Aliaa Youssif

Aliaa Youssif
Arab Academy for Science, Technology & Maritime Transport (AASTMT) · Computer Science

Professor
Professor of Computer Science, Arab Academy for Science, Technology and Maritime Transport (AASTMT)

About

99
Publications
46,447
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,400
Citations
Introduction
Aliaa Youssif currently works at College of Computing and Information Technology, Arab Academy for Science,Technology and maritime transportation (AASTMT). Aliaa does research in Human-computer Interaction, Computer Security and Reliability and Artificial Intelligence. Their current project is 'Automatic Detection of Landmarks and Abnormalities in Eye Fundus Images'.
Additional affiliations
August 2018 - present
Arab Academy for Science, Technology, and Maritime Transport
Position
  • Head of Faculty

Publications

Publications (99)
Article
Full-text available
Topic of quantum chaos has begun to draw increasing attention in recent years. So, to ensure the security of digital image, an image encryption algorithm based on combining a hyperchaotic system and quantum 3D logistic map is proposed. This algorithm is applied in four stages. Initially, the key generator builds upon the foundation of mean for any...
Article
Image denoising is the technique of removing noise or distortions from an image. During medical image acquisition, random noise is added, which results in a lower contrast in those images. For that, image denoising is a crucial task for medical imaging analysis. In this study, a denoising system using three heterogeneous medical datasets is propose...
Article
Full-text available
Transcription factors (TFs) are proteins that control the transcription of a gene from DNA to messenger RNA (mRNA). TFs bind to a specific DNA sequence called a binding site. Transcription factor binding sites have not yet been completely identified, and this is considered to be a challenge that could be approached computationally. This challenge i...
Chapter
Decomposition based Multi Objectives Evolutionary Algorithms (MOEA/D) became one of research focus in the last decade. That is due to its simplicity as well as its effectiveness in solving both constrained and unconstrained problems with different Pareto Front (PF) geometries. This paper presents the challenges on different research areas concernin...
Conference Paper
Full-text available
This paper proposes two approaches for dynamic creation of prediction ensembles. Instead of using fixed regions in the space, we propose the "on-the-fly" idea which is employed in 2 approaches. In the first approach, global models are trained, and a dynamic validation set is created on-the-fly for each test vector based on random forest (RF) define...
Conference Paper
This work proposes an efficient spatiotemporal compact descriptor for action representation from depth map sequences. The feature descriptor is intended to resolve the problems of distinguishing different posture shapes with temporal order. The proposed work is composed of three phases. In the first phase, a depth sequence is partitioned into three...
Article
Full-text available
In single image super resolution problems, the recent feed forward deep learning architectures use residual connections in order to preserve local features and carry them through the next layer. In a simple residual skip connection, all the features of the earlier layer are concatenated with the features of the current layer. A simple concatenation...
Article
Full-text available
With extensive applications of face recognition technologies, face anti-spoofing played an important role and has drawn a great attention in the security systems. This study represents a multi-spectral face anti-spoofing method working with both visible (VIS) and near-infrared (NIR) spectra imaging. Spectral imaging is the capture of images in mult...
Article
Full-text available
Diabetic Retinopathy (DR) is the deterioration of retinal vessels caused by Diabetes progression. There are 285 million patients suffering from diabetes worldwide; and, unless they are early diagnosed, these massive numbers of people are under the risk of developing DR, which can lead to sudden blindness. Thus, a reliable Computer-Aided Diagnosis (...
Article
Full-text available
Abstract—Face images analysis and recognition is one of the most outstanding abilities of human vision. Building an automated system that accomplishes such objective is very challenging. The challenges mainly come from the large variations in the visual stimulus due to illumination conditions, blurring and long distance acquisition. As part of an o...
Conference Paper
Full-text available
Locality based prediction has shown excellent performance in difficult multi-step forecasting problems. However, either neighbor search or sparse coding is usually used to define locality, which require considerable computations. In this paper, we are investigating a locality-based time series forecasting based on bagging trees defined neighborhood...
Conference Paper
Full-text available
In recent years, terrorism, accidents, violence thefts have increased, leads to install surveillance cameras everywhere in order to identify the people who have done the bad deeds. In most cases, the images are not clear to identify and know the people, so we have developed a system that helps to improve the image level So that we can identify peop...
Conference Paper
This paper introduces a real-time framework for human action recognition by Microsoft sensor for Windows. The framework detects human skeleton joints and extracts human from the depth map that received from Kinect. The proposed algorithm for action segmentation used to represent action. Key-frame extraction algorithm is applied to obtain dominant f...
Conference Paper
Full-text available
In recent years, terrorism, accidents, violence thefts have increased, leads to install surveillance cameras everywhere in order to identify the people who have done the bad deeds. In most cases, the images are not clear to identify and know the people, so we have developed a system that helps to improve the image level that identify people. To obt...
Preprint
Full-text available
There is a tremendous growth of digital data due to the stunning progress of digital devices which facilitates capturing them. Digital data includes image, text, and video. Video represents a rich source of information. Thus, there is an urgent need to retrieve, organize, and automate videos. Video retrieval is a vital process in multimedia applica...
Article
Full-text available
Semantic Video Retrieval, Temporal Association Rules, Principle Component Analysis, Gaussian Mixture Model Clustering, Expectation Maximization Algorithm, Sequential Pattern Discovery Algorithm
Article
Full-text available
Depth Maps-based Human Activity Recognition is the process of categorizing depth sequences with a particular activity. In this problem, some applications represent robust solutions in domains such as surveillance system, computer vision applications, and video retrieval systems. The task is challenging due to variations inside one class and disting...
Article
Full-text available
This paper provides a novel approach for the problem of detecting the yellowish lesions in the eye fundus images, such as hard and soft exudates, in a fully-automated manner. To solve this problem of segmenting exudates automatically, the fundus image was first converted into the L*a*b* color space to decouple the chromaticity information of the im...
Article
Full-text available
Image processing sub branch that specifically deals with the improvement, of images and videos, resolution without compromising the detail and visual effect but rather enhances the two, is known as Super Resolution. Multiple (multiple input images and one output image) or single (one input and one output) low resolution images are converted to high...
Conference Paper
The reconstruction of 3D objects from 2D line drawings is regarded as one of the key topics in the field of computer vision. The ongoing research is mainly focusing on the reconstruction of 3D objects that are mapped only from 2D straight lines, and that are symmetric in nature. Commonly, this approach only produces basic and simple shapes that are...
Article
Full-text available
Vision based object tracking problem still a hot and important area of research specially when the tracking algorithms are performed by the aircraft unmanned vehicle (UAV). Tracking with the UAV requires special considerations due to the flight maneuvers, environmental conditions and aircraft moving camera. The ego motion calculations can compensat...
Article
Full-text available
There are many approaches for automatic annotation in digital images. Nowadays digital photography is a common technology for capturing and archiving images because of the digital cameras and storage devices reasonable price. As amount of the digital images increase, the problem of annotating a specific image becomes a critical issue. Automated ima...
Article
Full-text available
Wireless multimedia sensor networks (WMSNs), is an ad hoc network of wirelessly connected sensor nodes that allow retrieving video and audio streams, still images, and scalar sensor data but such sensors are limited in energy, memory, communication, and computational power. Multimedia transmission over wireless sensor network (WSN) is a challenging...
Conference Paper
Full-text available
Optic disc segmentation is a key element in automatic screening systems, which facilitates the detection of lesions that affect the interior surface of the eye (i.e. fundus). Therefore, this paper aims to provide a fully automated technique for detecting and segmenting the optic disc. First, the fundus image is preprocessed in order to estimate the...
Article
Full-text available
Wireless Multimedia Sensor Networks (WMSNs), is a network of sensors, which are limited in terms of memory, computing, bandwidth, and battery lifetime. Multimedia transmission over WSN requires certain QoS guarantees such as huge amount of bandwidth, strict delay and lower loss ratio that makes transmitting multimedia is a complicated task. However...
Article
Full-text available
In this paper, the implementation method for encoding the high resolution videos using high efficiency video coding (HEVC) standard is introduced with a new approach. The HEVC standard, successor to the H.264/AVC standard, is more efficient than the H.264/AVC standard in the encoding high resolution videos. HEVC has been designed to focus on increa...
Article
Full-text available
Wireless multimedia sensor networks (WMSNs), have limited resources in terms of computational, memory, bandwidth, and battery capability, which makes transmitting multimedia content over it, is a challenge as multimedia requires QoS guarantee. Recently adopting cross-layer design in WMSNs proved to be a promising approach, which improves quality of...
Article
Full-text available
Optic disc detection and segmentation is one of the key elements for automatic retinal disease screening systems. The aim of this survey paper is to review, categorize and compare the optic disc detection algorithms and methodologies, giving a description of each of them, highlighting their key points and performance measures. Accordingly, this sur...
Article
Full-text available
This paper proposes a dynamic cross-layer approach to enhance quality of MPEG-4 video stream transmission over an IEEE 802.11e wireless mesh networks. IEEE 802.11e standard either classifies video data to a specific access category (AC) which causes high packet loss at heavy load conditions or uses static mapping to map video data to lower priority...
Article
Wireless Multimedia Sensor Networks (WMSNs), is a network of sensors which are limited in terms of computational, memory, bandwidth, and battery capability. Multimedia transmission over WSN requires certain Qos guarantees such as huge amount of bandwidth, strict delay and lower loss ratio, which makes transmitting multimedia content over it, is a c...
Article
Full-text available
Automatically detecting facial expressions has become an important research area. It plays a significant role in security, human-computer interaction and health-care. Yet, earlier work focuses on posed facial expression. In this paper, we propose a spontaneous facial expression recognition method based on effective feature extraction and facial exp...
Conference Paper
Video streams over wireless channel require stringent QoS constraints, such as low packet loss and latency. It becomes the main challenge to design a network to achieve these QoS objectives. This paper proposes a cross-layer approach to enhance quality of MPEG-4 video stream transmission over an IEEE 802.11e wireless mesh networks. Most of the conv...
Article
Full-text available
Arab Republic of Egypt suffer from the absence of maps that show spread of landmines locations planted from World War II in the Egyptian western desert ―El Alamein region‖ in addition to the lack of funds and the limited use of technology. This paper presents an enhancements of the method of mine detection of previously published research paper in...
Article
Full-text available
Hepatocellular Carcinoma (HCC) is the one of leading causes of cancer related deaths worldwide. In most cases, the patients are first infected with Hepatitis C virus (HCV) which then progresses to HCC. HCC is usually diagnosed in its advanced stages and is more difficult to treat at this stage. Early diagnosis increases survival rate as treatment o...
Article
Full-text available
This paper proposes a hybrid approach for co-channel speech segregation. HMM (hidden Markov model) is used to track the pitches of 2 talkers. The resulting pitch tracks are then enriched with the prominent pitch. The enriched tracks are correctly grouped using pitch continuity. Medium frame harmonics are used to extract the second pitch for frames...
Article
Full-text available
Ultra wideband (UWB) technology has been widely used for wireless communication systems including long and short ranges. Wireless computer network is a short range communication system. The present study provides a detailed analysis and performance evaluation of an Ultra-Wideband wireless computer network in a dynamic environment. This includes mul...
Article
Full-text available
paper presents an integrated applications and hardware systems of a RC Truck to detect and pinpoint the locations of explosives in desert environment as El Alamein region. This work will be based on the use of the packet oriented mobile data service that available through the global system for mobile communications. By using of this integrated tech...
Article
Full-text available
Bio-informatics tools are widely used to obtain results that are hard to be obtained by physical experiments alone. In this study, we predicted the 3D structure of all human H5N1 hemagglutinin proteins with estimated precision 100%. We tested the existence of the F10 antibody epitope at their surfaces. The information gain (IG) is applied to calcul...
Conference Paper
Full-text available
Artificial Bee colony algorithm is a modern swarm intelligence algorithm. This paper proposes a modified version of artificial bee colony algorithm called “Adaptive Artificial Bee Colony” (AABC). This paper compares between standard bee colony algorithm and the proposed adaptive bee colony algorithm through traveling salesman problem. Traveling sal...
Data
Full-text available
Hepatocellular Carcinoma (HCC) is the one of leading causes of cancer related deaths worldwide. In most cases, the patients are first infected with Hepatitis C virus (HCV) which then progresses to HCC. HCC is usually diagnosed in its advanced stages and is more difficult to treat or cure at this stage. Early diagnosis increases survival rate as tre...
Article
Full-text available
The topic of automatic recognition of facial expressions deduce a lot of researchers in the late last century and has increased a great interest in the past few years. Several techniques have emerged in order to improve the efficiency of the recognition by addressing problems in face detection and extraction features in recognizing expressions. Thi...
Article
“With the development of media technologies, more and more videos are digitally produced, stored and distributed. File sharing of video content on the internet, using hosting services like YouTube” which stated that the upload rate of their server is up to 20 hours of video materials per minute. Therefore, a video fingerprinting system to automatic...
Article
Full-text available
Video fingerprinting is a newer research area. It is also called “content-based video copy detection” or “content-based video identification” in literature. The goal is to locate videos with segments substantially identical to segments of a query video while tolerating common artifacts in video processing. Its value as a tool to curb piracy and leg...
Article
Full-text available
Image segmentation plays a preliminary and indispensable step in medical image processing. Magnetic resonance (MR) segmentation used for brain tissues extraction white matter (WM), gray matter (GM) and cerebrospinal fluids (CSF). These tissues help in many medical image segmentation applications such as radiotherapy planning, clinical diagnosis, tr...
Article
Full-text available
Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different tech...
Article
Full-text available
The malware threat for mobile phones is expected to increase with the great functionality enhancement of mobile phones. Despite the nowadays malware high abilities, there are a lot of challenges that facing the mobile threat containment process. From this perspective, this work introduces a novel effective solution for discovering handset malwares...
Article
Full-text available
In the context of the recognition of vocal folds disorders, the systems based on acoustic analysis are being introduced as computer aided medical diagnosis tools due to its objectivity and noninvasive nature. Acoustic analysis is a complementary tool to those methods based on direct observation of the vocal folds by laryngoscopy; also, it can be us...
Article
Full-text available
Clustering is an effective topology approach in wireless sensor network, which can increase network lifetime and scalability. Either Node Mobility or Channel fading has a negative impact on various clustering protocol. In case of Node Mobility when all sensor nodes are mobile the current nearest cluster head may be the farthest one for the sensor n...
Article
Full-text available
This paper presents an efficient and innovative system for automated classification of periodontal diseases, The strength of our technique lies in the fact that it incorporates knowledge from the patients' clinical data, along with the features automatically extracted from the Haematoxylin and Eosin (H&E) stained microscopic images. Our system uses...
Conference Paper
This paper presents a proposed model regarding Heterogeneous Data Reduction. The model reduces data over a heterogeneous environment through feature selection/extraction. The feature is selected/extracted directly from its data source and prepared without an initial integration for all data sources. After that the selected/extracted prepared featur...
Article
Full-text available
This paper presents analysis and evaluation of ultra-wideband time-hopping communication system with either pulse position modulation (TH-PPM) or binary phase shift keying (TH-BPSK). The channel model has been assumed as CM1 (line-of-sight) and/or CM3 (Non-line-of-sight) along with AWGN (IEEE 802.15.3a). In addition, the impact of all system parame...
Conference Paper
Full-text available
Artificial bee colony algorithm is a new swarm intelligence algorithm. It is inspired from natural bee swarm intelligence concepts to solve the optimization problems. This paper proposes a framework for artificial bee colony algorithm. This framework is problem independent. The usage of this framework in any optimization problem is the goal of this...
Conference Paper
With the tremendous growth of information availability to users through the Web, search engines come to play ever a more critical role. However, search engines retrieve vast amount of information that is far larger than an individual capability of processing. Also enormous amount of such information are not related to user search query. The semanti...
Article
Full-text available
Hand gestures enabling deaf people to communication during their daily lives rather than by speaking. A sign language is a language which, instead of using sound, uses visually transmitted gesture signs which simultaneously combine hand shapes, orientation and movement of the hands, arms, lip-patterns, body movements and facial expressions to expre...
Conference Paper
Full-text available
In this paper, an automatic Keyphrase extraction algorithm (KPE algorithm) is presented for single English document without using controlled vocabularies (corpus). It relies on n-gram filtration technique that filters complicated n-grams. The proposed algorithm proposes a ranking method to weight extracted keyphrases. The ranking method relies on t...
Article
Full-text available
This paper presents a computer vision system for automatic facial expression recognition (AFER). The robust AFER system can be applied in many areas such as emotion science, clinical psychology and pain assessment it includes facial feature extraction and pattern recognition phases that discriminates among different facial expressions. In feature e...
Conference Paper
Full-text available
The use of short interfering RNA (siRNA) is an emerging powerful method for gene silencing. siRNA is a short RNA sequence that targets mRNA and causes the sequence-specific degradation of the mRNA. Despite its importance, few efforts have been made to develop algorithms and computational tools to detect genes controlled by siRNA process. This paper...
Article
Web search is one of the most challenging problems of the Internet today, seeking to provide users with search results most relevant to their information needs. The new improvements of search engines technologies have made available to the internet users an enormous amount of knowledge that can be accessed in many different ways. However, there are...
Article
Full-text available
Grid resource management mainly schedules applications over the available resources. Such scheduling over a large scale distributed environment raises performance issues. Most of the current implementations paid a little consideration of performance issues that are raised at service discovery and advertisement processes.In this work an agent based...
Article
Full-text available
As technology continues to increase the various formats in which medical images are created, transmitted, and analyzed, it has become more necessary to restrict the different ways in which this data is stored and formatted between the conflicting modalities. There is a significant increase in the use of medical images in clinical medicine, disease...
Article
A methodology for elucidation of structural, functional, and mechanistic knowledge on promiscuous proteins is proposed that constitutes a workflow of integrated bioinformatics analysis. Sequence alignments with closely related homologues can reveal conserved regions which are functionally important. Scanning protein motif databases, along with seco...