Hala Zayed

Hala Zayed
Egypt University of Informatics (EUI)

professor

About

84
Publications
35,668
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,258
Citations

Publications

Publications (84)
Article
Full-text available
Due to the popularity of digital games, there is a growing interest in using games as therapeutic interventions. The ability of games to capture attention can be beneficial to distract patients from pain. In this paper, we investigate the impact of visual parameters (color, shapes, and animation) on users’ awareness of their surroundings in virtual...
Article
Context The most popular mobile platforms, Android and iOS, are traditionally developed using native programming languages—Java and Kotlin for Android, and Objective‐C followed by Swift for iOS, respectively. Due to their popularity, there is always a demand to convert applications written for one of these two platforms to another. Cross‐platform m...
Article
Full-text available
span lang="EN-US">Social media impacts society whether these impacts are positive or negative, or even both. It has become a key component of our lives and a vital news resource. The crisis of covid-19 has impacted the lives of all people. The spread of misinformation causes confusion among individuals. So automated methods are vital to detect the...
Article
Full-text available
p> Augmented reality overlays virtual content on the physical world, displaying location-based information more efficiently. Tracking is a trace detail of the location recorded, either by taking a reading based on a set time interval, set distance, and change in direction by more than a certain angle, or a combination of these. Tracking is divided...
Article
Full-text available
Skin cancer is the most annoying type of cancer diagnosis according to its fast spread to various body areas, so it was necessary to establish computer-assisted diagnostic support systems. State-of-the-art classifiers based on convolutional neural networks (CNNs) are used to classify images of skin cancer. This paper tries to get the most accurate...
Preprint
Full-text available
Recently, augmented reality technology became more stable and integrated into our daytime applications. Augmented reality adds virtual content to enrich physical environments. Augmented reality uses tracking techniques to capture environments features. The tracking is classified into two types: outdoor and indoor tracking. Currently, outdoor tracki...
Article
Full-text available
The integration of biometric recognition with smartphones becomes necessary for increasing security, especially in financial transactions such as online payment. Vein recognition of dorsal hand is outstanding than other methods like palm, finger, and wrist as it has a wide area to be captured and does not have any wrinkles. Most of the current syst...
Article
Full-text available
Virtual reality refers to the technology used to create multi-sensory three-dimensional environments that can be navigated, manipulated, and interacted by a user. This paper's objective is to categorize the most common areas that use virtual reality (VR) for managing pain (psychological and physical). To our knowledge, this is the first survey that...
Article
This paper presents a modified Neutron Computerized Tomography (NCT) reconstruction method to obtain an effective and accurate 3D volume rendering with more cleared details that achieve the optimization for contrast, raise the resolution, real view and reduce noise. This proposed method depends on dealing with the slice duplication in case of full...
Article
Social media presence is a crucial portion of our life. It is considered one of the most important sources of information than traditional sources. Twitter has become one of the prevalent social sites for exchanging viewpoints and feelings. This work proposes a supervised machine learning system for discovering false news. One of the credibility de...
Article
Full-text available
Detecting knives in surveillance videos are very urgent for public safety. In general, the research in identifying dangerous weapons is relatively new. Knife detection is a very challenging task because knives vary in size and shape. Besides, it easily reflects lights that reduce the visibility of knives in a video sequence. The reflection of light...
Article
Full-text available
Vein detection is an important issue for the medical field. There are some commercial devices for detecting veins using infrared radiation. However, most of these commercial solutions are cost-prohibitive. Recently, veins detection has attracted much attention from research teams. The main focus is on developing real-time systems with low-cost hard...
Article
Full-text available
This paper presents a modified Neutron Computerized Tomography reconstruction method for solving three main problems facing the Inverse Radon Transform based reconstruction method. The three problems are poor contrast of the reconstructed slice, the duplication of slice and the error in the center of rotation position in the images. The paper aims...
Article
Blood disease detection and diagnosis using blood cells images is an interesting and active research area in both the computer and medical fields. There are many techniques developed to examine blood samples to detect leukemia disease, these techniques are the traditional techniques and the deep learning (DL) technique. This article presents a surv...
Article
Full-text available
Leukemia is a fatal disease that threatens the lives of many patients. Early detection can effectively improve its rate of remission. This paper proposes two automated classification models based on blood microscopic images to detect leukemia by employing transfer learning, rather than traditional approaches that have several disadvantages. In the...
Article
Cloud computing has gained increased interest in the last few years, where an increasing number of providers are converging to such a promising platform. However, the security issues are still a big concern in the cloud, where authentication is a major one. Much research has been conducted to secure the authentication, where some of them used biome...
Article
Digital image forgery is a serious problem of an increasing attention from the research society. Image splicing is a well-known type of digital image forgery in which the forged image is synthesized from two or more images. Splicing forgery detection is more challenging when compared with other forgery types because the forged image does not contai...
Research
Full-text available
In the era of IoT, the energy consumption of sensor nodes in WSN is one of the main challenges. It is crucial to reduce energy consumption due to the limited battery life of the sensor nodes. Recently, Zone-based Energy-Aware data coLlection (ZEAL) routing protocol is proposed to improve energy consumption and data delivery. In this paper, an enhan...
Article
Splicing image forgery detection has become a significant research subject in multimedia forensics and security due to its widespread use and its hard detection. Many algorithms have already been executed on the image splicing. The existing algorithms may be affected by some problems, such as high feature dimensionality and low accuracy with high f...
Article
Full-text available
The immense crime rates resulting from using pistols have led governments to seek solutions to deal with such terrorist incidents. These incidents have a negative impact on public security and cause panic among citizens. From this point, facing a pandemic of weapon violence has become an important research topic. One way to reduce this kind of viol...
Article
Full-text available
Sign language (SL) is the hands spoken language assisting the deaf to understand each other. Understanding SL by vocal people not only paves the way to contribute deaf and dumb in the workforce, but also provides a fertile environment for analyzing the human motion and gesturing. Consequently, translating SL sentence into written or spoken language...
Article
This paper presents a proposed procedure for neutron radiography image enhancement through studying the effect of the projection exposure time on the quality of Neutron Computerized Tomography (NCT) image. A sample was exposure at the Egyptian Second Research Reactor (ETRR-2) NCT facility with projection exposure time varying from one second to six...
Article
Abstract—The Blind signature is similar to digital signature except that a message is signed by a signer without knowing the content of the message. It is one of the most famous cryptographic techniques in E-voting system (EVS) that guarantee the anonymity of the voters. In this paper, first, we analyze a recently introduced blind signature scheme...
Article
Full-text available
This paper presents an approach for age estimation based on faces through classifying facial images into predefined age-groups. However, a task such as the one at hand faces several difficulties because of the different aspects of every single person. Factors like exposure, weather, gender and lifestyle all come into play. While some trends are sim...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) has emerged as a powerful technology, which has multiple applications such as health, military surveillance, home applications, and many more. WSN consists of multiple numbers of nodes deployed randomly in a remote environment. Each node has a sensing device to capture data from the environment. Processing units are...
Conference Paper
Full-text available
Breast Cancer is a harmful disease that has caused millions of women deaths. There are a huge number of publications on breast cancer research which offers a good source of information. Identifying breast cancer biomarkers is not a trivial task. There are many approaches used to identify and extract the needed information more efficiently from stru...
Conference Paper
CITATIONS 0 READS 509 3 authors, including: Some of the authors of this publication are also working on these related projects: ABSTRACT Wireless Sensor Networks (WSNs) has emerged as a powerful technology, which has multiple applications such as health, military surveillance, home applications, and many more. WSN consists of multiple numbers of no...
Article
Recently, automatic age estimation has gained an increasing interest from the research community because of its relevance to many applications in different fields such as law enforcement, security control, and human-computer interaction. However, despite advances in automatic age estimation, it remains a challenging problem due to a set of challeng...
Article
Full-text available
Sign language recognition system (SLRS) is one of the application areas of human computer interaction (HCI) where signs of hearing impaired people are converted to text or voice of the oral language. This paper presents an automatic visual SLRS that translates isolated Arabic words signs into text. The proposed system has four main stages: hand seg...
Article
Full-text available
In our today’s life, it is obvious that cloud computing is one of the new and most important innovations in the field of information technology which constitutes the ground for speeding up the development in great size storage of data as well as the processing and distribution of data on the largest scale. In other words, the most important interes...
Conference Paper
Full-text available
Content-based Image Retrieval (CBIR) is a term referring to looking for digital images by analyzing content of images rather than its metadata. CBIR system retrieves the image via low-level features such as color, texture and shape. In this work, we propose an improved CBIR system that retrieves images from a database based on the semantic features...
Conference Paper
Full-text available
The analysis of human activities is one of the most interesting and important open issues for the automated video surveillance community. In order to understand the behaviors of humans, a higher level of understanding is required, which is generally referred to as activity recognition. While traditional approaches rely on 2D data like images or vid...
Conference Paper
Full-text available
As road networks become more congested, traffic surveillance using computer vision techniques is increasingly important. Traffic surveillance can help in improving road network efficiency, rerouting traffic when accidents occur and minimizing delays. Although, there are many algorithms developed to detect and track moving vehicles in daytime, only...
Article
Full-text available
We present a new approach for face recognition system. The method is based on 2D face image features using subset of non-correlated and Orthogonal Gabor Filters instead of using the whole Gabor Filter Bank, then compressing the output feature vector using Linear Discriminant Analysis (LDA). The face image has been enhanced using multi stage image p...
Article
Full-text available
Recognizing human activity is one of the important areas of computer vision research today. It plays a vital role in constructing intelligent surveillance systems. Despite the efforts in the past decades, recognizing human activities from videos is still a challenging task. Human activity may have different forms ranging from simple actions to comp...
Conference Paper
Full-text available
Particle filter has grown to be a standard tool for solving visual tracking problems in real world applications. One of the critical tasks in object tracking is the tracking of fast-moving objects in complex environments, which contain cluttered background and scale change. In this paper, a new tracking algorithm is presented by using the joint col...
Article
Full-text available
Traffic surveillance using computer vision techniques is an emerging research area. Many algorithms are being developed to detect and track moving vehicles in daytime in effective manner. However, little work is done for nighttime traffic scenes. For nighttime, vehicles are identified by detecting and locating vehicle headlights and rear lights. In...
Article
Full-text available
Traffic surveillance plays a vital role in computer vision and Intelligent Transportation Systems (ITS). Image analysis provides several effective techniques to detect moving objects in images. Thus, it has been extensively used for traffic monitoring systems. Recently, the problem of detecting and tracking vehicles is an important emerging researc...
Article
Full-text available
The eye is one of the sense organs that can give users better interaction closer to their need by observing the change of the eyes (open or closed). It is considered as a rich source for gathering information on our daily life. So, it is used in computer science area, especially in human computer interaction. This paper proposes a new system for de...
Article
Full-text available
Shadow detection and removal has had great interest in computer vision especially in outdoor environments. It is an important task for visual tracking, object recognition, and many other important applications. One of the fundamental challenges for accurate tracking is achieving invariance to shadows. Two or more separate objects can appear to be c...
Article
Full-text available
Human behavior Analysis, using visual information in a given image or sequence of images, has been an active area of research in computer vision community. The image captured by conventional camera does not provide the suitable information to perform comprehensive analysis. However, depth sensors have recently made a new type of data available. Mos...
Article
Full-text available
Robust tracking of non-rigid objects is a challenging task. Particle filter is a powerful tool for vision tracking based on sequential Monte Carlo framework and proved very successful for non-linear and non-Gaussian estimation problem. This paper proposes a tracking algorithm based on particle filter and optimized Likelihood. Colour distributions a...
Conference Paper
Full-text available
Identifying moving objects from a video scene is a fundamental and critical task in object tracking. However, shadows extracted along with the objects can result in large errors in object localization and recognition. Despite many attempts, the problem remains largely unsolved due to several challenges. Since cast shadows can be as big as the actua...
Conference Paper
Full-text available
Human- Computer Interaction (HCI) systems are designed for disabled people who are unable to move or control any parts of their bodies except for their eyes. The idea behind our proposed system is detecting eye blink feature from a video with a high degree of accuracy. Our proposed system is considered as an alternative input modality enables peopl...
Article
The purpose of this study is to develop an intelligent remote detection and diagnosis system for breast cancer based on cytological images. First, this paper presents a fully automated method for cell nuclei detection and segmentation in breast cytological images. The locations of the cell nuclei in the image were detected with circular Hough trans...
Article
Breast cancer detection and segmentation of cytological images is the standard clinical practice for the diagnosis and prognos is of breast cancer.This paper presents a fully automated method for cell nuclei detection and segmentation in breast cytological images. The images are enhanced with histogram stretching and contrast-limited adaptive histo...
Article
Full-text available
Recently, keystroke dynamics increasingly being a field of interest for researchers, where users can access different systems through their typing styles, which increases the level of security. This paper tends to implement a robust keystroke dynamics system; it tends to solve the problem of samples variations by using an adaptive threshold. The pr...
Conference Paper
Full-text available
With the large number of surveillance cameras now in operation, both in public placesand in commercial centers, significant research efforts have been invested in attempts to automate surveillance video analysis. The goal of visual surveillance is not only to put cameras in the place of human eyes, but also to accomplish the entire surveillance tas...
Conference Paper
Full-text available
Particle Filters (PFs), are widely used where the system is non Linear and non Gaussian. Choosing the importance proposal distribution is a key issue for solving nonlinear filtering problems. Practical object tracking problems encourage researchers to design better candidate for proposal distribution in order to gain better performance. In this cor...
Article
Full-text available
The purpose of this paper is to develop an intelligent diagnosis system for breast cancer classification. Artificial Neural Networks and Support Vector Machines were being developed to classify the benign and malignant of breast tumor in fine needle aspiration cytology. First the features were extracted from 92 FNAC image. Then these features were...
Article
Full-text available
This paper proposes a new region-based image retrieval technique called Principal Regions Image Retrieval (PRIR). This technique starts by segmenting an image to the most general principal regions and applies a fuzzy feature histogram to describe the color and texture properties of each segmented region. The proposed approach starts by generating a...
Conference Paper
Full-text available
In the last ten years, skin detection has been a milestone in most of the computer vision applications. But till now, there is no robust skin detector. The different degrees of the skin tone color are the obstacle that faces skin detection process. This paper proposes an adaptive skin modeling and detection technique which is based on face skin ton...
Article
Full-text available
Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. The sophisti-cation of network attacks, as well as their severity, has also increased recently. As such, more and more organizations are becoming vulnerable to attack. The aim of this research is to classify network attacks using...
Conference Paper
Full-text available
Though Arabic language is a widely spoken language, research done in the area of Arabic Speech Recognition is limited when compared to other similar languages. Also, while the accuracy of speaker dependent speech recognizers has nearly reached to 100%, the accuracy of speaker independent speech recognition systems is still relatively poor. This pap...