Skip to main content
رقم الفاكس
N/A
البريد الالكتروني MIS
yassn.hassan@eng.au.edu.eg
رقم الموبايل
01001891771
رقم المكتب
N/A - 031054
رابط الباحث العلمي لجوجل


دكتوراه ﻒﻳ الهندسة الكهربائية () , كلية الهندسة الولايات المتحدة الأمريكية , 2000

ماجستير ﻒﻳ الهندسة الكهربائية () , كلية الهندسة جامعة أسيوط , 1993

بكالوريوس ﻒﻳ الهندسة الكهربائية () , كلية الهندسة جامعة أسيوط , 1989

أستاذ مساعد كلية الهندسة , جامعة اسيوط , 2008
مدرس مساعد كلية الهندسة , جامعة اسيوط , 1993
معيد كلية الهندسة , جامعة اسيوط , 1989

# عنوان البحث Research Year
1 International Conference on Computing & Information Technology 2012
2 Robust Visual Hashing for Image Authentication 2012
3 A New Vector Quantization Attack on Self-Recovery Image Authentication 2012
4 Accurate Counting Method for Pilgrim During Their Flow from Arafat to Muzdalifa and Mina,” الملتقى العلمي الحادي عشر لأبحاث الحج , 11th Scientific Meeting for Hajj researches 2012
5 Novel Remotely Keyed Encryption Schemes for Smart Card Applications,” In Proc. of the IEEE International Conference on Communications – ICC 2011: Communication and Information System Security Symposium 2011
6 A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES 2010
7 Image Authentication Using Robust Image Hashing with Localization and Self-Recovery In Proc. of the 18th International Conference on Computer Graphics, Visualization and Computer Vision 2010
8 Variable Block-Size Image Authentication with Localization and Self-Recovery," In Proc. of the IEEE International Conference on Image Processing 2010
9 Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks," In Proc. of the 20th International Conference on Pattern Recognition 2010
10 Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks," In Proc. of the 20th International Conference on Pattern Recognition (ICPR), 2010
11 Semi-Fragile Image Authentication using Robust Image Hashing with Localization,” In Proc. of the 2nd International Conference on Machine Vision 2009
12 A Novel Luby-Rackoff Based Cipher in a New Feistel Network Based LPRKES for Smart Cards” CSC International 2009
13 Image Adaptive Selective Encryption of Vector Quantization Index Compression," In Proc. of the 16th IEEE International Conference on Image Processing 2009
14 A Novel Public Key Self-Embedding Fragile Watermarking Technique for Image Authentication," In Proc. of the 16th IEEE International Conference on Image Processing 2009
15 A Novel Headway-Based Vehicle-to-Vehicle Multi-Mode Broadcasting Protocol," in Proceedings of the 68th IEEE Semi-Annual Vehicular Technology Conference – 68th VTC (Symposium on Wireless Vehicular Communications – WiVec’08 2009
16 Application of Laser and Optical Technologies in Preserving Islamic Sites," in Proceedings of Almadina Researches Meeting ملتقى أبحاث المدينة 2008
17 Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. 2008
18 From Stream to Provably Secure Block Ciphers Based on Pseudorandom Matrix Transformations, in Proceedings of the 3rd IEEE International Conference on Communication Systems Software and Middleware - COMSWARE'08 2008
19 Key-Linked Block Ciphers with Input-Output Shuffling Applied to Remotely Keyed Encryption, in Proceedings of the 3rd IEEE International Conference on Communication Systems Software and Middleware - COMSWARE'08 2008
20 MRI Brain Tissues Segmentation Using Non-Parametric Technique," in Proceedings of the International Conference on
Computer Engineering & Systems - ICCES'08
2008
21 LIDAR Image Data Authentication Using Pseudorandom Polygons," in Proceedings of the IEEE International Geoscience & Remote Sensing Symposium – IGARSS’08 2008
22 Integrated Intra-Vehicle – VANET System for Increasing the Road Safety, presented in the Global Knowledge Forum NOOR 2008
23 Key-Joined Block Ciphers with Input-Output Pseudorandom Shuffling Applied to Remotely-Keyed Authenticated Encryption,in Proceedings of the 7th IEEE International Symposium on Signal Processing & Information Technology - ISSPIT'07 2007
24 VANET-DSRC Protocol for Reliable Broadcasting of Life Safety Messages, in Proceedings of the 7th IEEE International Symposium on Signal Processing & Information Technology - ISSPIT'07 2007
25 Tamper Detection with Self-correction Hybrid Spatial-DCT Domains Image Authentication Technique, in Proceedings of the 7th IEEE International Symposium on Signal Processing & Information Technology - ISSPIT'07 2007
26 Pseudorandom Shuffling in Block Ciphers Combiners with Smart Card Applications, in Proc. of the 9th (20th Anniversary) IEEE International Symposium on Signal Processing & Their Applications in conjunction with the IEEE Int. Confernece on Information Scien 2007
27 YC: A Luby-Rackoff Ciphers Family Driven by Pseudorandom Vector/Matrix Transformations, in Proc. of the 9th (20th Anniversary) IEEE International Symposium on Signal Processing & Their Applications in conjunction with the IEEE Int. Confernece on Informati 2007
28 From Stream to Provably Secure Block Ciphers Based on Pseudorandom Matrix Transformations Egyptian Computer Science Journal, The Egyptian Computer Science Society 2007
29 VANET-DSRC protocol for reliable broadcasting of life safety messages 2007
30 Image Compression via Orthogonal Space Decomposition, In Proc. of the 23rd National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology 2006
31 Dual Domain Localized Auto-recovery Image Authentication, In Proc. of the Information Security Symposium-ISS'06 2006
32 Two-Round Generalized Feistel Network Key-Linking Block Ciphers for Smart-Card ApplicationsIn Proc. of the Information Security Symposium-ISS'06 2006
33 PATFC: a Novel Pseudorandom Affine Transformation-Based Feistel-Network Cipher, In Proc. of the 5th IEEE International Symposium on Signal Processing and Information Technology-ISSPIT’05 2005
34 A Novel Scheme for Compact Orthogonal Modified-Prony Representation of Signals,In Proc. of the 5th IEEE International Symposium on Signal Processing and Information Technology-ISSPIT'05 2005
35 Neural Network Recognition of Weak-Points in Power Systems based on Wavelet Features, In Proc. of the 18th CIRED International Conference & Exhibition on Electric Distribution, Organized by the Centre International de Recherche sur l'Environement et le D 2005
36 Orthogonal Signal Decomposition with Applicathions in Wavelet Denoising In Proc. of the 22nd National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), The Arab Academy of Science, Tech. & Maritime Transport (C 2005
37 Orthogonal signal decomposition with applications in wavelet denoising 2005
38 Signal Denoising Using Hankel Matrix Rank Reduction, In Proc. of the 21st National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), The National Telecommunication Institute, 18-20 March 2004
39 Fragile Blockwise Image Authentication Thwarting Vector Quantization Attack, In Proc. of the 4th IEEE International Symposium on Signal Proc. & Information Technology-ISSPIT’ 2004
40 Secure variable block-size image authentication with improved attack localization, In Proc. of the 2nd International Conf. on Information & Communication Technology-ICICT'04 2004
41 Partial Discharge Classification Through Wavlet Packets of Their Modulated Ultrasonic Emissions, Proc. of the 5th International Conference on Intelligent Data Engineering & Automated Learning IDEAL 2004
42 Blind Source Separation Using Time-Frequency Concepts, In Proc. of the 4th IEEE International Symposium on Signal Proc. & Information Technology-ISSPIT’0 2004
43 Blind Source Separation Using Time-Frequency Distribution In Proc. of the 21st National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), The National Telecommunication Institute, 18-20 March 2004
44 A Fast Wavelet Packet-Based Blind Signal Separation, In Proc. of the 21st National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), The National Telecommunication Institute, 18-20 March 2004
45 Design of Biorthogonal Wavelets with Minimum Entropy In Proc. of the 3rd IEEE International Symposium on Signal Processing & Information Technology-ISSPIT 2003
46 On-Line Classification and Segmentation of The Electro-Encephalogram Signal Using an Adaptive Lattice Predictor, In Proc. of the 3rd IEEE International Symposium on Signal Processing & Information Technology-ISSPIT’ 2003
47 On the design of cosine-modulated filter banks In Proc. of the 20th National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), The Nuclear research Center (Egyptian Atomic Energy Authority 2003
48 On the optimal choice of wavelet bases and signal compression using the wavelet lifting scheme, In Proc. of the 19th National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), Alexandria University 2002
49 Canonic Signed Digit Chebyshev FIR Filter Design, IEEE Signal Processing Letters 2001
50 Morphological Text Extraction from Images 2000
51 Morphological Reversible Contour Representation, " IEEE Transactions on Pattern Analysis and Machine Intelligence 2000
52 Canonic Signed Digit FIR Filter Design, The 34th ASILOMAR International Conference on Signals, Systems and Computers 2000
53 Design of Fixed-Point State Space Digital Filters With Low Round-off Noise 1994
54 Design of fixed point state space digital filters with low round off noise 1994
55 Design of Linear Phase IIR Filter from FIR Specifications 1994
56 "Design of Linear-Phase IIR Filters From FIR Specifications," IEEE Transactions on Signal Processing 1994

1 - مصطفى طه , بروتوكولات اذاعة الرسائل في شبكات (اد-هوك) الخاصة بالمركبات ,2009-01-20
المشرفون: عبدالكريم الوردانى، طارق كمال عبدالحميد، يسن محمود يس

2 - هيشام مختار محمد , دمج المعلومات المسبقة في تقسيم انسجة المخ البشري واكتشاف الاورام في اشعة الرنين المغناطيسي ,2010-06-26
المشرفون: عوض ابراهيم صالح، مؤمن الملاجى، يسن محمود يس

3 - أسامة محمد حسين أمين , فصل الإشارات المبهمة بإستخدام التمثيل الزمني الترددي المتزامن ,2004-06-26
المشرفون: ممدوح إبراهيم فؤاد فهمي , جمال محمد عبد الرحيم , يس محمود يس حسـن

4 - مصطفى محمد إبراهيم طه , بروتوكولات إذاعة الرسائل فى شبكات (اد-هوك) الخاصة بالمركبات ,2008-09-23
المشرفون: عبد الكريم أحمد الوردانى , طـارق كمال عبد الحميـد , يـس محمـــود يـس

5 - محمد فراج محمد فراج , التحليل المتعامد للإشارات ,2008-02-27
المشرفون: ممدوح إبراهيم فؤاد فهمي, جمـال محمد عبد الرحيـم , يــس محمـــود يــس

6 - عمار مصطفى حسن , طرق لإخفاء المعلومات فى الصور ,2005-02-27
المشرفون: عبد الكريم أحمد السيد الوردانى , يس محمود يس حسن

7 - محمد سيد عبد المنعم حامد , تعرف شبكات الأعصاب على نقاط الضعف في نظم القوى باستخدام الدوال الموجية ,2005-01-18
المشرفون: مازن شفيق عبد السلام , صلاح عبد الستار , يس محمود يس
 

الجمعيات العلمية و النقابات :

المشاريع البحثية