Aliaa YoussifArab Academy for Science, Technology & Maritime Transport (AASTMT) · Computer Science
Aliaa Youssif
Professor
Professor of Computer Science, Arab Academy for Science, Technology and Maritime Transport (AASTMT)
About
99
Publications
46,447
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,400
Citations
Introduction
Aliaa Youssif currently works at College of Computing and Information Technology, Arab Academy for Science,Technology and maritime transportation (AASTMT). Aliaa does research in Human-computer Interaction, Computer Security and Reliability and Artificial Intelligence. Their current project is 'Automatic Detection of Landmarks and Abnormalities in Eye Fundus Images'.
Additional affiliations
August 2018 - present
Publications
Publications (99)
Topic of quantum chaos has begun to draw increasing attention in recent years. So, to ensure the security of digital image, an image encryption algorithm based on combining a hyperchaotic system and quantum 3D logistic map is proposed. This algorithm is applied in four stages. Initially, the key generator builds upon the foundation of mean for any...
Image denoising is the technique of removing noise or distortions from an image. During medical image acquisition, random noise is added, which results in a lower contrast in those images. For that, image denoising is a crucial task for medical imaging analysis. In this study, a denoising system using three heterogeneous medical datasets is propose...
Transcription factors (TFs) are proteins that control the transcription of a gene from DNA to messenger RNA (mRNA). TFs bind to a specific DNA sequence called a binding site. Transcription factor binding sites have not yet been completely identified, and this is considered to be a challenge that could be approached computationally. This challenge i...
Decomposition based Multi Objectives Evolutionary Algorithms (MOEA/D) became one of research focus in the last decade. That is due to its simplicity as well as its effectiveness in solving both constrained and unconstrained problems with different Pareto Front (PF) geometries. This paper presents the challenges on different research areas concernin...
This paper proposes two approaches for dynamic creation of prediction ensembles. Instead of using fixed regions in the space, we propose the "on-the-fly" idea which is employed in 2 approaches. In the first approach, global models are trained, and a dynamic validation set is created on-the-fly for each test vector based on random forest (RF) define...
This work proposes an efficient spatiotemporal compact descriptor for action representation from depth map sequences. The feature descriptor is intended to resolve the problems of distinguishing different posture shapes with temporal order. The proposed work is composed of three phases. In the first phase, a depth sequence is partitioned into three...
In single image super resolution problems, the recent feed forward deep learning architectures use residual connections in order to preserve local features and carry them through the next layer. In a simple residual skip connection, all the features of the earlier layer are concatenated with the features of the current layer. A simple concatenation...
With extensive applications of face recognition technologies, face anti-spoofing played an important role and has drawn a great attention in the security systems. This study represents a multi-spectral face anti-spoofing method working with both visible (VIS) and near-infrared (NIR) spectra imaging. Spectral imaging is the capture of images in mult...
Diabetic Retinopathy (DR) is the deterioration of retinal vessels caused by Diabetes progression. There are 285 million patients suffering from diabetes worldwide; and, unless they are early diagnosed, these massive numbers of people are under the risk of developing DR, which can lead to sudden blindness. Thus, a reliable Computer-Aided Diagnosis (...
Abstract—Face images analysis and recognition is one of the most outstanding abilities of human vision. Building an automated system that accomplishes such objective is very challenging. The challenges mainly come from the large variations in the visual stimulus due to illumination conditions, blurring and long distance acquisition. As part of an o...
Locality based prediction has shown excellent performance in difficult multi-step forecasting problems. However, either neighbor search or sparse coding is usually used to define locality, which require considerable computations. In this paper, we are investigating a locality-based time series forecasting based on bagging trees defined neighborhood...
In recent years, terrorism, accidents, violence thefts have increased, leads to install surveillance cameras everywhere in order to identify the people who have done the bad deeds. In most cases, the images are not clear to identify and know the people, so we have developed a system that helps to improve the image level So that we can identify peop...
This paper introduces a real-time framework for human action recognition by Microsoft sensor for Windows. The framework detects human skeleton joints and extracts human from the depth map that received from Kinect. The proposed algorithm for action segmentation used to represent action. Key-frame extraction algorithm is applied to obtain dominant f...
In recent years, terrorism, accidents, violence thefts have increased, leads to install surveillance cameras everywhere in order to identify the people who have done the bad deeds. In most cases, the images are not clear to identify and know the people, so we have developed a system that helps to improve the image level that identify people. To obt...
There is a tremendous growth of digital data due to the stunning progress of digital devices which facilitates capturing them. Digital data includes image, text, and video. Video represents a rich source of information. Thus, there is an urgent need to retrieve, organize, and automate videos. Video retrieval is a vital process in multimedia applica...
Semantic Video Retrieval, Temporal Association Rules, Principle Component Analysis, Gaussian Mixture Model Clustering, Expectation Maximization Algorithm, Sequential Pattern Discovery Algorithm
Depth Maps-based Human Activity Recognition is the process of categorizing depth sequences with a particular activity. In this problem, some applications represent robust solutions in domains such as surveillance system, computer vision applications, and video retrieval systems. The task is challenging due to variations inside one class and disting...
This paper provides a novel approach for the problem of detecting the yellowish lesions in the eye fundus images, such as hard and soft exudates, in a fully-automated manner. To solve this problem of segmenting exudates automatically, the fundus image was first converted into the L*a*b* color space to decouple the chromaticity information of the im...
Image processing sub branch that specifically deals with the improvement, of images and videos, resolution without compromising the detail and visual effect but rather enhances the two, is known as Super Resolution. Multiple (multiple input images and one output image) or single (one input and one output) low resolution images are converted to high...
The reconstruction of 3D objects from 2D line drawings is regarded as one of the key topics in the field of computer vision. The ongoing research is mainly focusing on the reconstruction of 3D objects that are mapped only from 2D straight lines, and that are symmetric in nature. Commonly, this approach only produces basic and simple shapes that are...
Vision based object tracking problem still a hot and important area of research specially when the tracking algorithms are performed by the aircraft unmanned vehicle (UAV). Tracking with the UAV requires special considerations due to the flight maneuvers, environmental conditions and aircraft moving camera. The ego motion calculations can compensat...
There are many approaches for automatic annotation in digital images. Nowadays digital photography is a common technology for capturing and archiving images because of the digital cameras and storage devices reasonable price. As amount of the digital images increase, the problem of annotating a specific image becomes a critical issue. Automated ima...
Wireless multimedia sensor networks (WMSNs), is an ad hoc network of wirelessly connected sensor nodes that allow retrieving video and audio streams, still images, and scalar sensor data but such sensors are limited in energy, memory, communication, and computational power. Multimedia transmission over wireless sensor network (WSN) is a challenging...
Optic disc segmentation is a key element in automatic screening systems, which facilitates the detection of lesions that affect the interior surface of the eye (i.e. fundus). Therefore, this paper aims to provide a fully automated technique for detecting and segmenting the optic disc. First, the fundus image is preprocessed in order to estimate the...
Wireless Multimedia Sensor Networks (WMSNs), is a network of sensors, which are limited in terms of memory, computing, bandwidth, and battery lifetime. Multimedia transmission over WSN requires certain QoS guarantees such as huge amount of bandwidth, strict delay and lower loss ratio that makes transmitting multimedia is a complicated task. However...
In this paper, the implementation method for encoding the
high resolution videos using high efficiency video coding (HEVC) standard
is introduced with a new approach. The HEVC standard, successor
to the H.264/AVC standard, is more efficient than the H.264/AVC standard
in the encoding high resolution videos. HEVC has been designed
to focus on increa...
Wireless multimedia sensor networks (WMSNs), have limited resources in terms of computational, memory, bandwidth, and battery capability, which makes transmitting multimedia content over it, is a challenge as multimedia requires QoS guarantee. Recently adopting cross-layer design in WMSNs proved to be a promising approach, which improves quality of...
Optic disc detection and segmentation is one of the key elements for automatic retinal disease screening systems. The aim of this survey paper is to review, categorize and compare the optic disc detection algorithms and methodologies, giving a description of each of them, highlighting their key points and performance measures. Accordingly, this sur...
This paper proposes a dynamic cross-layer approach to enhance quality of MPEG-4 video stream transmission over an IEEE 802.11e wireless mesh networks. IEEE 802.11e standard either classifies video data to a specific access category (AC) which causes high packet loss at heavy load conditions or uses static mapping to map video data to lower priority...
Wireless Multimedia Sensor Networks (WMSNs), is a network of sensors which are limited in terms of computational, memory, bandwidth, and battery capability. Multimedia transmission over WSN requires certain Qos guarantees such as huge amount of bandwidth, strict delay and lower loss ratio, which makes transmitting multimedia content over it, is a c...
Automatically detecting facial expressions has become an important research area. It plays a significant role in security, human-computer interaction and health-care. Yet, earlier work focuses on posed facial expression. In this paper, we propose a spontaneous facial expression recognition method based on effective feature extraction and facial exp...
Video streams over wireless channel require stringent QoS constraints, such as low packet loss and latency. It becomes the main challenge to design a network to achieve these QoS objectives. This paper proposes a cross-layer approach to enhance quality of MPEG-4 video stream transmission over an IEEE 802.11e wireless mesh networks. Most of the conv...
Arab Republic of Egypt suffer from the absence of maps that show spread of landmines locations planted from World War II in the Egyptian western desert ―El Alamein region‖ in addition to the lack of funds and the limited use of technology. This paper presents an enhancements of the method of mine detection of previously published research paper in...
Hepatocellular Carcinoma (HCC) is the one of leading causes of cancer related deaths worldwide. In most cases, the patients are first infected with Hepatitis C virus (HCV) which then progresses to HCC. HCC is usually diagnosed in its advanced stages and is more difficult to treat at this stage. Early diagnosis increases survival rate as treatment o...
This paper proposes a hybrid approach for co-channel speech segregation. HMM
(hidden Markov model) is used to track the pitches of 2 talkers. The resulting
pitch tracks are then enriched with the prominent pitch. The enriched tracks
are correctly grouped using pitch continuity. Medium frame harmonics are used
to extract the second pitch for frames...
Ultra wideband (UWB) technology has been widely used for wireless communication systems including long and short ranges. Wireless computer network is a short range communication system. The present study provides a detailed analysis and performance evaluation of an Ultra-Wideband wireless computer network in a dynamic environment. This includes mul...
paper presents an integrated applications and hardware systems of a RC Truck to detect and pinpoint the locations of explosives in desert environment as El Alamein region. This work will be based on the use of the packet oriented mobile data service that available through the global system for mobile communications. By using of this integrated tech...
Bio-informatics tools are widely used to obtain results that are hard to be obtained by physical experiments alone. In this study, we predicted the 3D structure of all human H5N1 hemagglutinin proteins with estimated precision 100%. We tested the existence of the F10 antibody epitope at their surfaces. The information gain (IG) is applied to calcul...
Artificial Bee colony algorithm is a modern swarm intelligence algorithm. This paper proposes a modified version of artificial bee colony algorithm called “Adaptive Artificial Bee Colony” (AABC). This paper compares between standard bee colony algorithm and the proposed adaptive bee colony algorithm through traveling salesman problem. Traveling sal...
Hepatocellular Carcinoma (HCC) is the one of leading causes of cancer related deaths worldwide. In most cases, the patients are first infected with Hepatitis C virus (HCV) which then progresses to HCC. HCC is usually diagnosed in its advanced stages and is more difficult to treat or cure at this stage. Early diagnosis increases survival rate as tre...
The topic of automatic recognition of facial expressions deduce a lot of researchers in the late last century and has increased a great interest in the past few years. Several techniques have emerged in order to improve the efficiency of the recognition by addressing problems in face detection and extraction features in recognizing expressions. Thi...
“With the development of media technologies, more and more videos are digitally produced, stored and distributed.
File sharing of video content on the internet, using hosting services like YouTube” which stated that the upload rate of their server is up to 20 hours of video materials per minute. Therefore, a video fingerprinting system to automatic...
Video fingerprinting is a newer research area. It is also called “content-based video copy detection” or “content-based video identification” in literature. The goal is to locate videos with segments substantially identical to segments of a query video while tolerating common artifacts in video processing. Its value as a tool to curb piracy and leg...
Image segmentation plays a preliminary and indispensable step in medical image processing. Magnetic resonance (MR) segmentation used for brain tissues extraction white matter (WM), gray matter (GM) and cerebrospinal fluids (CSF). These tissues help in many medical image segmentation applications such as radiotherapy planning, clinical diagnosis, tr...
Nowadays, mobile handsets combine the functionality of mobile phones and
PDAs. Unfortunately, mobile handsets development process has been driven by
market demand, focusing on new features and neglecting security. So, it is
imperative to study the existing challenges that facing the mobile handsets
threat containment process, and the different tech...
The malware threat for mobile phones is expected to increase with the great functionality enhancement of mobile phones. Despite the nowadays malware high abilities, there are a lot of challenges that facing the mobile threat containment process. From this perspective, this work introduces a novel effective solution for discovering handset malwares...
In the context of the recognition of vocal folds disorders, the systems based on acoustic analysis are being introduced as computer aided medical diagnosis tools due to its objectivity and noninvasive nature. Acoustic analysis is a complementary tool to those methods based on direct observation of the vocal folds by laryngoscopy; also, it can be us...
Clustering is an effective topology approach in wireless sensor network, which can increase network lifetime and scalability. Either Node Mobility or Channel fading has a negative impact on various clustering protocol. In case of Node Mobility when all sensor nodes are mobile the current nearest cluster head may be the farthest one for the sensor n...
This paper presents an efficient and innovative system for automated classification of periodontal diseases, The strength of our technique lies in the fact that it incorporates knowledge from the patients' clinical data, along with the features automatically extracted from the Haematoxylin and Eosin (H&E) stained microscopic images. Our system uses...
This paper presents a proposed model regarding Heterogeneous Data Reduction. The model reduces data over a heterogeneous environment through feature selection/extraction. The feature is selected/extracted directly from its data source and prepared without an initial integration for all data sources. After that the selected/extracted prepared featur...
This paper presents analysis and evaluation of ultra-wideband time-hopping communication system with either pulse position modulation (TH-PPM) or binary phase shift keying (TH-BPSK). The channel model has been assumed as CM1 (line-of-sight) and/or CM3 (Non-line-of-sight) along with AWGN (IEEE 802.15.3a). In addition, the impact of all system parame...
Artificial bee colony algorithm is a new swarm intelligence algorithm. It is inspired from natural bee swarm intelligence concepts to solve the optimization problems. This paper proposes a framework for artificial bee colony algorithm. This framework is problem independent. The usage of this framework in any optimization problem is the goal of this...
With the tremendous growth of information availability to users through the Web, search engines come to play ever a more critical role. However, search engines retrieve vast amount of information that is far larger than an individual capability of processing. Also enormous amount of such information are not related to user search query. The semanti...
Hand gestures enabling deaf people to communication during their daily lives rather than by speaking. A sign language is a language which, instead of using sound, uses visually transmitted gesture signs which simultaneously combine hand shapes, orientation and movement of the hands, arms, lip-patterns, body movements and facial expressions to expre...
In this paper, an automatic Keyphrase extraction algorithm (KPE algorithm) is presented for single English
document without using controlled vocabularies (corpus). It relies on n-gram filtration technique that filters complicated n-grams. The proposed algorithm proposes a ranking method to weight extracted keyphrases. The ranking method relies on t...
This paper presents a computer vision system for automatic facial expression recognition (AFER). The robust AFER system can be applied in many areas such as emotion science, clinical psychology and pain assessment it includes facial feature extraction and pattern recognition phases that discriminates among different facial expressions. In feature e...
The use of short interfering RNA (siRNA) is an emerging powerful method for gene silencing. siRNA is a short RNA sequence that targets mRNA and causes the sequence-specific degradation of the mRNA. Despite its importance, few efforts have been made to develop algorithms and computational tools to detect genes controlled by siRNA process. This paper...
Web search is one of the most challenging problems of the Internet today, seeking to provide users with search results most relevant to their information needs. The new improvements of search engines technologies have made available to the internet users an enormous amount of knowledge that can be accessed in many different ways. However, there are...
Grid resource management mainly schedules applications over the available resources. Such scheduling over a large scale distributed environment raises performance issues. Most of the current implementations paid a little consideration of performance issues that are raised at service discovery and advertisement processes.In this work an agent based...
As technology continues to increase the various formats in which medical images are created, transmitted, and analyzed, it has become more necessary to restrict the different ways in which this data is stored and formatted between the conflicting modalities. There is a significant increase in the use of medical images in clinical medicine, disease...
A methodology for elucidation of structural, functional, and mechanistic knowledge on promiscuous proteins is proposed that constitutes a workflow of integrated bioinformatics analysis. Sequence alignments with closely related homologues can reveal conserved regions which are functionally important. Scanning protein motif databases, along with seco...