Gouda I. Salama

Gouda I. Salama
Military Technical College | MTC

Doctor of Engineering

About

64
Publications
22,328
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
719
Citations
Citations since 2016
27 Research Items
557 Citations
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100

Publications

Publications (64)
Preprint
Full-text available
In recent years, as social media has grown in popularity, people have gained the ability to freely share their views. However, this may lead to users' conflict and hostility, resulting in unattractive online environments. Hate speech relates to using expressions or phrases that are violent, offensive, or insulting to a minority of people. The numbe...
Article
Full-text available
Recent studies show that social media has become an integral part of everyone's daily routine. People often use it to convey their ideas, opinions, and critiques. Consequently, the increasing use of social media has motivated malicious users to misuse online social media anonymity. Thus, these users can exploit this advantage and engage in socially...
Article
Full-text available
Nowadays, the increasing demands for synthetic aperture radar images are of great importance in both marine and terrestrial applications, due to their availability day and night and in all-weather conditions. Moreover, synthetic aperture radar images are characterized by much more important information than that introduced by optical images. The si...
Preprint
Recent studies show that social media has become an integral part of everyone's daily routine. People often use it to convey their ideas, opinions, and critiques. Consequently, the increasing use of social media has motivated malicious users to misuse online social media anonymity. Thus, these users can exploit this advantage and engage in socially...
Presentation
Full-text available
this presentation describes Spark architecture for sentiment analysis, also classification algorithms utilized in our suggested system . Moreover, data preprocessing steps of training are explained. Finally, based on the obtained results, analysis is performed in order to define which of the algorithms performs better for tweets classification.
Article
Full-text available
In the last few years, Sentiment Analysis regarding customers' reviews in order to comprehend the opinion polarity on social media has received considerable attention. However, the improvement of deep learning for sentiment analysis relating to customer reviews in Arabic language has received less attention. In fact, many users post and jot down th...
Article
Full-text available
Keypoint matching can be defined as locating the position of a particular point in two images precisely. Recently, keypoint descriptors have taken a great effect targeting to be powerfully invariant to rotation, scale and translation for improving target detection. The detection task is carried out by a reference-scene image matching to localize th...
Thesis
Full-text available
Today, social network sites are considered one of the most significant sources of broadcasts information to the communities, in addition to, it permits users to communicate with each other and share their thoughts and experiences, the analysis of such this data is important and can be used in various purposes and That is what makes sentiment analys...
Conference Paper
Full-text available
The Advanced Encryption Standard (AES) is strongly used in different security levels of data communication as it has higher efficiency and stronger security compared with other encryption algorithms. Graphics Processing Unit (GPU) is one of the most important platforms used for enhancing AES algorithm Performance. Unfortunately, the AES actual thro...
Article
Full-text available
Image forensics is an important area of research used to indicate if a particular image is original or subjected to any kind of tampering. Images are essential part of judgment in tribunals. For forensic analysis, image forgery-detection techniques used to identify the forged images. In this paper, an effective algorithm to indicate Copy Move Forge...
Article
Full-text available
The task of extracting the used feature vector in mining tasks (classification, clustering …etc.) is considered the most important task for enhancing the text processing capabilities. This paper proposes a novel approach to be used in building the feature vector used in web text document classification process; adding semantics in the generated fea...
Article
Dimensionality reduction of feature vector size plays a vital role in enhancing the text processing capabilities; it aims in reducing the size of the feature vector used in the mining tasks (classification, clustering, etc.). This paper proposes an efficient approach to be used in reducing the size of the feature vector for web text document classi...
Conference Paper
Full-text available
Dimensionality reduction of feature vector size plays a vital role in enhancing the text processing capabilities; it aims in reducing the size of the feature vector used in the mining tasks (classification, clustering... etc.). This paper proposes an efficient approach to be used in reducing the size of the feature vector for web text document clas...
Conference Paper
Full-text available
The data on the web is generally stored in structured, semi-structured and un- structured formats; from the survey the most of the information of an organization is stored in unstructured textual form .so, the task of categorizing this huge number of unstructured web text documents has become one of the most important tasks when dealing with web. C...
Article
The data on the web is generally stored in structured, semi-structured and un- structured formats; from the survey the most of the information of an organization is stored in unstructured textual form .so, the task of categorizing this huge number of unstructured web text documents has become one of the most important tasks when dealing with web. C...
Article
Full-text available
The data on the web is generally stored in structured, semi-structured and un- structured formats; from the survey the most of the information of an organization is stored in unstructured textual form .so, the task of categorizing this huge number of unstructured web text documents has become one of the most important tasks when dealing with web. C...
Article
Full-text available
In this paper, a lightweight fingerprint-matching algorithm (4 kB) is proposed. This algorithm is based on matching features that are invariant to major transformations like translation and rotation. The algorithm can be executed on devices with low computing power and limited memory size. Thus, the matching algorithm is implemented on smartcard ov...
Conference Paper
Full-text available
In this paper, a new parallel scheme for the deblocking fil- ter (DF) in high efficiency video coding (HEVC) is proposed. This scheme is based on a parallel-straight processing order that improves the performance of HEVC DF. One of the chal- lenges in HEVC is coding time due to computational com- plexity. Deblocking in HEVC is responsible for nearl...
Article
Full-text available
In this paper, the implementation method for encoding the high resolution videos using high efficiency video coding (HEVC) standard is introduced with a new approach. The HEVC standard, successor to the H.264/AVC standard, is more efficient than the H.264/AVC standard in the encoding high resolution videos. HEVC has been designed to focus on increa...
Article
Full-text available
In this paper, we present an adaptive deblocking filter to improve the video quality for high efficiency video coding (HEVC) scheme. The HEVC standard is a hybrid coding scheme using block-based prediction and transform encoding/decoding. At the decoding step, the boundary of any two adjacent blocks causes visual discontinuities called blocking art...
Article
Super Resolution (SR) is the process of enhancing the visual quality of a sequence of observed low-resolution images by constructing a single high-resolution image. This paper is interested in the super resolution of multi-focus low-resolution images. It is assumed that, the images are acquired by low precision optics with limited depth of focus an...
Article
Microcontrollers have become a widely accepted architecture for highly complex embedded systems on a single chip (SoC). It consists of deeply embedded heterogeneous components with poor accessibility makes their testing process a difficult task using hardware based self-test (HBST). Software-based self-test (SBST) is considered to be a promisi...
Conference Paper
Image enhancement techniques can be classified into two categories as spatial domain and frequency domain. This paper presents hardware implementation of a five image enhancement algorithms in spatial domain using FPGA technology. These algorithms are: median filter, contrast stretching, histogram equalization, negative image transformation and pow...
Conference Paper
Full-text available
This paper presents a comparison among the different classifiers decision tree (J48), Multi-LayerPerception (MLP), Naive Bayes (NB), Sequential Minimal Optimization (SMO), and Instance Based for K-Nearest neighbor (IBK) on three different databases of breast cancer (Wisconsin Breast Cancer (WBC), Wisconsin Diagnosis Breast Cancer (WDBC) and Wiscons...
Conference Paper
The need for providing delicate authentication-based systems via biometric-based methods is increasing by the time. This importance is even more sustained for customer-oriented applications, especially the web-based systems. Having this authentication mechanism provides user friendly solutions for login that help the users to avoid thinking about m...
Conference Paper
Full-text available
During the past years, face and gait recognition in video have received significant attention. Consequently, their recognition problems have challenged due to largely varying appearances and highly complex pattern distributions. However, the complementary properties of these two biometrics suggest fusion of them. Face recognition is more reliable w...
Conference Paper
Full-text available
Image registration is the process of finding a transformation that aligns one image to another. Most researchers who are interested in the registration task don't take into consideration the out-of-focus phenomenon that might affect the accuracy of the registration process. Nevertheless, they suggest that the images are well focused. Consequently,...
Article
Full-text available
Most real-life biometric systems are still unimodal. Unimodal biometric systems perform person recognition based on a single source of biometric information. Such systems are often affected by some problems such as noisy sensor data, nonuniversality and Spoof attacks. Multibiometrics overcomes these problems. Multibiometric systems represent the fu...
Article
The need for providing delicate authentication-based systems via biometric-based methods is increasing by the time. This importance is even more sustained for customer-oriented applications, especially the web-based systems. Having this authentication mechanism provides user friendly solutions for login that help the users to avoid thinking about m...
Conference Paper
Full-text available
This paper presents a new partition fusion technique for multi-focus images based on a no-reference blur metric. The no-reference blur metric is used to evaluate the amount of blur in images whereby, in many practical applications the original images are not available. The proposed algorithm is considered as a region based fusion technique, in whic...
Conference Paper
Full-text available
Ear recognition system is one of the biometric methods used to identify people such as face, iris, finger print, … etc. In this paper we aim to improve the accuracy of the ear recognition system through combining single features extraction methods such as (PCA, LDA, and DCT). The combination technique based on parallel combination of two different...
Conference Paper
Full-text available
The purpose of the work described in this paper is to provide an intrusion detection system (IDS), by applying genetic algorithm (GA) to network intrusion detection system. Parameters and evolution process for GA are discussed in detail and implemented. This approach uses information theory to filter the traffic data and thus reduce the complexity....
Conference Paper
Full-text available
The purpose of the work described in this paper is to provide an intrusion detection system (IDS), by applying genetic algorithm (GA) to network intrusion detection system. Parameters and evolution process for GA are discussed in detail and implemented. This approach uses information theory to filter the traffic data and thus reduce the complexity....
Article
Full-text available
The purpose of the work described in this paper is to provide an intrusion detection system (IDS), by applying genetic algorithm (GA) to network intrusion detection system. Parameters and evolution process for GA are discussed in detail and implemented. This approach uses information theory to filter the traffic data and thus reduce the complexity....
Article
The prevalence and ease of packet sniffing and other techniques for capturing packets on an IP based network makes encryption a necessity for VOIP(Voice Over Internet Protocol). Security in VOIP is concerned both with protecting what a person says(by Encryption) as well as to whom the person is speaking(by Authentication). IPsec can be used to achi...
Conference Paper
Full-text available
This paper presents a steganographic model which utilizes cover video files to conceal the presence of other sensitive data regardless of its format. The model presented is based on pixel-wise manipulation of colored raw video files to embed the secret data. The secret message is segmented into blocks prior to being embedded in the cover video. The...
Conference Paper
Full-text available
This paper presents a novel video compression technique tailored to achieve high compression ratio for synthetic and thermal video sequences while maintaining a low level of complexity. The technique relies on the segmentation of each frame into a number of regions. The contours of these regions are subsequently compressed using the entropy encodin...
Article
Full-text available
At all times people have wished to have the possibility to communicate in secrecy so as to allow nobody to overhear their messages. A new AES-like cipher, key-dependent Advanced Encryption Standard algorithm, KAES is proposed, to vanish any suspicion of a trapdoor being built into the cipher and to expand the key-space to strength it against known...
Article
The inaccuracy of biometric testing, concerning face recognition, makes it a hard problem to solve. Along with today's advance in many technological fields, there are still various critical issues that affect the performance of real-time face recognition biometric systems. In this paper we introduce a new multi-agent model which will enhance the pe...

Network

Cited By