Public key authenticated encryption with multiple keywords search using Mamdani system. Evol. Syst. 12(3): 687-699 (2021) - [c26]Asif Nawaz, Hassan B. Kazemian:
A Fuzzy Approach to Identity Resolution. EANN 2021: 307-318 - 2020
- [j35]Hassan B. Kazemian, Cedric Maxime Grimaldi:
Cascading classifier application for topology prediction of transmembrane beta-barrel proteins. J. Bioinform. Comput. Biol. 18(6): 2050034:1-2050034:15 (2020) - [j34]Istteffanny Isloure Araujo, Hassan B. Kazemian:
Improving Steganographic capacity using distributed steganography over BMP. Multim. Tools Appl. 79(35-36): 26181-26195 (2020) - [j33]Mohammad Hossein Amirhosseini, Hassan B. Kazemian:
Machine Learning Approach to Personality Type Prediction Based on the Myers-Briggs Type Indicator®. Multimodal Technol. Interact. 4(1): 9 (2020) - [c25]Hassan B. Kazemian, Yang Ma:
Fuzzy Logic Application to Searchable Cryptography. EANN 2020: 410-422 - [c24]Michael Phillips, Mohammad Hossein Amirhosseini, Hassan B. Kazemian:
A Rule and Graph-Based Approach for Targeted Identity Resolution on Policing Data. SSCI 2020: 2077-2083
2010 – 2019
- 2019
- [j32]Mohammad Hossein Amirhosseini, Hassan B. Kazemian:
Automating the process of identifying the preferred representational system in Neuro Linguistic Programming using Natural Language Processing. Cogn. Process. 20(2): 175-193 (2019) - 2018
- [c23]Mohammad Hossein Amirhosseini, Hassan B. Kazemian, Karim Ouazzane, Chris Chandler:
Natural Language Processing approach to NLP Meta model automation. IJCNN 2018: 1-8 - [c22]Yang Ma, Hassan B. Kazemian:
Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (Student Contributions). SIN 2018: 2:1-2:6 - [c21]Hassan B. Kazemian, Cedric Maxime Grimaldi:
Cascading classifier application for topology prediction of TMB proteins. SSCI 2018: 1049-1055 - 2016
- [j31]Hassan B. Kazemian, Syed Adnan Yusuf, Kenneth White, Cedric Maxime Grimaldi:
NN approach and its comparison with NN-SVM to beta-barrel prediction. Expert Syst. Appl. 61: 203-214 (2016) - [c20]Iman Samizadeh, Hassan B. Kazemian, Ken Fisher, Karim Ouazzane:
Performance optimization in video transmission over ZigBee using Particle Swarm Optimization. IWCIA 2016: 15-20 - 2015
- [j30]Hassan B. Kazemian, S. Ahmed:
Comparisons of machine learning techniques for detecting malicious webpages. Expert Syst. Appl. 42(3): 1166-1177 (2015) - [j29]Heba M. Elhoseny, Hossam El-din Hussien Ahmed, Alaa M. Abbas, Hassan B. Kazemian, Osama S. Faragallah, El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie:
Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. Signal Image Video Process. 9(3): 611-622 (2015) - [j28]Ehab H. Elshazly, Osama S. Faragallah, Alaa M. Abbas, Mahmoud Ashour, El-Sayed M. El-Rabaie, Hassan B. Kazemian, Saleh A. Alshebeili, Fathi E. Abd El-Samie, Hala S. El-sayed:
Robust and secure fractional wavelet image watermarking. Signal Image Video Process. 9(Supplement-1): 89-98 (2015) - 2014
- [j27]Hassan B. Kazemian, Syed A. Yusuf, Kenneth White:
Signal peptide discrimination and cleavage site identification using SVM and NN. Comput. Biol. Medicine 45: 98-110 (2014) - [j26]Leiku Yang, Yong Xue, Jie Guang, Hassan B. Kazemian, Jiahua Zhang, Chi Li:
Improved Aerosol Optical Depth and Ångstrom Exponent Retrieval Over Land From MODIS Based on the Non-Lambertian Forward Model. IEEE Geosci. Remote. Sens. Lett. 11(9): 1629-1633 (2014) - [j25]Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf:
Identification of probe request attacks in WLANs using neural networks. Neural Comput. Appl. 25(1): 1-14 (2014) - [c19]Hassan B. Kazemian, Syed Adnan Yusuf:
An ANFIS approach to transmembrane protein prediction. FUZZ-IEEE 2014: 1360-1365 - 2013
- [j24]Hassan B. Kazemian, Kenneth White, Dominic Palmer-Brown:
Applications of evolutionary SVM to prediction of membrane alpha-helices. Expert Syst. Appl. 40(9): 3412-3420 (2013) - [j23]Hassan B. Kazemian, Kenneth White, Dominic Palmer-Brown, Syed Adnan Yusuf:
Corrigendum to "Applications of evolutionary SVM to prediction of membrane alpha-helices" [Expert Systems with Applications 40 (9) (2013) 3412-3420]. Expert Syst. Appl. 40(16): 6690 (2013) - [j22]Ronnie Cheung, Hassan B. Kazemian, Jiannong Cao:
Model Reference Adaptive Control in Fuzzy-Based Context-Aware Middleware. Int. J. Comput. Intell. Syst. 6(4): 778-795 (2013) - [j21]Hassan B. Kazemian, Karim Ouazzane:
Neuro-Fuzzy approach to video transmission over ZigBee. Neurocomputing 104: 127-137 (2013) - [j20]Jun Li, Karim Ouazzane, Hassan B. Kazemian, Muhammad Sajid Afzal:
Neural Network Approaches for Noisy Language Modeling. IEEE Trans. Neural Networks Learn. Syst. 24(11): 1773-1784 (2013) - [j19]Mohsen A. M. El-Bendary, Atef E. Abou-El-azm, Nawal A. El-Fishawy, Farid Shawki, Mostafa Refai El-Tokhy, Fathi E. Abd El-Samie, Hassan B. Kazemian:
Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Wirel. Networks 19(4): 517-532 (2013) - [c18]Iman Samizadeh, Hassan B. Kazemian, Ken Fisher, Karim Ouazzane:
Adaptive scalable rate control over IEEE 802.15.4 using particle swarm optimization. ICAT 2013: 1-5 - 2012
- [j18]Mohsen A. M. El-Bendary, Atef E. Abou-El-azm, Nawal A. El-Fishawy, Farid Shawki, Fathi E. Abd El-Samie, Mostafa Refai El-Tokhy, Hassan B. Kazemian:
Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP J. Audio Speech Music. Process. 2012: 4 (2012) - [j17]Karim Ouazzane, Jun Li, Hassan B. Kazemian, Yanguo Jing, Richard Boyd:
An Artificial Intelligence-based language modeling framework. Expert Syst. Appl. 39(5): 5960-5970 (2012) - [c17]Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf:
Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm. SECRYPT 2012: 345-350 - 2011
- [j16]Waleed Al-Nuaimy, Mohsen A. M. El-Bendary, Amira Shafik, Farid Shawki, Atef E. Abou-El-azm, Nawal A. El-Fishawy, Said M. Elhalafawy, Salaheldin M. Diab, Bassiuny M. Sallam, Fathi E. Abd El-Samie, Hassan B. Kazemian:
An SVD audio watermarking approach using chaotic encrypted images. Digit. Signal Process. 21(6): 764-779 (2011) - [j15]Hassan B. Kazemian:
Two neuro-fuzzy control schemes for a traffic-regulating buffer in wireless technology. Inf. Sci. 181(16): 3476-3490 (2011) - [j14]Mohsen A. M. El-Bendary, Atef E. Abou-El-azm, Nawal A. El-Fishawy, Farid Shawki, Mostafa Refai El-Tokhy, Fathi E. Abd El-Samie, Hassan B. Kazemian:
Enhancing the Image Transmission over Wireless Networks through a Novel Interleaver. KSII Trans. Internet Inf. Syst. 5(9): 1528-1543 (2011) - [j13]Guillaume F. Remy, Hassan B. Kazemian, Phil D. Picton:
Application of neural-fuzzy controller for streaming video over Bluetooth 1.2. Neural Comput. Appl. 20(6): 879-887 (2011) - [j12]Jun Li, Karim Ouazzane, Hassan B. Kazemian, Yanguo Jing, Richard Boyd:
A neural network based solution for automatic typing errors correction. Neural Comput. Appl. 20(6): 889-896 (2011) - [c16]Muhammad Abdul Tawab Khalil, P. D. D. Dominic, Hassan B. Kazemian, Usman Habib:
A Study to Examine If Integration of Technology Acceptance Model's (TAM) Features Help in Building a Hybrid Digital Business Ecosystem Framework for Small and Medium Enterprises (SMEs). FIT 2011: 161-166 - [c15]Jun Li, Karim Ouazzane, Muhammad Sajid Afzal, Hassan B. Kazemian:
Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models. ICEIS (2) 2011: 5-12 - [c14]Karim Ouazzane, Muhammad Sajid Afzal, Hassan B. Kazemian, Jun Li:
An e-Business Framework Design using Enhanced Web 2.0 Technology. ICEIS (4) 2011: 97-102 - [c13]Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf, Azween B. Abdullah:
An Intelligent Approach to Detect Probe Request Attacks in IEEE 802.11 Networks. EANN/AIAI (1) 2011: 372-381 - [c12]Karim Ouazzane, Jun Li, Hassan B. Kazemian:
An Intelligent Keyboard Framework for Improving Disabled People Computer Accessibility. EANN/AIAI (1) 2011: 382-391 - [c11]Ronnie Cheung, Hassan B. Kazemian:
Adaptive Service Composition for Meta-searching in a Mobile Environment. EANN/AIAI (1) 2011: 412-421 - [c10]Shanyu Tang, Hassan B. Kazemian:
Simulation of Web Data Traffic Patterns Using Fractal Statistical Modelling. EANN/AIAI (1) 2011: 422-432 - [c9]Ronnie Cheung, Hassan B. Kazemian:
An Adaptive Framework for Personalized E-Learning. NDT 2011: 292-306 - 2010
- [c8]Hassan B. Kazemian, Guillaume F. Remy, Phil D. Picton:
Supervised Neural Fuzzy Schemes in Video Transmission over Bluetooth. ICANN (3) 2010: 378-386
2000 – 2009
- 2009
- [c7]Jun Li, Karim Ouazzane, Yanguo Jing, Hassan B. Kazemian, Richard Boyd:
Evolutionary Ranking on Multiple Word Correction Algorithms Using Neural Network Approach. EANN 2009: 409-418 - [c6]Guillaume F. Remy, Hassan B. Kazemian:
Application of Neural Fuzzy Controller for Streaming Video over IEEE 802.15.1. EANN 2009: 419-429 - [c5]Hassan B. Kazemian:
An intelligent video streaming technique in zigbee wireless. FUZZ-IEEE 2009: 121-126 - [c4]Guillaume F. Remy, Hassan B. Kazemian:
Video transmission over IEEE 802.15.1 standard using neural-fuzzy. FUZZ-IEEE 2009: 141-146 - 2008
- [c3]Hassan B. Kazemian, Soamsiri Chantaraskul:
Intelligent approach to video transmission over 2.4 GHz wireless technology. FUZZ-IEEE 2008: 246-250 - 2006
- [j11]Hassan B. Kazemian:
A fuzzy approach to MPEG video transmission in ATM networks. Fuzzy Sets Syst. 157(16): 2259-2272 (2006) - [j10]Hassan B. Kazemian, Li Meng:
A fuzzy control scheme for video transmission in Bluetooth wireless. Inf. Sci. 176(9): 1266-1289 (2006) - [j9]Hassan B. Kazemian, Li Meng:
An Adaptive Control for Video Transmission Over Bluetooth. IEEE Trans. Fuzzy Syst. 14(2): 263-274 (2006) - [j8]Hassan B. Kazemian, Li Meng:
Neuro-Fuzzy Control for MPEG Video Transmission Over Bluetooth. IEEE Trans. Syst. Man Cybern. Syst. 36(6): 761-771 (2006) - 2005
- [j7]Subrata K. Bose, Hassan B. Kazemian, Kenneth White, Antony Browne:
Use Of Neural Networks To Predict And Analyse Membrane Proteins In The Proteome. BMC Bioinform. 6(S-3) (2005) - [j6]Hassan B. Kazemian:
Developments of fuzzy PID controllers. Expert Syst. J. Knowl. Eng. 22(5): 254-264 (2005) - 2004
- [j5]David Soud, Hassan B. Kazemian:
A fuzzy approach to active usage parameter control in IEEE 802.11b wireless networks. Expert Syst. J. Knowl. Eng. 21(5): 269-278 (2004) - [c2]Hassan B. Kazemian, Li Meng:
A fuzzy approach to video transmission over Bluetooth ACL links. CCNC 2004: 533-538 - 2002
- [j4]Hassan B. Kazemian:
Guest Editorial: Fuzzy Control Systems. Expert Syst. J. Knowl. Eng. 19(1): 2-3 (2002) - [j3]Hassan B. Kazemian:
Guest Editorial: Fuzzy logic applications. Expert Syst. J. Knowl. Eng. 19(4): 189-190 (2002) - [j2]Hassan B. Kazemian:
The SOF-PID controller for the control of a MIMO robot arm. IEEE Trans. Fuzzy Syst. 10(4): 523-532 (2002) - 2001
- [j1]Hassan B. Kazemian:
Study of Learning Fuzzy Controllers. Expert Syst. J. Knowl. Eng. 18(4): 186-193 (2001) - [c1]Hassan B. Kazemian:
Development of An Intelligent Fuzzy Controller. FUZZ-IEEE 2001: 517-520
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint