عودة

 

الدكتور / يسن محمود يس حسن
أستاذ مساعد بقسم الهندسة الكهربائية، كلية الهندسة، جامعة اسيوط
بيانات ال MIS دخول الإعضاء تواصل مع العضو نسخة للطباعة
تليفون المكتب 031054
الموبايل 01001891771
البريد الالكترونى ymyhasan@aun.edu.eg
google scholar link http://scholar.google.com/citations?user=6B1yuL8AAAAJ&hl=en
  • دكتوراه فى الهندسة الكهربائية، كلية الهندسة، الولايات المتحدة الأمريكية، 2000
  • ماجستير فى الهندسة الكهربائية، كلية الهندسة، جامعة أسيوط، 1993
  • بكالوريوس فى الهندسة الكهربائية، كلية الهندسة، جامعة أسيوط، 1989
الدرجات العلمية :
  • أستاذ مساعد بقسم الهندسة الكهربائية، كلية الهندسة، جامعة اسيوط، 2008
  • مدرس مساعد بقسم الهندسة الكهربائية، كلية الهندسة، جامعة اسيوط، 1993
  • معيد بقسم الهندسة الكهربائية، كلية الهندسة، جامعة اسيوط، 1989

المجالات البحثية:
Computer Science , Computer Security and Reliability , Computer Communications (Networks) , Algorithms , Information Science , Software Engineering

الابحاث :

1-Yassin M. Y. Hasan, International Conference on Computing & Information Technology , Almadina, KSA, pp. 772-777, 2012
2-Ammar M. Hassan, Yassin M. Y. Hasan, and Mohamed A. A. Wahab, Robust Visual Hashing for Image Authentication, Almadina, KSA, pp. 763-767, 2012
3-Ammar M. Hassan, Yassin M. Y. Hasan, and Mohamed A. A. Wahab, A New Vector Quantization Attack on Self-Recovery Image Authentication, Almadina, KSA, pp. 768-768, 2012
4-Raghied M. Atta and Yassin M. Y. Hasan, Accurate Counting Method for Pilgrim During Their Flow from Arafat to Muzdalifa and Mina,” الملتقى العلمي الحادي عشر لأبحاث الحج , 11th Scientific Meeting for Hajj researches, Makkah, KSA, 2012
5-Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa, Novel Remotely Keyed Encryption Schemes for Smart Card Applications,” In Proc. of the IEEE International Conference on Communications – ICC 2011: Communication and Information System Security Symposium , Kyoto, Japan, 2011
6-Ammar. M. Hassan, Ayoub Al-Hamadi, Yassin M. Y. Hasan, Mohamed A. A. Wahab, Axel Panning, Bernd Michaelis, Variable Block-Size Image Authentication with Localization and Self-Recovery," In Proc. of the IEEE International Conference on Image Processing, Hong Kong, pp. 3665-3668, 2010
7-M. Hassan, Ayoub Al-Hamadi, Yassin M. Y. Hasan, Mohamed A. A. Wahab, and Bernd Michaelis, , Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks," In Proc. of the 20th International Conference on Pattern Recognition , Istanbul, Turkey, pp. 1445 – 1448, 2010
8-Ammar M. Hassan, Ayoub Al-Hamadi, Yassin M. Y. Hasan, Mohamed A. A. Wahab, and Bernd Michaelis, Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks," In Proc. of the 20th International Conference on Pattern Recognition (ICPR), , Istanbul, Turkey, , pp. 1445 – 1448, 2010
9-Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa, A Secured Smart Card Using a Pseudorandom Affine Transformation Based Cipher and a Secured LIRKES, CSC International Journal of Computer Science and Security, vol.4, No.1, pp.9-22, 2010
10-Ammar M. Hassan, Ayoub Al-Hamadi, Bernd Michaelis, Yassin M. Y. Hasan, and Mohamed A. A. Wahab, Image Authentication Using Robust Image Hashing with Localization and Self-Recovery In Proc. of the 18th International Conference on Computer Graphics, Visualization and Computer Vision, Plzen [Pilsen], Czech Republic, 2010
11-Ammar M. Hassan, Ayoub Al-Hamadi, Bernd Michaelis, Yassin. M. Y. Hasan, and Mohamed A. A. Wahab, Semi-Fragile Image Authentication using Robust Image Hashing with Localization,” In Proc. of the 2nd International Conference on Machine Vision, Dubai, UAE, 2009
12-Ehab M. Mohamed, Yassin. M. Y. Hasan, and Hiroshi Furukawa, , A Novel Luby-Rackoff Based Cipher in a New Feistel Network Based LPRKES for Smart Cards” CSC International , Journal of Computer Science and Security, vol.3, No.5, pp.384-396, 2009
13-Yassin. M. Y. Hasan, Mohammed F. A. Ahmed, and Tarik K. Abdelhamid, Image Adaptive Selective Encryption of Vector Quantization Index Compression," In Proc. of the 16th IEEE International Conference on Image Processing, Cairo, Egypt, 2009
14- Ammar M. Hassan, Yassin. M. Y. Hasan, Ayoub Al-Hamadi, Mohamed A. A. Wahab, and Bernd Michaelis, A Novel Public Key Self-Embedding Fragile Watermarking Technique for Image Authentication," In Proc. of the 16th IEEE International Conference on Image Processing , Cairo, Egypt, 2009
15-M. M I Taha and Y. M. Y. Hasan, A Novel Headway-Based Vehicle-to-Vehicle Multi-Mode Broadcasting Protocol," in Proceedings of the 68th IEEE Semi-Annual Vehicular Technology Conference – 68th VTC (Symposium on Wireless Vehicular Communications – WiVec’08, Calgary, Alberta, Canada, 2009
16-Moumen El-Melegy, Y. M. Y. Hasan, and Hashim Mokhtar, MRI Brain Tissues Segmentation Using Non-Parametric Technique," in Proceedings of the International Conference on Computer Engineering & Systems - ICCES'08 , Cairo, Egypt, 2008
17-Y. M. Y. Hasan, , A. A. Elaksher, and S. Al Shariff, LIDAR Image Data Authentication Using Pseudorandom Polygons," in Proceedings of the IEEE International Geoscience & Remote Sensing Symposium – IGARSS’08, Boston, Massachusetts, U.S.A, 2008
18-Y. M. Y. Hasan, M. M. I. Taha, S. Alshariff, and A. Alakshar, Integrated Intra-Vehicle – VANET System for Increasing the Road Safety, presented in the Global Knowledge Forum NOOR, Almadina, KSA. , 2008
19-A. Elaksher, S. Al Shariff, and Y. M. Y. Hasan, Application of Laser and Optical Technologies in Preserving Islamic Sites," in Proceedings of Almadina Researches Meeting ملتقى أبحاث المدينة, Almadina, KSA, 2008
20-Y. M. Y. Hasan, From Stream to Provably Secure Block Ciphers Based on Pseudorandom Matrix Transformations, in Proceedings of the 3rd IEEE International Conference on Communication Systems Software and Middleware - COMSWARE'08, Bangalore, India, pp.260-265, 2008
21- Y. M. Y. Hasan and H. A. Abulenein, Key-Linked Block Ciphers with Input-Output Shuffling Applied to Remotely Keyed Encryption, in Proceedings of the 3rd IEEE International Conference on Communication Systems Software and Middleware - COMSWARE'08, Bangalore, India,, pp.254-259, 2008
22-5. Y. M. Hassan and H.A. Aboulenien, Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption., Proc. of 3rd International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE, pp 254-259, 2008
23- Y. M. Y. Hasan, Key-Joined Block Ciphers with Input-Output Pseudorandom Shuffling Applied to Remotely-Keyed Authenticated Encryption,in Proceedings of the 7th IEEE International Symposium on Signal Processing & Information Technology - ISSPIT'07, Cairo, Egypt, , pp.75-80, 2007
24-M. M. I. Taha and Y. M. Y. Hasan, VANET-DSRC Protocol for Reliable Broadcasting of Life Safety Messages, in Proceedings of the 7th IEEE International Symposium on Signal Processing & Information Technology - ISSPIT'07, Cairo, Egypt,, pp.105-110, 2007
25-Y. M. Y. Hasan and A. A. Hassan, Tamper Detection with Self-correction Hybrid Spatial-DCT Domains Image Authentication Technique, in Proceedings of the 7th IEEE International Symposium on Signal Processing & Information Technology - ISSPIT'07, Cairo, Egypt, , pp.375-380, 2007
26-Y. M. Y. Hasan, Pseudorandom Shuffling in Block Ciphers Combiners with Smart Card Applications, in Proc. of the 9th (20th Anniversary) IEEE International Symposium on Signal Processing & Their Applications in conjunction with the IEEE Int. Confernece on Information Scien, Sharjah, UAE, 2007
27-Y. M. Y. Hasan, YC: A Luby-Rackoff Ciphers Family Driven by Pseudorandom Vector/Matrix Transformations, in Proc. of the 9th (20th Anniversary) IEEE International Symposium on Signal Processing & Their Applications in conjunction with the IEEE Int. Confernece on Informati, Sharjah, UAE, 2007
28- Y. M. Y. Hasan, From Stream to Provably Secure Block Ciphers Based on Pseudorandom Matrix Transformations Egyptian Computer Science Journal, The Egyptian Computer Science Society, , Cairo, Egypt, vol.29, no.1, 2007
29-MMI Taha, YMY Hasan, VANET-DSRC protocol for reliable broadcasting of life safety messages, IEEE International Conference on Signal Processing and Information Technology, 2007 , 2007
30-Y. M. Y. Hasan and A. M. Hassan, Dual Domain Localized Auto-recovery Image Authentication, In Proc. of the Information Security Symposium-ISS'06, Almadina, KSA, , pp.138-148, 2006
31-Y. M. Y. Hasan and Ehab Mohamed, Two-Round Generalized Feistel Network Key-Linking Block Ciphers for Smart-Card ApplicationsIn Proc. of the Information Security Symposium-ISS'06, Almadina, KSA , pp.83-89 , 2006
32-M. F. Fahmy, Y. M. Y. Hasan, and G. M. Abdel-Raheem, Image Compression via Orthogonal Space Decomposition, In Proc. of the 23rd National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology, Menof, Egypt, 2006
33-Y. M. Y. Hasan and Ehab Mohamed, PATFC: a Novel Pseudorandom Affine Transformation-Based Feistel-Network Cipher, In Proc. of the 5th IEEE International Symposium on Signal Processing and Information Technology-ISSPIT’05, Athens, Greece, 2005
34-M. F. Fahmy and Y. M. Y. Hasan, A Novel Scheme for Compact Orthogonal Modified-Prony Representation of Signals,In Proc. of the 5th IEEE International Symposium on Signal Processing and Information Technology-ISSPIT'05, Athens, Greece , pp.690-693, 2005
35-M. Abdelsalam, Y. M. Y. Hasan, M. Said and S. Abdelsattar, Neural Network Recognition of Weak-Points in Power Systems based on Wavelet Features, In Proc. of the 18th CIRED International Conference & Exhibition on Electric Distribution, Organized by the Centre International de Recherche sur l'Environement et le D, Turin, Italy, 2005
36- M. F. Fahmy, Y. M. Y. Hasan and M. F. Mohamed, Orthogonal Signal Decomposition with Applicathions in Wavelet Denoising In Proc. of the 22nd National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), The Arab Academy of Science, Tech. & Maritime Transport (C, Cairo, Egypt, pp.C13:1-8, 2005
37-M. F. Mohamed. Fahmy, M. F., Y. M. Y. Hasan, Orthogonal signal decomposition with applications in wavelet denoising, Radio Science Conference NRSC 2005, IEEE, 2005
38- Y. M. Y. Hasan and A. M. Hassan, Fragile Blockwise Image Authentication Thwarting Vector Quantization Attack, In Proc. of the 4th IEEE International Symposium on Signal Proc. & Information Technology-ISSPIT’, Rome, Italy, pp.530-533, 2004
39-A. M. Hassan and Y. M. Y. Hasan, Secure variable block-size image authentication with improved attack localization, In Proc. of the 2nd International Conf. on Information & Communication Technology-ICICT'04, Cairo, Egypt, pp.145-156, 2004
40- M. Abdelsalam, Y. M. Y. Hasan, M. Said and S. Abdelsattar, Partial Discharge Classification Through Wavlet Packets of Their Modulated Ultrasonic Emissions, Proc. of the 5th International Conference on Intelligent Data Engineering & Automated Learning IDEAL, (Springer LNCS), Exeter, UK , pp.540-545, 2004
41-M. F. Fahmy, Osama M. H. Amin, Y. M. Y. Hasan and G. M. Abdel-Raheem, Blind Source Separation Using Time-Frequency Concepts, In Proc. of the 4th IEEE International Symposium on Signal Proc. & Information Technology-ISSPIT’0, Rome, Italy, pp.250-253, 2004
42- M. F. Fahmy, Osama M. H. Amin, Y. M. Y. Hasan and G. M. Abdel-Raheem, Blind Source Separation Using Time-Frequency Distribution In Proc. of the 21st National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), The National Telecommunication Institute, 18-20 March, Cairo, Egypt, 2004
43-M. F. Fahmy, Osama M. H. Amin, Y. M. Y. Hasan and G. M. Abdel-Raheem, A Fast Wavelet Packet-Based Blind Signal Separation, In Proc. of the 21st National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), The National Telecommunication Institute, 18-20 March, Cairo, Egypt, 2004
44-M. F. Fahmy and Y. M. Y. Hasan, Signal Denoising Using Hankel Matrix Rank Reduction, In Proc. of the 21st National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), The National Telecommunication Institute, 18-20 March, Cairo, Egypt, 2004
45-Y. M. Y. Hasan and M. F. Fahmy, Design of Biorthogonal Wavelets with Minimum Entropy In Proc. of the 3rd IEEE International Symposium on Signal Processing & Information Technology-ISSPIT, Dec., Darmstadt, Germany, 2003
46-R. R. Gharieb and Y. M. Y. Hasan, On-Line Classification and Segmentation of The Electro-Encephalogram Signal Using an Adaptive Lattice Predictor, In Proc. of the 3rd IEEE International Symposium on Signal Processing & Information Technology-ISSPIT’, Dec., Darmstadt, Germany, 2003
47- Y. M. Y. Hasan, G. M. Abdel-Raheem and M. F. Fahmy, On the design of cosine-modulated filter banks In Proc. of the 20th National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), The Nuclear research Center (Egyptian Atomic Energy Authority, Cairo, Egypt, 2003
48-M. F. Fahmy, G. M. Abdel-Raheem, Y. M. Y. Hasan and A. A. Somia, On the optimal choice of wavelet bases and signal compression using the wavelet lifting scheme, In Proc. of the 19th National Radio Science Conference (NRSC/URSI – The Academy of Scientific Research and Technology), Alexandria University, Alexandria, Egypt, 2002
49-Y. M. Y. Hasan, L. J. Karam, M. Falkinburg, A. Helwig and M. Ronning, Canonic Signed Digit Chebyshev FIR Filter Design, IEEE Signal Processing Letters, Cairo, Egypt, vol.8, no.6 , pp.167-169, 2001
50-Y. M. Y. Hasan and L. J. Karam IEEE Transactions on Image Processing, Morphological Text Extraction from Images, Assiut , Egypt, vol.9, no.11, pp.1978-1982, 2000
51-Y. M. Y. Hasan and L. J. Karam, Morphological Reversible Contour Representation, " IEEE Transactions on Pattern Analysis and Machine Intelligence, , Assiut , Egypt, vol.22, no.3, pp.3-16, 2000
52-Y. M. Y. Hasan, L. J. Karam, M. Falkinburg, A. Helwig and M.Ronning, Canonic Signed Digit FIR Filter Design, The 34th ASILOMAR International Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, pp. 1653-1656, 2000
53-M. F. Fahmy, Y. M. Yassin, G. Abdel - Raheam and N. A. El - Gayed , Design of Linear Phase IIR Filter from FIR Specifications, IEEE Trans., on Signal Processing, February, 1994
54-M. F. Fahmy, Y. M. Yassin, G. A. Raheem and Tarek I. Haweel, Design of fixed point state space digital filters with low round off noise, International Journal of Circuit Theory and Applications, vol. 22, 3-13, January, 1994
55-M. F. Fahmy, Y. M. Yassin, G. Abdel- Raheem and N. El-Gayed, "Design of Linear-Phase IIR Filters From FIR Specifications," IEEE Transactions on Signal Processing, Assiut , Egypt., vol.42, pp.437-440, 1994
56-M. F. Fahmy, Y. M. Yassin, G. Abdel-Raheem and T I Haweel, Design of Fixed-Point State Space Digital Filters With Low Round-off Noise, International Journal of Circuits Theory and Applications, vol.22, , pp.3-13, 1994
الاشراف على رسائل الماجستير و الدكتوراه :
1- هيشام مختار محمد, دمج المعلومات المسبقة في تقسيم انسجة المخ البشري واكتشاف الاورام في اشعة الرنين المغناطيسي, دكتوراة, 26-06-2010
المشرفون : عوض ابراهيم صالح، مؤمن الملاجى، يسن محمود يس
2- مصطفى طه, بروتوكولات اذاعة الرسائل في شبكات (اد-هوك) الخاصة بالمركبات, ماجستير, 20-01-2009
المشرفون : عبدالكريم الوردانى، طارق كمال عبدالحميد، يسن محمود يس
3- مصطفى محمد إبراهيم طه, بروتوكولات إذاعة الرسائل فى شبكات (اد-هوك) الخاصة بالمركبات, ماجستير, 23-09-2008
المشرفون : عبد الكريم أحمد الوردانى , طـارق كمال عبد الحميـد , يـس محمـــود يـس
4- محمد فراج محمد فراج, التحليل المتعامد للإشارات, ماجستير, 27-02-2008
المشرفون : ممدوح إبراهيم فؤاد فهمي, جمـال محمد عبد الرحيـم , يــس محمـــود يــس
5- عمار مصطفى حسن, طرق لإخفاء المعلومات فى الصور, ماجستير, 27-02-2005
المشرفون : عبد الكريم أحمد السيد الوردانى , يس محمود يس حسن
6- محمد سيد عبد المنعم حامد , تعرف شبكات الأعصاب على نقاط الضعف في نظم القوى باستخدام الدوال الموجية, ماجستير, 18-01-2005
المشرفون : مازن شفيق عبد السلام , صلاح عبد الستار , يس محمود يس
7- أسامة محمد حسين أمين , فصل الإشارات المبهمة بإستخدام التمثيل الزمني الترددي المتزامن, ماجستير, 26-06-2004
المشرفون : ممدوح إبراهيم فؤاد فهمي , جمال محمد عبد الرحيم , يس محمود يس حسـن
عدد المقرارات0 مقرر