Ahmed Abd El-Latif

Ahmed Abd El-Latif
Prince Sultan University · Computer Science

About

219
Publications
49,413
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,276
Citations
Introduction
Dr. Ahmed A. Abd El-Latif received the Ph.D. degree in Computer Science & Technology at Harbin Institute of Technology (H.I.T), Harbin, P. R. China in 2013. Dr. Abd El-Latif is currently an Associate Professor at the Faculty of Science, Menoufia University, Egypt. Collectively, Dr. Abd El-Latif authored about 100 International Journal articles, Conference Proceedings, and Book Chapters. Dr. Abd El-Latif received many awards, State Encouragement Award in Engineering Sciences 2016, Arab Republic of Egypt; the best Ph. D student award from Harbin Institute of Technology, China 2013; Young scientific award, Menoufia University, Egypt 2014. He is a fellow at Academy of Scientific Research and Technology, Egypt. For Research Collaborations: a.rahiem@gmail.com, AAbdelLatif@nu.edu.eg

Publications

Publications (219)
Article
Full-text available
This article presents a multi-intelligent reflecting surface (IRS)-and multi-unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) system for 5G/6G networks. In the studied system, multiple UAVs are integrated for providing services to large-scale user equipment (UEs) with the help of multiple IRSs. This article aims to minimize the ov...
Article
Full-text available
With the popularity of autonomous vehicles and the rapid development of intelligent transportation, the application scenarios for detecting pedestrians in everyday life are becoming more and more widespread, with high and high application value. Pedestrian detection is the basis of many human-based tasks, including speed tracking, pedestrian motion...
Article
Full-text available
Feature selection (FS) has the largest influence on the performance of machine learning methods. FS can remove the irrelevant and redundancy features from the data while preserving the same quality of increasing it. However, the traditional FS methods are time-consuming and can be stuck in local optima. So, the metaheuristic (MH) techniques are use...
Article
Full-text available
In this paper, gamma attenuation has been utilised as a veritable tool for non-invasive estimation of the thickness of scale deposits. By simulating flow regimes at six volume percentages and seven scale thicknesses of a two phase-flow in a pipe, our study utilised a dual-energy gamma source with Ba-133 and Cs-137 radioisotopes, a steel pipe, and a...
Article
Full-text available
The current convolution neural network approaches have attracted extensive interest because the performance is better than that of conventional machine learning methods in the plant disease recognition. However, there are still facing challenges. For instance, the image background sometime is complex, and the model can detect plant lesions, but it...
Article
The simplest megastable chaotic system is built by employing a piecewise-linear damping function which is periodic over the spatial domain. The unforced oscillator generates an infinite number of nested limit cycles with constant distances whose strength of attraction decreases gradually as moving to outer ones. The attractors and the basins of att...
Article
Full-text available
As a result of late diagnosis, cancer is the second leading cause of death in most countries in the world. Usually, many cases of cancer are diagnosed at an advanced stage, which reduces the chances of recovery from the disease due to the inability to provide appropriate treatment. The earlier cancer is detected, the more effective the treatment ca...
Article
The attractive properties of ergodicity, unpredictability, and initial state sensitivity have made chaotic maps the go-to tools in many applications, including cryptography and cyber–physical systems. Despite this, two challenges arise when using chaos systems in cryptography: (i) some one-dimensional (1D) chaotic maps do not satisfy the unpredicta...
Article
In this paper, novel convolutional neural network (CNN) and convolutional long short-term (ConvLSTM) deep learning models (DLMs) are presented for automatic detection of arrhythmia for IoT applications. The input ECG signals are represented in 2D format, and then the obtained images are fed into the proposed DLMs for classification. This helps to o...
Preprint
Quantum key distribution (QKD) can provide point-to-point information-theoretic secure key services for two connected users. To broaden the service scale of QKD technology, the research of QKD networks that can deliver end-to-end secure key services for more users is crucial. Due to the limited key generation capability of QKD devices, high quantum...
Article
Full-text available
Mobile crowd-sensing (MCS) is a well-known paradigm used for obtaining sensed data by using sensors found in smart devices. With the rise of more sensing tasks and workers in the MCS system, it is now essential to design an efficient approach for task allocation. Moreover, to ensure the completion of the tasks, it is necessary to incentivise the wo...
Preprint
This paper puts forward a new algorithm that utilizes compressed sensing and two chaotic systems to complete image compression and encryption concurrently. Firstly, the hash function is utilized to obtain the initial parameters of two chaotic maps, which are 2D-SLIM and 2D-SCLMS map respectively. Secondly, a sparse coefficient matrix is transformed...
Article
Full-text available
A continuous monitoring of neurological status can help in reporting the physical and mental health of a person. This can be capitalized for building a healthcare tracking system using a wearable device and a handheld mobile device. In this paper, we have used the non-EEG physiological biosignals dataset which gives practicability among subjects fo...
Article
The Unmanned Aerial Vehicle (UAV) based communication has been emerged as a feasible solution for remote applications such as disaster management, and search and rescue due to its mobility and cost efficiency. The prior researches in this domain focused on positioning and path planning of UAVs; however, these approaches faced several limitations du...
Cover Page
Full-text available
CCSET2022 is the International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies which is going to be organized by the College of Computer Science of Prince Sultan University, Saudi Arabia during May 10 -11, 2022. The objectives of CCSET 2022 is to provide a premier international platform for deliberations on strategies, rec...
Article
An accurate definition of the photovoltaic (PV) models is an essential task to emulate and understand the physical behavior of the PV cell/panels. The highly used PV models are the static equivalent circuits, including single and double diode models. However, the accurate definition of the static models is mainly based on their estimated parameters...
Article
Full-text available
Hyperchaotic systems found to exhibit better dynamics and behaviors compared to chaotic systems due to great possibility of simultaneous exponential expansion of their system’s states in several directions. This feature makes hyperchaotic systems more suitable for the application of cryptographic algorithms design. This paper has multi-fold contrib...
Article
Full-text available
Abstract Quantum Computing has emerged as one of the important dimensions of global research lately, on both the prospects, hardware as well as algorithms. With enhanced processing powers, several architectures based on adiabatic concepts resulting in reversibility have been proposed to date. Architectures based on Quantum Dot Cellular Automata hav...
Article
Full-text available
Moving vehicles interact with IoT devices deployed in cities and establish social relationships to provide proactive and intelligent services for smart cities. For example, big-data-driven accurate and timely traffic speed prediction systems play an important role in empowering Intelligent Transportation Systems (ITS) in smart cities. The reason is...
Article
Full-text available
In this paper, a new 4D hyperchaotic nonlinear dynamical system with two positive Lyapunov exponents is presented. Exhaustive dynamic analyses of the novel hyperchaotic model using several dynamical studies are described. The dynamics of the system considered are first investigated analytically and numerically to explore phenomena and the selection...
Article
Unmanned aerial vehicles (UAVs) are deployed in various mission-critical applications to collect sensitive data and disseminate it to the server placed on the ground station. Users mostly require real-time data from the drones, instead of the information stored by the server, in specific applications to perform timely actions. However, performing r...
Article
Full-text available
Digital forgery has become one of the attractive research fields in today’s technology. There are several types of forgery in digital media transmission, especially digital image transmission. A common type of forgery is copy-move forgery (CMF). The CMF may be encountered in streets, railway stations, underground stations, or festivals. This type o...
Article
Full-text available
Tomato is one of the most important vegetables worldwide. It is considered a mainstay of many countries’ economies. However, tomato crops are vulnerable to many diseases that lead to reducing or destroying production, and for this reason, early and accurate diagnosis of tomato diseases is very urgent. For this reason, many deep learning models have...
Article
Full-text available
Introduction In humanity’s ongoing fight against its common enemy of COVID-19, researchers have been relentless in finding efficient technologies to support mitigation, diagnosis, management, contact tracing, and ultimately vaccination. Objectives Engineers and computer scientists have deployed the potent properties of deep learning models (DLM) i...
Article
Full-text available
This paper presents an energy and task completion time minimization scheme for the unmanned aerial vehicles (UAVs)-empowered mobile edge computing (MEC) system, where several UAVs are deployed to serve large-scale users’ equipment (UEs). The aim is to minimize the weighted sum of energy consumption and task completion time of the system by planning...
Article
Full-text available
Leukemia is a fatal category of cancer-related disease that affects individuals of all ages, including children and adults, and is a significant cause of death worldwide. Particularly, it is associated with White Blood Cells (WBC), which is accompanied by a rise in the number of immature lymphocytes and cause damage to the bone marrow and/or blood....
Article
Internet of Things (IoT) is getting more attention and popularity these days as they make the place smarter and efficient. Every IoT-enabled device is communicating with one another either directly or through a gateway to the internet. Data transmission brings security challenges and concerns to retain data integrity. In the Healthcare field, it is...
Article
Full-text available
Here, a chaotic quadratic oscillator with only squared terms is proposed, which shows various dynamics. The oscillator has eight equilibrium points, and none of them is stable. Various bifurcation diagrams of the oscillator are investigated, and its Lyapunov exponents (LEs) are discussed. The multistability of the oscillator is discussed by plottin...
Article
Traffic Sign Detection (TSD) in real-time environment holds great importance for applications like automated driven vehicles. Large variety of traffic signs, different appearances and spatial representations causes a huge intra-class variation. In this article, an Extreme Learning Machine (ELM), Convolutional Neural Network (CNN) and Scale Transfor...
Article
Full-text available
Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity have serious security issues. Chaos models play an important role in designing robust multimedia data...
Article
Full-text available
We present QIRHSI, a novel quantum image representation method based on the HSI color space model. QIRHSI integrates the advantages of the Flexible Representation of Quantum Images (FRQI) model and the Novel Enhanced Quantum Representation (NEQR) model. On the one hand, the proposed QIRHSI model is better suited for the image processing related to...
Book
This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive r...
Article
Full-text available
Today, due to the pandemic of COVID-19 the entire world is facing a serious health crisis. According to the World Health Organization (WHO), people in public places should wear a face mask to control the rapid transmission of COVID-19. The governmental bodies of different countries imposed that wearing a face mask is compulsory in public places. Th...
Book
Full-text available
This book gathers the proceedings of the International Conference on Information, Communication and Cybersecurity, held on November 10–11, 2021, in Khouribga, Morocco. The conference was jointly coorganized by The National School of Applied Sciences of Sultan Moulay Slimane University, Morocco, and Charles Darwin University, Australia. This book pr...
Article
The usage of cloud services is growing exponentially with the recent advancement of Internet of Things (IoT)-based applications. Advanced scheduling approaches are needed to successfully meet the application demands while harnessing cloud computing's potential effectively to schedule the IoT services onto cloud resources optimally. This paper propo...
Chapter
Using three nonlinear terms (two quadratics and one cubic), a new 12-term hyperchaos system with a double-scroll attractor is proposed in this chapter. Using bifurcation analysis, dynamical properties are exemplified and multistability property with coexisting hyperchaos attractors is established. MultiSim circuit simulation of the new hyperchaos s...
Article
Full-text available
Ovarian cancer is the third most common gynecologic cancers worldwide. Advanced ovarian cancer patients bear a significant mortality rate. Survival estimation is essential for clinicians and patients to understand better and tolerate future outcomes. The present study intends to investigate different survival predictors available for cancer prognos...
Article
Facts reveal that numerous road accidents worldwide occur due to fatigue, drowsiness, and distraction while driving. Few works on the automated drowsiness detection problem, propose to extract physiological signals of the driver including ECG, EEG, heart variability rate, blood pressure, etc. which make those solutions non-ideal. While recent ones...
Research Proposal
Full-text available
CFP Website: https://www.comsoc.org/publications/magazines/ieee-wireless-communications/cfp/quantum-technology-5g6g-wireless
Article
Full-text available
Smart systems and technologies have become integral parts of modern society. Their ubiquity makes it paramount to prioritise securing the privacy of data transferred between smart devices. Visual encryption is a technique employed to obscure images by rendering them meaningless to evade attention during transmission. However, the astounding computi...
Article
Full-text available
Internet of Energy (IoE) provides two-way communication for reform of energy utilization between service providers and consumers. To provide secure, efficient, and reliable operations in IoE should be protected from cyber-attacks. Many frameworks have been proposed so far to address security and privacy concerns of these systems. In the vehicle-gri...
Article
To handle pandemic situations like Corona, medical practitioners and researchers collaboratively will work together and transfer medical reports across the globe. Subsequently, it is important to preserve those reports from unauthorised access by providing utmost confidentiality, integrity and authentication. Quantum cryptography depends on quantum...
Article
Full-text available
Hyperchaotic systems are widely applied in the cryptography domain on account of their more complex dynamical behavior. In view of this, the greatest contribution of this paper is that a two-dimensional Sine coupling Logistic modulated Sine (2D-SCLMS) system is proposed based on Logistic map and Sine map. By a series of analyses, including Lyapunov...
Article
Full-text available
This paper proposes a multi-unmanned aerial vehicle (UAV)-enabled autonomous mobile edge computing (MEC) system, in which several UAVs are deployed to provide services to user devices (UDs). The aim is to reduce/minimize the overall energy consumption of the autonomous system via designing the optimal trajectories of multiple UAVs. The problem is v...
Article
Full-text available
The LoRa wireless connectivity has become a de facto technology for intelligent critical infrastructures such as transport systems. Achieving high Quality of Service (QoS) in cooperative systems remains a challenging task in LoRa. However, high QoS can be achieved via optimizing the transmission policy parameters such as spreading factor, bandwidth...
Article
Full-text available
In wireless sensor networks (WSNs), clustering is one of the most effective routing protocols. Most clustering algorithms include two stages of operations: cluster head selection and cluster formation. Cluster heads are selected from the sensor nodes based on several key parameters like residual energy of the cluster heads candidates, the distance...
Book
Full-text available
This book provides an opportunity to account for state-of-the-art works, future trends impacting information technology, communications, and cybersecurity, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. ICI2C 2...
Article
Full-text available
In this work, we describe the model of a new 4-D hyperchaotic system with no balance point and deduce that the new hyperchaotic system has a hidden attractor. We present a detailed bifurcation analysis for the new hyperchaotic dynamo system with respect to the system parameters and also exhibit that the new hyperchaotic system displays multistabili...
Article
Full-text available
The ubiquity of image and video applications in our daily lives makes data security and privacy prominent concerns for everyone. Among others, various image cryptosystems are relied upon to provide the necessary safeguards. With the inevitable realisation of quantum computing hardware, however, the anticipated quantum supremacy entails effortless v...
Article
Full-text available
Surveillance remains an important research area, and it has many applications. Smart surveillance requires a high level of accuracy even when persons are uncooperative. Gait Recognition is the study of recognizing people by the way they walk even when they are unwilling to cooperate. It is another form of a behavioral biometric system in which uniq...
Cover Page
Full-text available
Cybersecurity • Cyberthreat information presentation; • Intelligence-driven security operations; • Compliance-aware security engineering; • Cyber threat intelligence-and information-acquisition systems • IoT/CPS cybersecurity; • Cyber law and ethics; • Cyber resilience and system security assessments; • Cyber security risk in multidisciplinary cont...
Article
Pedestrian gender classification is one of the key assignments of pedestrian study, and it finds practical applications in content-based image retrieval, population statistics, human–computer interaction, health care, multimedia retrieval systems, demographic collection, and visual surveillance. In this research work, gender classification was carr...
Article
Full-text available
The paper proposes a solution to the problem of choosing the size of a cluster in an ultralow latency network. This work is aimed at designing a method for choosing the size of the digital cluster in an ultralow latency network taking into account the lengths of connecting lines. If the linear dimension calculation is based only on the latency requ...
Chapter
Recently, public healthcare systems become one of the most pivotal parts in our daily life. Resulting in an insane increase in Medical data like medical images and patient information. Having huge amount of data requires more computational power for efficient data management. In addition, data security, privacy and trustworthy have to be maintained...
Chapter
Cyber-physical systems are one of the key technological trends in the modern world. However, their use is associated with the need to counter a variety of cyber threats. This review is devoted to information hiding methods and algorithms designed to ensure security in cyber physical systems. This application of embedding methods is fairly new, but...
Research Proposal
Full-text available
Edited Book: Computational Intelligence for Medical Internet of Things (MIoT) Application Systems Publication in "Series: Advances in ubiquitous sensing applications for healthcare", by Elsevier Submission link: https://easychair.org/conferences/?conf=miot-21 Chapter Submission Deadline: November, 2021
Article
Full-text available
Sudden cardiac death from lethal arrhythmia is a preventable cause of death. Ventricular fibrillation and tachycardia are shockable electrocardiographic (ECG)rhythms that can respond to emergency electrical shock therapy and revert to normal sinus rhythm if diagnosed early upon cardiac arrest with the restoration of adequate cardiac pump function....
Article
Recently, a great development has occurred in the communication networks, in which the trend of development is towards automation and flexible network structure. In addition, the stages of telecommunication development are conventionally divided from manual switching to flexible virtualized architecture, to which telecommunications operators have r...
Article
Full-text available
Ultrareliable and low-latency connection (URLLC) is one of the novel features in 5G networks and subsequent generations, in which it targets to fulfill stringent requirements on data rates, reliability, and availability. Moreover, the multiconnectivity concept is introduced to meet these requirements, where multiple different technologies are conne...
Article
One of the major challenges in chaos dynamics is the design of simple and realisable electronic circuits capable of complex dynamic behaviours. Our contribution studies the dynamics and implementation of a simple chaotic memristive RLC oscillator circuit of jerky type as well as its application in designing image cryptosystem. The proposed circuit...