Patents

Journal Publications

Books

Book Chapters/Reviews

Conference Publications

Technical Reports

Theses

Talks/Seminars/Keynote

Others

Publications

 

(Copyright Notice)

DBLP   Scholar    Scopus   ResearchGate  

 

USPTO Patents

Publications in Refereed Journals

Books

 

IET 2018

 

نتيجة بحث الصور عن السيد الألفى رضوان عبد العال كتاب شبكات   Improving Information Security Practices through Computational Intelligence    

 

 NIP

     Intelligent Systems Technologies and Applications 2016  Image result for Advances in Intelligent Informatics 

       

Book Chapters and Book Reviews

    Image result for el-sayed el-alfy book chapter Image result for el-sayed el-alfy book chapter  Image result for el-sayed el-alfy book chapter routing network Image result for el-sayed el-alfy book chapter routing network
  • Khaled A. Al-Utaibi, El-Sayed M. El-Alfy. Searching Encrypted Data on the Cloud. In Computer and Network Security Essentials, 2018. 
  • W. S. Awad, and E.-S. M. El-Alfy, �Computational Intelligence in Cryptology�, In Imprving Information Security Practices through Computational Intelligence, IGI Book, Book Chapter, 2016.
  • E.-S. M. El-Alfy, and W. S. Awad,  �Computational Intelligence Paradigms:  An overview�, In Imprving Information Security Practices through Computational Intelligence, IGI Book, Book Chapter, 2016.
  • E.-S. M. El-Alfy, �Chaotic-Based and Biologically-Inspired Cryptosystems for Secure Image Communication and Storage�, In Imprving Information Security Practices through Computational Intelligence, IGI Book, Book Chapter, 2016.
  • M. A. Abido, E.-S. M. El-Alfy and M. Sheraz, "Computational Intelligence in Smart Grids: Case Studies" In Computational Intelligence for Decision Support in Cyber-Physical Systems, Springer 2014. DOI: 10.1007/978-981-4585-36-1-9
    
    	
  • E-S. M. El-Alfy, "Routing and Traffic Management," in S. Misra, S. C. Misra, and I. Woungang (Eds.). Selected Topics in Communication Networks and Distributed Systems, World Scientific, 2009. ISBN: 978-981-283-943-5. (Chapter 13)

  • E.-S. M. El-Alfy, "Learning Methods for Spam Filtering," in H. Peters and M. Vogel (Eds.). Machine Learning Research Progress, Nova Science Publishers, 2008. ISBN: 978-1-60456-646-8.  Also published in Computer Systems, Support and Technology, pp. 175-217.

  • E-S. M. El-Alfy, "A review of network security," IEEE Distributed Systems Online, vol. 8, no. 7, July 2007. (Book Review)  <pdf file>

  • E.-S. M. El-Alfy, �A general look at building applications for mobile devices,� IEEE Distributed Systems Online, vol. 6, no. 9, September 2005. (Book Review) <pdf file>

  • E-S. M. El-Alfy, �Software agents,� ACM Intelligence, 2000. (Book Review)pdf file Publications in Refereed Conference Proceedings

Refereed Papers in Conference Proceedings or Edited Volumes


Book Chapters and Book Reviews
  • El-Alfy, E.-S.M., Binsaadoon, A.G. (2017)  Silhouette-Based Gender Recognition in Smart Environments Using Fuzzy Local Binary Patterns and Support Vector Machines. Procedia Computer Science, 109, pp. 164-171. DOI: 10.1016/j.procs.2017.05.313

  • Al-Azani, S., El-Alfy, E.-S.M. (2017)  Using Word Embedding and Ensemble Learning for Highly Imbalanced Data Sentiment Analysis in Short Arabic Text. Procedia Computer Science, 109, pp. 359-366. DOI: 10.1016/j.procs.2017.05.365

  • Binsaadoon, A.G., El-Alfy, E.-S.M. (2017) Kernel-Based Fuzzy Local Binary Pattern for Gait Recognition
    Proceedings - UKSim-AMSS 2016: 10th European Modelling Symposium on Computer Modelling and Simulation, art. no. 7920225, pp. 35-40.  DOI: 10.1109/EMS.2016.016

  • Alshammari, M.A., El-Alfy, E.-S.M. MapReduce implementation for minimum reduct using parallel genetic algorithm. Proc. 6th International Conference on Information and Communication Systems, ICICS 2015, art. no. 7103194, pp. 13-18.

  • Mohammed, S., El-Alfy, E.-S.M., Barradah, A.F. Online prime labeling and generation of synopsis for XML query estimation. Proc. 6th International Conference on Information and Communication Systems, ICICS 2015, art. no. 7103195, pp. 19-24.

  • Baig, M.M., Awais, M.M., El-Alfy, E.-S.M. BOOSTRON: Boosting based perceptron learning. Lecture Notes in Computer Science, 8834, 2014, pp. 199-206.

  • El-Alfy, E.-S.M. ANFIS-based model for improved paraphrase rating prediction.  Lecture Notes in Computer Science, 8834, 2014, pp. 397-404.

  • El-Alfy, E.-S.M., Al-Hasan, A.A. A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithm. Proc. IEEE Symposium on Computational Intelligence in Cyber Security, CICS, 2014.

  • El-Alfy, E.-S.M., Ghaleb, A.A. Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation study. Proc. IEEE Symposium on Computational Intelligence in Cyber Security, CICS, 2014.

  • El-Alfy, E.-S.M., Riaz, M.R. Image quality assessment using ANFIS approach. Proc. 6th International Conference on Agents and Artificial Intelligence, ICAART 2014, pp. 169-177.

  • Al-Obeidat, F.N., El-Alfy, E.-S.M. Network intrusion detection using multi-criteria PROAFTN classification. Proc. 5th International Conference on Information Science and Applications, ICISA 2014.

  • El-Alfy, E.-S.M. Statistical analysis of ml-based paraphrase detectors with lexical similarity metrics. Proc. 5th International Conference on Information Science and Applications, ICISA 2014.

  • Baig, M., El-Alfy, E.-S.M., Awais, M.M. Intrusion detection using a cascade of boosted classifiers (CBC). Proc. IEEE International Joint Conference on Neural Networks, IJCNN 2014, pp. 1386-1392.

  • El-Alfy, E.-S.M. Enhanced hand shape identification using random forests. Lecture Notes in Computer Science, 8227 LNCS (PART 2), 2013, pp. 441-447.

  • El-Alfy, E.-S.M. Detecting pixel-value differencing steganography using Levenberg-Marquardt neural network. Proc. IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2013, pp. 160-165.

  • El-Alfy, E.-S.M., Al-Sadi, A.A. High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus Function. Communications in Computer and Information Science, 294 PART 2, 2012, pp. 243-252.

  • El-Alfy, E.-S.M., BinMakhashen, G.M. Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector Machines. Communications in Computer and Information Science, 294 PART 2, 2012, pp. 253-261.

  • Alvi, F., El-Alfy, E.-S.M., Al-Khatib, W.G., Abdel-Aal, R.E. Analysis and extraction of sentence-level paraphrase sub-corpus in CS education. Proc. ACM Special Interest Group for Information Technology Education Conference, SIGITE'12, pp. 49-54.

  • El-Alfy, E.-S.M., Abdel-Aal, R.E., Baig, Z.A. Abductive neural network modeling for hand recognition using geometric features. Lecture Notes in Computer Science, 7666 LNCS (PART 4), 2012, pp. 593-602.

  • Binmakhashen, G.M., El-Alfy, E.-S.M. Fusion of multiple texture representations for palmprint recognition using neural networks. Lecture Notes in Computer Science, 7667 LNCS (PART 5), 2012, pp. 410-417.

  • El-Alfy, E.-S.M., Bin Makhashen, G.M. Evaluation of support vector machine with universal kernel for hand-geometry based identification. Proc. IEEE International Conference on Innovations in Information Technology, IIT 2012, pp. 117-122.

  • El-Alfy, E.-S.M. Automatic identification based on hand geometry and probabilistic neural networks. Proc. IEEE 5th International Conference on New Technologies, Mobility and Security, NTMS 2012.

  • El-Alfy, E.-S.M., Al-Sadi, A.A. Improved pixel value differencing steganography using logistic chaotic maps. Proc. IEEE International Conference on Innovations in Information Technology, IIT 2012, pp. 129-133.

  • El-Alfy, E.-S.M. Classification of deformable geometric shapes using radial-basis function networks and ring-wedge energy features. Proc. 4th International Conference on Agents and Artificial Intelligence, ICAART 2012, pp. 355-362.

  • El-Alfy, E.-S. M. and Al-Sadi, A. �A More Effective Steganographic Approach for Color Images by Combining Simple Methods,� in Proceeding of the 7th International Computing Conference in Arabic, ICCA 2011, Riyadh, Saudi Arabia, May 2011. (in Arabic)

  • Abido, M. A. and El-Alfy, E.-S. M., �Design of Damping Controllers in Electrical Power Systems Using Continuous Genetic Algorithms,� in Proceeding of the 7th International Computing Conference in Arabic, ICCA 2011, Riyadh, Saudi Arabia, May 2011. (in Arabic)

  • El-Alfy, E.-S. M. and Al-Sadi, A. �A Comparative Study of PVD-Based Schemes for Data Hiding in Digital Images,� in Proceedings of the 9th ACS/IEEE International Conference on Computer Systems and Applications, (AICCSA 2011), Sharm El-Sheikh, Egypt, June 27-30, 2011.

  • El-Alfy, E.-S. M. �A Reinforcement Learning Approach for Sequential Mastery Testing,� in Proceedings of IEEE Symposium Series in Computational Intelligence (SSCI 2011), Adaptive Dynamic Programming and Reinforcement Learning, Paris, France, April 11-15, 2011.

  • El-Alfy, E.-S. M. and Al-Utaibi, K. �A Color Image Encryption Scheme Based on Chaotic Maps and Genetic Operators for Confusion and Diffusion,� in Proceedings of the 7th International Conference on Network Services (ICNS 2011), IARIA, Venice/Mestre, Italy, May 22-27, 2011.

  • Al-Sadi, A. A. and El-Alfy, E.-S. M., �An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing,� in Proceedings of the International Conference on Advances in Computing and Communications (AC 2011), Kochi Kerala, India, Jul 22-24, 2011

  • El-Alfy, E.-S. M.Flow-Based Path Selection for Internet Traffic Engineering with NSGA-II," in the Proceedings of the 17th International Conference on Telecommunications (ICT2010), Doha, Qatar, April 4-7, 2010.

  • El-Alfy, E.-S. M., �A Hierarchical Group Method of Data Handling Polynomial Neural Network for Handwritten Numeral Recognition,� Proceedings of the IEEE/INNS International Joint Conference on Neural Networks (IJCNN 2010), Barcelona, Spain, July 18-23, 2010.

  • Al-Utaibi, K. and El-Alfy, E.-S. M.,  �A Bio-Inspired Image Encryption Algorithm Based on Chaotic Maps,� Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2010), Barcelona, Spain, July 18-23, 2010.

  • El-Sayed M. El-Alfy, "Discovering classification rules for email spam filtering with an ant colony optimization algorithm," IEEE Congress on Evolutionary Computation (CEC�09), Trondheim, Norway, May 18-21, 2009.

  • El-Sayed M. El-Alfy, and Said A. Muhammad, �E-Restaurant: A collaborative distributed system integrating restaurant operation automation and meal recommendation,� in Proceedings of the Fourth eServices Symposium in the Eastern Province of Saudi Arabia: eServices Integration, Al-Khobar, Saudi Arabia, March 9-11, 2009.

  • El-Sayed M. El-Alfy, and  Anas M.N. Orwani, "The need for a unified framework for evaluating web cache replacement strategies," in Proceedings of the 5th IEEE-GCC Conference, Kuwait, March 17-19, 2009.

  • El-Sayed M. El-Alfy, "Abductive learning approach for geometric shape recognition,� in Proceedings of the International Conference on Intelligent Systems and Exhibition, Bahrain, Dec. 1-3, 2008.

  • El-Sayed M. El-Alfy and Radwan E. Abdel-Aal, �Spam filtering with abductive networks,� in Proceedings of the IEEE International Joint Conference on Neural Networks (IJCNN�08), Hong Kong, June 1-6, 2008.  <pdf file>

  • El-Sayed M. El-Alfy and Fares S. Al-Qunaieer, �A fuzzy similarity approach for automated spam filtering,� in Proceedings of IEEE International Conference on Computer Systems and Applications (AICCSA�08), Qatar, April 2008. <pdf file>

  • El-Sayed M. El-Alfy, Shokri Z. Selim and Syed N. Mujahid, �Solving the minimum-cost constrained multipath routing with load balancing in MPLS networks using an evolutionary method,� in Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2007), Singapore, September 2007.

  • El-Sayed M. El-Alfy and Syed S. Jafri, �A recurrent neural network for sequential estimation of examinees' knowledge state,� in Proceedings of the First International Conference on Interactive Computer aided Blended Learning (ICBL 2007), IEEE Student Track, Brazil, May 2007.

  • El-Sayed M. El-Alfy and Shokri Z. Selim, �On optimal firewall rule ordering,� in Proceedings of IEEE International Conference on Computer Systems and Applications (AICCSA�07), Amman, Jordan, May 13�16, 2007. <pdf file>

  • El-Sayed M. El-Alfy, �A heuristic approach for firewall policy optimization,� in Proceedings of IEEE International Conference on Advanced Communication Technology (ICACT�07), Phoenix Park, Republic of Korea, February 12�14, 2007. <pdf file>

  • El-Sayed M. El-Alfy and Syed S. Jafri, �A neural network approach for estimating examinees� proficiency levels in computerized adaptive testing,� in Proceedings of IASTED International Conference on Web-based Education (WBE�07), Chamonix, France, March 14�16, 2007. <pdf file>

  • Nada M. El-Shenawy, Mohamed N. El-Drini, Mahmoud M. Fahmy and El-Sayed M. El-Alfy, �Performance comparison of CBT and PIM multicast routing protocols over MPLS networks,� in Proceedings of IEEE International Conference on Computer Engineering & Systems (ICCES'06), Cairo, Egypt, November 2006. <pdf file>

  • El-Sayed M. El-Alfy, �MPLS network topology design using genetic algorithms,� in Proceedings of IEEE International Conference on Computer Systems and Applications (AICCSA'06), Dubai/Sharjah, UAE, pp. 1059 � 1065, March 8-11, 2006. <pdf file>

  • Hafiz M. Asif and El-Sayed M. El-Alfy, �Performance evaluation of queuing disciplines for multi-class traffic using OPNET simulator,� in Proceedings of the 7th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering, Sofia, Bulgaria, October 2005.

  • El-Sayed M. El-Alfy, Yu-Dong Yao, and Harry Heffes, �Autonomous call admission control with prioritized handoff in cellular networks�, in Proceedings of IEEE International Conference on Communications (ICC�01), Finland, June 2001.

  • El-Sayed M. El-Alfy, Yu-Dong Yao, and Harry Heffes, �A learning approach for call admission control with prioritized handoff in mobile multimedia networks,� in Proceedings of IEEE Vehicular Technology Conference (VTC�01-Spring), Greece, May 2001.

  • El-Sayed M. El-Alfy, Yu-Dong Yao, and Harry Heffes, �A model-based learning scheme for wireless channel allocation with prioritized handoff,� in Proceedings of IEEE Global Telecommunication Conference (Globecom�06), San Antonio, TX, November 2001.

  • El-Sayed M. El-Alfy, Yu-Dong Yao, and Harry Heffes, �Adaptive resource allocation with prioritized handoff in cellular mobile networks under QoS provisioning,� in Proceedings of IEEE Vehicular Technology Conference (VTC�01-Fall), Atlantic City, NJ, October 2001.

  • El-Sayed M. Abdel-Kareem (El-Alfy), Yehia M. Enab, and El-Sayed H. El-Konyalay, �Obstacle avoidance and motion control for mobile robots,� SPIE, Mobile Robots IX, vol. 2352, pp. 167-177, 1995.

  • El-Sayed M. Abdel-Kareem (El-Alfy), Yehia M. Enab, and El-Sayed H. El-Konyalay, �Obstacle avoidance navigator for mobile robots,� In Proceedings of the International Engineering Conference (IEC'95), Mansoura, Egypt, 1995. [held every two years, latest is IEC 2008]

Refereed Technical Reports

  • El-Sayed M. El-Alfy, TR1, 2010.

  • El-Sayed M. El-Alfy, TR2, 2010.

  • El-Sayed M. El-Alfy, Traffic Routing and Management in Communication Networks, Technical Report, KFUPM-CCSE-2008-001/ICS, December 2007.

  • El-Sayed M. El-Alfy, Computerized Adaptive Testing Methodologies, Technical Report, KFUPM-CCSE-2006-001/ICS, September 2006. (Also submitted to DSR-KFUPM)

  • El-Sayed M. El-Alfy, Applications of Genetic Algorithms to MPLS-Based Network Design, Technical Report, KFUPM-CCSE-2005-005/ICS, September 2005. (Also submitted to DAD-KFUPM)

  • El-Sayed M. El-Alfy et al., Real Time Data Acquisition System. Technical Report, FRCU, El-Mansoura, Egypt, 1992.

Theses

  • El-Sayed M. El-Alfy, Intelligent System for Channel Allocation with Prioritized Handoff in Mobile Cellular Multimedia Networks. PhD Dissertation, July 2001.

  • El-Sayed M. El-Alfy, Wheeled Mobile Obstacle Avoidance. M. Sc. Thesis, July 1994.

  • El-Sayed M. El-Alfy et al., Computer-Based Control System for Inspection of Raw Materials. B.Sc. Senior Project, 1991 (a basis for a paper published by the advisor in Port Said Magazine, Egypt, 1991).

Talks, Seminars & Keynote Speeches Given

  • A More Effective Steganographic Approach for Color Images by Combining Simple Methods, at the 7th International Computing Conference in Arabic, ICCA 2011, Riyadh, Saudi Arabia, May 31, 2011.
  • Recent Developments, Applications and Challenges of Computational Intelligence, Second KFUPM Annual Research Day,  May 10, 2011.
  • A Color Image Encryption Scheme Based on Chaotic Maps and Genetic Operators for Confusion and Diffusion, at the 7th International Conference on Network Services (ICNS 2011), IARIA, Venice/Mestre, Italy, May 22-27, 2011.
  • A Reinforcement Learning Approach for Sequential Mastery Testing, at the Symposium Series in Computational Intelligence (SSCI 2011), Adaptive Dynamic Programming and Reinforcement Learning, Paris, France, April 11-15, 2011.
  • Offline Recognition of Handwritten Numeral Characters with Polynomial Neural Networks Using Topological Features, at the 23rd Canadian Artificial Intelligence Conference (AI 2010), Ottawa, Canada, June 2, 2010.
  • Flow-Based Path Selection for Internet Traffic Engineering with NSGA-II," the 17th International Conference on Telecommunications (ICT2010), Doha, Qatar, April 6, 2010.
  • Web Applications Vulnerabilities: An Overview. CCSE-KFUPM, January 26, 2010.
  • Web Application Security Threats and Countermeasures: Recent Developments and Future, Keynote Speech, The Third International Conference on Information & Communication Technologies (ICICT�09), Karachi, Pakistan, Aug. 15-16, 2009.
  • Abductive learning approach for geometric shape recognition, ICIS�08, Bahrain, December 2, 2008.
  • Spam Filtering Using Abductive Networks, IJCNN�08, Hong Kong, China, June 6, 2008.
  • A Fuzzy Similarity Approach for Spam Filtering, AICCSA�08, Doha, Qatar, April 2, 2008.
  • E-mail Spam Filtering via a Fuzzy Similarity Approach, CITROD�08, RI-KFUPM, Dhahran, Saudi Arabia, March 30, 2008.
  • New Trend in Educational Assessment: Computerized Adaptive Testing, CCSE-KFUPM, November 7, 2006.
  • A Heuristic Approach for Firewall Policy Optimization, ICACT�07, Korea, February 11, 2007.
  • On Optimal Firewall Rule Ordering, AICCSA�06, UAE, March 10, 2006.
  • A Learning Approach for Call Admission Control with Prioritized Handoff in Mobile Multimedia Networks, IEEE VTC�01, USA, 2001.
  • A Model-Based Learning Scheme for Wireless Channel Allocation with Prioritized Handoff, Globecom�01, USA, 2001.
  • Obstacle Avoidance Navigator for Mobile Robots, El-Mansoura First Engineering Conference, Egypt, 1995.
  •  

Other non-Refereed Technical Reports

  • TBA
  •  

Copyright Notice: Since all articles in this page are published, the copyright has been transferred to the respective publishers. Therefore, the articles cannot be duplicated for commercial purposes. It is understood that all persons copying these articles will adhere to the terms and constraints invoked by each publisher's copyright. These articles may not be re-posted without the explicit permission of the copyright holder. The following are ACM's and IEEE's copyright notices; other publishers have similar ones.

ACM Copyright Notice: Copyright � 199x by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept, ACM Inc., fax +1 (212) 869-0481, or permissions@acm.org. For further information, see the ACM Copyright Policy.

IEEE Copyright Notice: Copyright � 199x by IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. For further information, see the IEEE Copyright Policies.



Copyright © 2018 Prof. El-Sayed El-Alfy, King Fahd University of Petroleum and Minerals