
Abd El-Aziz Ahmed- Ph.D
- Professor (Associate) at Cairo University
Abd El-Aziz Ahmed
- Ph.D
- Professor (Associate) at Cairo University
About
109
Publications
107,350
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
745
Citations
Introduction
I have completed my Ph.D. degree in June 2014 in Information Science & Technology from Anna University, Chennai-25, India. I have received my B.Sc., and Master of Computer Science in 1999 and 2006 respectively from Faculty of Science, Cairo University. Now, I am an Asso. Prof in the FGSSR, Cairo University, Egypt. I have 22 years’ experience in Teaching at Cairo University, Egypt. My research interests are database system, database security, Cloud computing, Big data, ML, DL and XML security.
Current institution
Additional affiliations
November 2014 - present
September 2000 - March 2006
January 2011 - July 2014
Education
July 2011 - June 2014
January 2011 - June 2011
September 2005 - June 2006
ISSR, Cairo University
Field of study
- Computer Science
Publications
Publications (109)
Alzheimer’s disease (AD) is a neurodegenerative disorder characterized by the accumulation of amyloid plaques and neurofibrillary tangles in the brain, leading to distinctive patterns of neuronal dysfunction and the cognitive decline emblematic of dementia. Currently, over 5 million individuals aged 65 and above are living with AD in the United Sta...
Therapists play a crucial role in a patient’s timely and accurate diagnosis of blood vessels within the skull or brain tissue rupture, which is essential for achieving the best outcomes. This paper discusses the efficacy of computed tomography imaging in the recognition and classification of different intracranial brain hemorrhage subtypes. We pres...
This research addresses the challenges of early detection of Acute Lymphoblastic Leukemia (ALL), a life-threatening blood cancer particularly prevalent in children. Manual diagnosis of ALL is often error-prone, time-consuming, and reliant on expert interpretation, leading to delays in treatment. This study proposes an automated binary classificatio...
This study presents KidneyNet, an innovative computer-aided diagnosis (CAD) system designed to identify chronic kidney diseases (CKDs), such as kidney stones, cysts, and tumors, in CT scans. KidneyNet utilizes a convolutional neural network (CNN) structure consisting of eight convolutional layers, three pooling layers, a flattening layer, and two f...
Background: Tuberculosis (TB) is a bacterial disease that mainly affects the lungs, but it can also impact other parts of the body, such as the brain, bones, and kidneys. The disease is caused by a bacterium called Mycobacterium tuberculosis and spreads through the air when an infected person coughs or sneezes. TB can be inactive or active; in its...
Peptic ulcers and stomach cancer are common conditions that impact the gastrointestinal (GI) system. Wireless capsule endoscopy (WCE) has emerged as a widely used, noninvasive technique for diagnosing these issues, providing valuable insights through the detailed imaging of the GI tract. Therefore, an early and accurate diagnosis of GI diseases is...
Background: In recent years, the healthcare field has experienced significant advancements. New diagnostic techniques, treatments, and insights into the causes of various diseases have emerged. Despite these progressions, cancer remains a major concern. It is a widespread illness affecting individuals of all ages and leads to one out of every six d...
The anterior cruciate ligament (ACL) is a major ligament in the knee that helps to stabilize the joint and prevent excessive forward movement of the shinbone. An ACL tear is a common injury, especially among athletes who participate in sports that involve pivoting and sudden changes in direction. This paper proposes an ensemble model, which include...
The elevated death rate associated with colorectal cancer (CRC) continues to impact human life worldwide. It helps prevent disease and extend human life by being detected early. CRC is frequently diagnosed and detected through histopathological examination. The decision is based on clinicians' subjective perceptions and daily image analyses. Histol...
Phishing attacks pose a significant threat in the cyber landscape, compromising the security of millions by exploiting trust in seemingly legitimate websites. These attacks deceive users into divulging sensitive information, posing substantial challenges to both individual and organizational security. The sophistication of phishing tactics, such as...
The emergence of IIoT in vital industrial systems has heightened the demand for strong security frameworks as cyber threats become more sophisticated. However, the traditional security measures are usually inadequate, especially in real-time operational scenarios, making the industrial systems susceptible to disruptive attacks. This is the problem...
With the increasing prevalence of Software-Defined Networking (SDN) and the growing demand for network resources, the threat of traffic diversion attacks in SDN environments poses a significant risk to network security and performance. Conventional methods for detecting these attacks often fall short of identifying sophisticated and dynamic diversi...
The increasing reliance on digital platforms in Saudi Arabia's Information and Communication Technology (ICT) sector raises concerns about data privacy breaches. This study addresses the urgent need for robust security solutions within this context. This study investigates the application of blockchain technology and cryptographic techniques for en...
Access control is a pivotal aspect of modern computing systems, ensuring that only authorized entities can interact with sensitive data and resources. Traditional access control methods, while effective, face challenges in terms of security, transparency, and scalability. Blockchain technology has emerged as a promising solution to enhance access c...
The Internet of Things (IoT) has gained significance over the past several years and is currently one of the most important technologies. The capacity to link everyday objects, such as home appliances, medical equipment, autos, and baby monitors, to the internet via embedded devices with a minimum of human interaction has made continuous communicat...
The surface electromyography (sEMG) signal is a complex interference pattern resulting from the electrical activity of contracting muscles, which directly correlates with muscle activity and exercise level. Patellofemoral osteoarthritis (PF OA) refers to the softening and destruction of the articular cartilage of the knee cap, which is important to...
Predicting defect-prone software components can play a significant role in allocating relevant testing resources to fault-prone modules and hence increasing the business value of software projects. Most of the current software defect prediction studies utilize traditional supervised machine learning algorithms to predict defects in software applica...
We know today that numerous factors play a significant role as causes of cancer. Because of this, a doctor’s
opinion alone cannot be used to classify cancer. Intelligent algorithms providing medical assistance
are therefore necessary. In addition, many researchers have adopted them for estimating the likelihood of
patient survival, and others have...
A cerebral stroke is a medical problem that occurs when the blood flowing to a section of the brain is suddenly cut off, causing damage to the brain. Brain cells gradually die because of interruptions in blood supply and other nutrients to the brain, resulting in disabilities, depending on the affected region. Early recognition and detection of sym...
Knee osteoarthritis (KOA) sufferers have one of the highest disability-adjusted life years. The entire knee joint is affected by KOA. KOA is a condition that makes it hard for the knee to move normally. In KOA, the damage to the joints is irreversible, and the only treatment is a total knee replacement (TKR), which is expensive and only lasts a sho...
Coronary artery disease (CAD) is one of themost authentic cardiovascular
afflictions because it is an uncommonly overwhelming heart issue.
The breakdown of coronary cardiovascular disease is one of the principal
sources of death all over theworld.Cardiovascular deterioration is a challenge,
especially in youthful and rural countries where there is...
Due to the necessity of effective water management, the issue of water scarcity has developed into a significant global issue. One way to collect water is through the water management method. The most common source of fresh water anywhere in the world is groundwater, which has developed into a significant global issue. Our previous research used ma...
The immune system’s overproduction of white blood cells (WBCs) results in the most common blood cancer, leukemia. It accounts for about 25% of childhood cancers and is one of the primary causes of death worldwide. The most well-known type of leukemia found in the human bone marrow is acute lymphoblastic leukemia (ALL). It is a disease that affects...
The effective exploitation of smart technology in applications helps farmers make better decisions without increasing costs. Agricultural Research Centers (ARCs) are continually updating and producing new datasets from applied research, so the smart model should dynamically address all surrounding agricultural variables and improve its expertise fr...
In recent decades, Intelligent home systems are popular because they improve comfort and quality of life. A growing number of homes are becoming "smarter" by incorporating Internet of Things (IoT) technology to improve comfort, energy efficiency, and safety. Increases in resource-constrained IoT devices heighten security threats and vulnerabilities...
Designing computer-aided diagnosis (CAD) systems that can automatically detect ocular
diseases (ODs) has become an active research field in the health domain. Although the human eye
might have more than one OD simultaneously, most existing systems are designed to detect specific
eye diseases. Therefore, it is crucial to develop new CAD systems that...
Novel Coronavirus (COVID-19) is viewed as one of the main general wellbeing theaters on the worldwide level all over the planet. Because of the abrupt idea of the flare-up and the irresistible force of the infection, it causes individuals tension, melancholy, and other pressure responses. The avoidance and control of the novel Covid pneumonia have...
The alignment operation between many protein sequences or DNA sequences related to the scientific bioinformatics application is very complex. There is a trade-off in the objectives in the existing techniques of Multiple Sequence Alignment (MSA). The techniques that concern with speed ignore accuracy, whereas techniques that concern with accuracy ig...
Internet of Things is a promising technology but it also increases numerous security threats in data transmission. To secure neighboring sensing devices' communication in an IoT environment, a key agreement protocol is primordial. Various IoT data transmission mechanisms have been proposed in the literature to attain security. However, these propos...
Objectives: To explore the area of groundwater that can assist to improve the accessibility of freshwater. Methods : We propose a machine-deep learning model based on a recommender system to manage and classify groundwater. Finding: The main goal of our proposed approach is to classify groundwater into multi-labels, which are drinking water (Excell...
Corona Virus is a big threat to humanity. Now, the whole world is struggling to reduce the spread of Corona virus. Wearing masks is one of the practices that help to control the spread of the virus according to the world health organization. However, ensuring all people wear facemask is not an easy task. In this paper, we propose a simple and effec...
Cloud computing has been adopted very rapidly by organizations with different businesses and sizes, the use of cloud services is rising at an unparalleled rate these days especially IaaS services as cloud providers offer more powerful resources with flexible offerings and models. This rapid adoption opens new surface attacks to the organizations th...
Cloud computing is the provision of IT services over the Internet with the aim of offering faster innovation, flexible resources, and economies of scale. Cloud computing security is in a continuous evolving, it is the one of the main research issues in Cloud. This paper proposes a multilevel encryption technique to secure the transaction of data in...
In new computing architectures, more and more data is outsourced to remote storage providers. When data outsourced, sensitive information becomes vulnerable to theft. Data owners want to make sure their data is safe from breaches by third parties, insider threats, and untrusted service providers. When queries are run over encrypted data, a certain...
Cloud computing is a cutting-edge innovation for improving and developing plans of action in associations. It tends to be utilized for giving programming and framework administrations sent in data focuses. Encryption of data by its owner and saving them on the cloud causes many efficiency and secrecy issues. In Cloud computing, a client who has app...
Cloud service providers providing users with efficient and effective storage and transmission of data. To reduce storage costs and save bandwidth, cloud service providers are attracted to use data de-duplication feature. Cloud users are interested in using the cloud safely and privately to protect the data they share on the cloud. Therefore, they e...
The Accreditation Board for Engineering and Technology (ABET) Criteria for Computing Accreditation Commission Programs are based upon knowledge, presentation skills, communication skills, teamwork, and leadership skills that the students gain through the curriculum in a program. The student outcomes (SOs) are the procured skills and knowledge which...
HELP International is a charitable nongovernmental organization (NGO) that is committed to
fighting poverty and providing the people of backward countries with basic amenities and relief during
the time of disasters and natural calamities. HELP International has been able to raise around $ 10
million. Therefore, the head of the NGO needs to decide...
The Internet of Things (IOT) is a revolution in the technology world, and this field is continuously evolving. It has made life easier for people by providing consumers with more efficient and effective resources in faster and more convenient ways. The Internet of Things is one of the most exciting fields for the future by 2030. 90% of the planet w...
Internet of things (IOT) is a rapidly growing technology which aims connect all devices to the existing Internet infrastructure, and the vast flow data from these devices are identified as "Big data,", The accuracy of data processing and storage remains a wide area of research due to the diversity and the wide flow of data, so this survey will supp...
Social Network Analysis measures the interconnection between humans, entities or communities and the streaming of messages between them. This kind of Analysis studies the relationship between different people in a very deep way; it shows how one node (subscriber) in the network can affect the others. This research studies the connections between th...
Social Network Analysis measures the interconnection between humans, entities or communities and the streaming of messages between them. This kind of Analysis studies the relationship between different people in a very deep way; it shows how one node (subscriber) in the network can affect the others. This research studies the connections between th...
Tremendous measure of data's are accumulated and seen through World Wide Web by various clients. The client rehearses their perspectives by entering hypertext certifications by web with an enormous storehouse of site pages and web utilization digging process is fundamental for effective site the board, personalization, business and bolster administ...
Novel Coronavirus (COVID-19) is considered one of the most significant public health theaters on the global level around the world. Due to the sudden nature of the outbreak and the infectious power of the virus, it causes people anxiety, depression, and other stress reactions. The prevention and control of the novel coronavirus pneumonia have moved...
Cloud Computing is a new service that has a fast growth in IT. It can be utilized for providing software and infrastructure services deployed in data centers. Although there are several benefits of cloud computing, such as the ability to store huge amount of data and to perform a large amount of computations, there are some issues, such as data sec...
A cloud is a definite IT environment that is designed for the aim of remotely provisioning scalableand measured IT resources. Big data is a manner of describing data issues that are unsolvable using traditional tools. Volumes of big data are starting from dozens of terabytes and petabytes. As a result,it is impossible to store them in local storage...
Service availability is one of the most important aspects of cloud environments. The threat to availability of Distributed Denial of Service (DDoS) attacks plays an important role when designing the security architecture. A successful DDoS attack might result in service degradation or complete outage. The methods and techniques used against DDoS at...
Social Network Analysis determines the relationships between people, organizations, groups or entities and the flow of information between them. A literature review is done for social network analysis and the prediction of links that could be done in future between the different entities within the network, many use cases are shown here for applyin...
Topics selection for an educational material can take a lot of manual work. The manual operations can be exhaustive, especially in case of large volume of materials. In order to solve this problem, we propose an automated topic selection approach, which is able to select topics automatically for any educational material with a consideration of achi...
The traditional way to extract topics from any educational material takes a lot of effort and time, especially when a huge amount of material was prepared. The proposed solution to extract topics from any educational material is based on n-gram and term co-occurrences, which calculates the keywords of the course specifications that appears in educa...
Big data refers to a data sets that a large of traditional computer memory, processor and software, that’s mean when
the volume, variety and velocity of the data are increased, the current techniques and technologies may not be able to handle
storage and processing of data, Also a Big Data described as more functionally, as large pools of unstructu...
With the fast growth of mobile technology, mobile devices have become an essential part of human life. But yet its hardware
has faced lots of challenges due to the limitation of their resources, such as processing power, battery life, and storage. Mobile
Cloud Computing (MCC) and virtualization have been introduced to integrate the cloud computing...
Swarm intelligence is an artificial intelligence discipline, which concerned with the design of intelligent multi-agent systems by taking inspiration from the collective behaviors of social insects and other animal societies. Swarm intelligence optimization technique was introduced at 1989 by G. Beni and J. Wang in the global optimization framework...
The number of users on Twitter has increased in the Middle East since the Arab Spring in 2011.
Because Egypt has become a changing country in the last few years, it faced a number of different events;
that made Twitter the most appropriate virtual environment to monitor and track those events. In this paper,
we study the life cycle for each event t...
To enhance the quality of higher education institutions (HEIs), key performance indicators (KPIs) must be explored and measured. KPIs deems as a measurable value which explains the effectiveness of an institution and how it is achieving key objectives. Institutions use KPIs for ensuring that they are going on the right way or not. Many of the indic...
To enhance the quality of higher education institutions (HEIs), key performance indicators (KPIs) must be explored and measured. KPIs deems as a measurable value which explains the effectiveness of an institution and how it is achieving key objectives. Institutions use KPIs for ensuring that they are going on the right way or not. Many of the indic...
To enhance the quality of higher education institutions (HEIs), key performance indicators (KPIs) must be explored and measured. KPIs deem as a measurable value which explains the effectiveness of an institution and how it is achieving key objectives. Institutions use KPIs for ensuring that they are going on the right way or not. Many of the indica...
Web usage mining techniques and applications across industries is still exploratory and, despite an increase in academic research, there are challenge of analyze web which quantitatively capture web users' common interests and characterize their underlying tasks. This chapter addresses the problem of how to support web usage mining techniques and a...
Requirements Engineering (RE) is a very critical phase in System Development Life Cycle (SDLC). There are several attempts to enhance the quality and performance of this phase and therefore enhancing the industry of producing software systems. One of the most important issues in requirements is prioritizing them. Every software system has limited b...
XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems. In this paper, t...
Web usage mining techniques and applications across industries is still exploratory and, despite an increase in academic research, there are challenge of analyze web which quantitatively capture web users' common interests and characterize their underlying tasks. This chapter addresses the problem of how to support web usage mining techniques and a...
This study aimed to analyze the learning objectives
of the higher education textbooks, according to verbs of intended
learning outcomes (ILOs) which set by the Quality Management
of the Institute of Statistical Studies and research (ISSR), Cairo
University, Egypt. This study provides a set of recommendations
that will help to choose the best chapte...
Web usage mining techniques and applications across industries is still exploratory and, despite an
increase in academic research, there are challenge of analyze web which quantitatively capture web users’
common interests and characterize their underlying tasks. This chapter addresses the problem of how to
support web usage mining techniques and a...
Requirements Engineering (RE) is a very critical phase in System Development Life Cycle (SDLC). There are several attempts to enhance the quality and performance of this phase and therefore enhancing the industry of producing software systems. Caring about the quality of software systems doesn’t mean just testing the product before deployment. Impr...
Requirements Engineering (RE) is a very critical phase in System Development Life Cycle (SDLC). There are several attempts to enhance the quality and performance of this phase and therefore enhancing the industry of producing software systems. Caring about the quality of software systems doesn’t mean just testing the product before deployment. Impr...
The widespread and different types of information on Twitter make it one of the most appropriate virtual environments for information monitoring and tracking. In this paper, the authors review different information analysis techniques; starting with the analysis of different hashtags, twitter's network-‐topology, event spread over the network, ide...
Key Performance Indicators (KPIs) allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI’s either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for e...
: When a SOAP Web Service is receiving an encrypted XML document, it processes it as follows. First, it decrypts the key, uses the key to decrypt all the parts containing encrypted data, and finally, the data are parsed with an XML parser, and the whole document is forwarded to the next module or business process invocation. In this case, the XML Se...
In recent years, many countries, companies, and research groups have launched their own cloud systems. Due to security issues, there is a limitation for a single-provider of a cloud to cooperate with other cloud systems to maximize the function of available resources. In addition, each cloud computing system provides a digital identity for a user....
Outsourcing databases into cloud increases the need of data security. The user of cloud must be sure that his
data will be safe and will not be stolen or reused even if the data-centers were attacked. The service provider is not trustworthy so the data must be invisible to him. Executing queries over encrypted data preserves a certain degree of co...
Web site applications are an important part of our daily life. Hence, attacking those sites increases quick, one of these attacks is SQL injection attack (SQLIA). The SQLIA is a well known way of attack in terms of common threats and document structure nowadays, this attack is launched through specially crafted user inputs and target web applicatio...
Outsourcing databases into cloud increases the need of data security. Executing queries over encrypted data preserves a certain degree of confidentiality. In this paper, we propose an efficient algorithm to run computations on data encrypted for different principals. The proposed algorithm allows users to run queries over encrypted columns directly...
Today, undoubtedly cloud-computing has turned into the popular expression in the IT business. There are many features that make cloud computing attractive for users; however, it has revealed new security issues. This paper provides an insightful analysis of the current security issues of cloud-computing. Moreover, it proposes a Security Model for S...
Abstract— Today, undoubtedly cloud-computing has turned into the popular expression in the IT business. There are many features that make cloud computing attractive for users; however, it has revealed new security issues. This paper provides an insightful analysis of the current security issues of cloud-computing. Moreover, it proposes a Security M...
XACML (extensible Access Control Markup Language) is an open standard language based on XML. It's the de facto language designed to describe the security policy and the access permission of network service, digital rights management and enterprise security applications information. RBAC profile of XACML is used to express policies that use role bas...
Safe of sensitive private data is critical. Various techniques have been proposed to preserve a certain degree of privacy on database outsourcing scenarios. In addition, allowing executing some SQL queries efficiently. This paper aims to present a complete survey about the various techniques that execute queries over encrypted data, while the data...
This paper presents clustering model for progression of ocular hypertension to primary open angle glaucoma using classification approach based on rough mereology. Our model comprises two phases: Clustering and prediction. We start by Clustering that utilises a rough mereology theory for clustering into one of three obtained classes, namely low, mid,...
Abstract: Safe of sensitive private data is critical. Various techniques have been proposed to preserve a certain degree of privacy on database outsourcing scenarios. In addition allowing to execute some SQL queries efficiently. This survey paper aims to analyze various techniques to execute queries over encrypted data however data will remain conf...
Although eXtensible Access Control Markup Language (XACML) is recognized as a precise and a complete policy description language, the structure of the current XACML policy is complex. Hence, users need to understand XACML well and write down the securing policy all by hand, which make itdif?cult to master and use. On the other hand, RDBMS is easy a...
XACML (extensible Access Control Markup Language) is an open standard language based on XML. It’s the de facto language designed to describe the security policy and the access permission of network service, digital rights management and enterprise security applications information. RBAC profile of XACML is used to express policies that use role bas...
In recent years, the research on XML security over relational databases has become popular, due to the fact that, XML became the de facto standard for data representation and exchange on the internet. Moreover, many XML documents are stored in a Relational Data Base Management System (RDBMS), so that it can be retrieved faster. In order to secure t...
JavaScript Object Notation (JSON) is a
lightweight data-interchange format. It is easy for humans
to read and write. It has a data format that is interchangeable
with a programming languages built-in data
structures that eliminates translation time and reduces
complexity and processing time. Moreover, JSON has the
same strengths of XML. Therefore,...
In this paper, we present a literature review on XML security and access control to XML documents. It will support the future research and development work as well as to raise the awareness for the presented approaches. In this literature review, we present the different articles that describe the XML security standards specifically XML encryption...
XACML is an XML-based language for access control that has been standardized by OASIS (Organization for the Advancement of Structured Information Standards). XACML describes both an access control policy language that are ABAC and an access control decisions (request/response) language. Although XACML is recognized as a precise and complete policy...
JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It has a data format that is interchangeable with programming languages built-in data structures that eliminates translation time and reduces complexity and processing time. Moreover, JSON has the same strengths of XML. Therefore, it...
In this paper, We explore how to support security models for XML documents by using relational databases. Our model based on the model in [6], but we use our algorithm to store the XML documents in relational databases.
In this paper, we present a survey of the state
of the art in XML XML security. This survey will support
the future research and development work as well as to raise
the awareness for the presented approaches. In this survey, we
present the different articles that describe the XML security
standards specifically XML encryption, XML signature, and
XA...
XML has been widely adopted for information
exchange across various networks due to flexibility providing
common syntax for messaging systems. XML documents may
contain private information that cannot be shared by all user
communities. Therefore, XML Security has a great importance
to the overall security of the distributed systems. In this paper,
w...
Questions
Questions (24)
The recursive technique is better than the iterative technique or not
ask about a tool to explain cloud virtualization