User profiles for Mohammed Marey

Mohammed Marey

Ain Shams University
Verified email at cis.asu.edu.eg
Cited by 838

A kalman-filter-based method for pose estimation in visual servoing

F Janabi-Sharifi, M Marey - IEEE transactions on Robotics, 2010 - ieeexplore.ieee.org
The problem of estimating position and orientation (pose) of an object in real time
constitutes an important issue for vision-based control of robots. Many vision-based pose-estimation …

YOLO based breast masses detection and classification in full-field digital mammograms

GH Aly, M Marey, SA El-Sayed, MF Tolba - Computer methods and …, 2021 - Elsevier
Background and Objective With the recent development in deep learning since 2012, the
use of Convolutional Neural Networks (CNNs) in bioinformatics, especially medical imaging, …

Deep learning in breast cancer detection and classification

G Hamed, MAER Marey, SES Amin… - Proceedings of the …, 2020 - Springer
Breast cancer is considered one of the primary causes of mortality among women aged 20–59
worldwide. Early detection and treatment can allow patients to have proper treatment and …

Automated breast cancer detection and classification in full field digital mammograms using two full and cropped detection paths approach

G Hamed, M Marey, SE Amin, MF Tolba - IEEE Access, 2021 - ieeexplore.ieee.org
Breast cancer is one of the most severe diseases that threaten women’s life results in increasing
the death rate annually as confirmed by the World Health Organization. Breast cancer …

Analysis of classical and new visual servoing control laws

M Marey, F Chaumette - 2008 IEEE International Conference …, 2008 - ieeexplore.ieee.org
In this paper, we analyze and compare five image-based visual servoing control laws. Three
of them are classical while two new ones are proposed. The first new control law is based …

Hybrid technique for steganography-based on DNA with n-bits binary coding rule

G Hamed, M Marey, SA El-Sayed… - 2015 7th International …, 2015 - ieeexplore.ieee.org
The information capacity is growing significantly as well as its level of importance and its
transformation rate. In this paper, a blind data hiding hybrid technique is introduced using the …

Comparative study for various DNA based steganography techniques with the essential conclusions about the future research

G Hamed, M Marey, SA El-Sayed… - 2016 11th international …, 2016 - ieeexplore.ieee.org
Information security and confidentiality has become of prime concern and importance as a
result of the notifiable and explosive growth of the internet. Also, with the growth of information …

DNA based steganography: survey and analysis for parameters optimization

G Hamed, M Marey, S El-Sayed, F Tolba - Applications of Intelligent …, 2016 - Springer
Nowadays, cryptography and steganography are considered the most famous and secured
techniques used in the security field. This chapter introduces a survey on the recent DNA …

Contributions to control modeling in visual servoing, task redundancy, and joint limits avoidance.

M Marey - 2010 - theses.hal.science
… As for my friends during this time, I would like to thank Mohammed Afify, Ola Marey and
all … in this chapter leads to the following publications [Marey 08b][Marey 08a][Marey 08c]. …

A new large projection operator for the redundancy framework

M Marey, F Chaumette - 2010 IEEE international conference on …, 2010 - ieeexplore.ieee.org
In this paper, we propose a new projection operator for the redundancy framework based
on a task function defined as the norm of the usual error. This projection operator allows …