User profiles for Mohammed Marey
Mohammed MareyAin Shams University Verified email at cis.asu.edu.eg Cited by 838 |
A kalman-filter-based method for pose estimation in visual servoing
F Janabi-Sharifi, M Marey - IEEE transactions on Robotics, 2010 - ieeexplore.ieee.org
The problem of estimating position and orientation (pose) of an object in real time
constitutes an important issue for vision-based control of robots. Many vision-based pose-estimation …
constitutes an important issue for vision-based control of robots. Many vision-based pose-estimation …
YOLO based breast masses detection and classification in full-field digital mammograms
Background and Objective With the recent development in deep learning since 2012, the
use of Convolutional Neural Networks (CNNs) in bioinformatics, especially medical imaging, …
use of Convolutional Neural Networks (CNNs) in bioinformatics, especially medical imaging, …
Deep learning in breast cancer detection and classification
G Hamed, MAER Marey, SES Amin… - Proceedings of the …, 2020 - Springer
Breast cancer is considered one of the primary causes of mortality among women aged 20–59
worldwide. Early detection and treatment can allow patients to have proper treatment and …
worldwide. Early detection and treatment can allow patients to have proper treatment and …
Automated breast cancer detection and classification in full field digital mammograms using two full and cropped detection paths approach
Breast cancer is one of the most severe diseases that threaten women’s life results in increasing
the death rate annually as confirmed by the World Health Organization. Breast cancer …
the death rate annually as confirmed by the World Health Organization. Breast cancer …
Analysis of classical and new visual servoing control laws
M Marey, F Chaumette - 2008 IEEE International Conference …, 2008 - ieeexplore.ieee.org
In this paper, we analyze and compare five image-based visual servoing control laws. Three
of them are classical while two new ones are proposed. The first new control law is based …
of them are classical while two new ones are proposed. The first new control law is based …
Hybrid technique for steganography-based on DNA with n-bits binary coding rule
G Hamed, M Marey, SA El-Sayed… - 2015 7th International …, 2015 - ieeexplore.ieee.org
The information capacity is growing significantly as well as its level of importance and its
transformation rate. In this paper, a blind data hiding hybrid technique is introduced using the …
transformation rate. In this paper, a blind data hiding hybrid technique is introduced using the …
Comparative study for various DNA based steganography techniques with the essential conclusions about the future research
G Hamed, M Marey, SA El-Sayed… - 2016 11th international …, 2016 - ieeexplore.ieee.org
Information security and confidentiality has become of prime concern and importance as a
result of the notifiable and explosive growth of the internet. Also, with the growth of information …
result of the notifiable and explosive growth of the internet. Also, with the growth of information …
DNA based steganography: survey and analysis for parameters optimization
Nowadays, cryptography and steganography are considered the most famous and secured
techniques used in the security field. This chapter introduces a survey on the recent DNA …
techniques used in the security field. This chapter introduces a survey on the recent DNA …
Contributions to control modeling in visual servoing, task redundancy, and joint limits avoidance.
M Marey - 2010 - theses.hal.science
… As for my friends during this time, I would like to thank Mohammed Afify, Ola Marey and
all … in this chapter leads to the following publications [Marey 08b][Marey 08a][Marey 08c]. …
all … in this chapter leads to the following publications [Marey 08b][Marey 08a][Marey 08c]. …
A new large projection operator for the redundancy framework
M Marey, F Chaumette - 2010 IEEE international conference on …, 2010 - ieeexplore.ieee.org
In this paper, we propose a new projection operator for the redundancy framework based
on a task function defined as the norm of the usual error. This projection operator allows …
on a task function defined as the norm of the usual error. This projection operator allows …