
Hammam Alshazly- PhD in Computer Science
- Professor (Associate) at South Valley University
Hammam Alshazly
- PhD in Computer Science
- Professor (Associate) at South Valley University
Looking for potential collaborations!
About
57
Publications
76,750
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,333
Citations
Introduction
Currently, I work as an Associate Professor of Computer Science at Faculty of Computers and Information, South Valley University, Egypt, from which I got my B.Sc. and PhD degrees both in Computer Science. Also, I work as a Program Director of Computers and Artificial Intelligence, South Valley National University. I was a Postdoctoral Researcher for two years at the Institute for Neuro- and Bioinformatics, University of Lübeck, Germany. I also obtained my M.Sc. degree from Mumbai University.
Current institution
Additional affiliations
October 2018 - September 2023
Education
March 2015 - September 2018
June 2011 - June 2013
Publications
Publications (57)
Deep learning has recently become a viable approach for classifying Alzheimer's disease (AD) in medical imaging. However, existing models struggle to efficiently extract features from medical images and may squander additional information resources for illness classification. To address these issues, a deep three‐dimensional convolutional neural ne...
Network on chip (NoC) is an integrated communication system on chip (SoC), efficiently connecting various intellectual property (IP) modules on a single die. NoC has been suggested as an enormously scalable solution to overcome the communication problems in SoC. The performance of NoC depends on several aspects in terms of area, latency, throughput...
Security systems are the need of the hour to protect data from unauthorized access. The dissemination of confidential information over the public network requires a high level of security. The security approach such as steganography ensures confidentiality, authentication, integrity, and non-repudiation. Steganography helps in hiding the secret dat...
Automatic identity recognition from ear images is an active research topic in the biometric community. The ability to secretly acquire images of the ear remotely and the stability of the ear shape over time make this technology a promising alternative for surveillance, authentication, and forensic applications. In recent years, significant research...
The goal of gait recognition is to identify a person from a distance based on their walking style using a visual camera. However, the covariates such as a walk with carrying a bag and a change in clothes impact the recognition accuracy. This paper proposed a framework for human gait recognition based on deep learning and Bayesian optimization. The...
The COVID-19 virus's rapid global spread has caused millions of illnesses and deaths. As a result, it has disastrous consequences for people's lives, public health, and the global economy. Clinical studies have revealed a link between the severity of COVID-19 cases and the amount of virus present in infected people's lungs. Imaging techniques such...
From several perspectives, including clinical research, decision support, and public health, machine learning has become essential to the healthcare sector. In fact, machine learning has demonstrated great performance in organ segmentation, disease prediction, and medical image classification, particularly when taking into account methods for patte...
Coronavirus disease 2019 (COVID-19) is a highly contagious disease that has claimed the lives of millions of people worldwide in the last 2 years. Because of the disease's rapid spread, it is critical to diagnose it at an early stage in order to reduce the rate of spread. The images of the lungs are used to diagnose this infection. In the last 2 ye...
Within the last decade Deep Learning has become a tool for solving challenging problems like image recognition. Still, Convolutional Neural Networks (CNNs) are considered black-boxes, which are difficult to understand by humans. Hence, there is an urge to visualize CNN architectures, their internal processes and what they actually learn. Previously...
Early detection of brain tumors can save precious human life. is work presents a fully automated design to classify brain tumors. e proposed scheme employs optimal deep learning features for the classi cation of FLAIR, T1, T2, and T1CE tumors. Initially, we normalized the dataset to pass them to the ResNet101 pretrained model to perform transfer le...
Facial emotion recognition (FER) is an important research area in artificial intelligence (AI) and has many applications i.e., face authentication systems, e-learning, entertainment, deepfakes detection, etc. FER is still a challenging task due to more intra-class variations of emotions. Although prior deep learning methods have achieved good perfo...
In the recent years, petabytes of data is being generated and uploaded online every second. To successfully detect fake contents, a deepfake detection technique is used to determine whether the uploaded content is real or fake. In this paper, a convolutional neural network-based model is proposed to detect the fake face images. The generative adver...
Sentiment analysis of news headlines is an important factor that investors consider when making investing decisions. We claim that the sentiment analysis of financial news headlines impacts stock market values. Hence financial news headline data are collected along with the stock market investment data for a period of time. Using Valence Aware Dict...
The future of wireless technology is moving towards millimeter wave bands due to a surge in the use of wearable gadgets in current wireless bands. The 60 GHz band is unlicensed around the world and has gathered high research interest. At this band, the atmospheric absorption is very high, which results in short-range communication. High gain antenn...
The advancement of wireless technology has led to an exponential increase in the usage of smart wearable devices. Current wireless bands are getting more congested, and we are already seeing a shift towards millimeter wave bands. This paper proposes a design for a millimeter wave textile antenna for body-centric communications. The antenna has a qu...
The advancement of wireless technology has led to an exponential increase in the usage of smart wearable devices. Current wireless bands are getting more congested, and we are already seeing a shift towards millimeter wave bands. This paper proposes a design for a millimeter wave textile antenna for body-centric communications. The antenna has a qu...
The future of wireless technology is moving towards millimeter-wave bands due to a surge in the use of wearable gadgets in current wireless bands. e 60 GHz band is unlicensed around the world and has gathered high research interest. At this band, the atmospheric absorption is very high, which results in short-range communication. High gain antennas...
Coronavirus disease (COVID-19) is a viral infection caused by SARS-CoV-2. The modalities such as computed tomography (CT) have been successfully utilized for the early stage diagnosis of COVID-19 infected patients. Recently, many researchers have utilized deep learning models for the automated screening of COVID-19 suspected cases. An ensemble deep...
Information extraction plays a vital role in natural language processing, to extract named entities and events from unstructured data. Due to the exponential data growth in the agricultural sector, extracting significant information has become a challenging task. Though existing deep learning-based techniques have been applied in smart agriculture...
Brain tumors are the most common and aggressive illness, with a relatively short life expectancy in their most severe form. Thus, treatment planning is an important step in improving patients’ quality of life. In general, image methods such as computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound images are used to assess tumor...
This paper proposes a multivariate and online prediction of stock prices via the paradigm of kernel adaptive filtering (KAF). The prediction of stock prices in traditional classification and regression problems needs independent and batch-oriented nature of training. In this article, we challenge this existing notion of the literature and propose a...
The COVID-19 pandemic has caused drastic changes across the globe, affecting all areas of life. This paper provides a comprehensive study on the influence of COVID-19 in various fields such as the economy, education, society, the environment, and globalization. In this study, both the positive and negative consequences of the COVID-19 pandemic on e...
Quality-of-service (QoS) is the term used to evaluate the overall performance of a service. In healthcare applications, efficient computation of QoS is one of the mandatory requirements during the processing of medical records through smart measurement methods. Medical services often involve the transmission of demanding information. Thus, there ar...
The vehicular ad hoc network (VANET) has traditional routing protocols that evolved from mobile ad hoc networks (MANET). The standard routing protocols of VANET are geocast, topology, broadcast, geographic, and cluster-based routing protocols. They have their limitations and are not suitable for all types of VANET traffic scenarios. Hence, metaheur...
The network-on-chip (NoC) technology is frequently referred to as a front-end solution to a back-end problem. The physical substructure that transfers data on the chip and ensures the quality of service begins to collapse when the size of semiconductor transistor dimensions shrinks and growing numbers of intellectual property (IP) blocks working to...
Degree attestation verification and traceability are complex one-to-one processes between the Higher Education Commission (HEC) and universities. The procedure shifted to the digitalized manner, but still, on a certain note, manual authentication is required. In the initial process, the university verified the degree and stamp seal first. Then, a p...
Accurate and early detection of machine faults is an important step in the preventive maintenance of industrial enterprises. It is essential to avoid unexpected downtime as well as to ensure the reliability of equipment and safety of humans. In the case of rotating machines, significant information about machine’s health and condition is present in...
Accurate and early detection of machine faults is an important step in the preventive maintenance of industrial enterprises. It is essential to avoid unexpected downtime as well as to ensure the reliability of equipment and safety of humans. In the case of rotating machines, significant information about machine’s health and condition is present in...
Nowadays, due to the increase in information resources, the number of parameters and complexity of feature vectors increases. Optimization methods offer more practical solutions instead of exact solutions for the solution of this problem. The Emperor Penguin Optimizer (EPO) is one of the highest performing meta-heuristic algorithms of recent times...
Information extraction plays a vital role in natural language processing , to extract named entities and events from unstructured data. Due to the exponential data growth in the agricultural sector, extracting significant information has become a challenging task. Though existing deep learning-based techniques have been applied in smart agriculture...
Nowadays, the most challenging and important problem of computer vision is to detect human activities and recognize the same with temporal information from video data. The video datasets are generated using cameras available in various devices that can be in a static or dynamic position and are referred to as untrimmed videos. Smarter monitoring is...
This paper presents ear recognition models constructed with Deep Residual Networks (ResNet) of various depths. Due to relatively limited amounts of ear images we propose three different transfer learning strategies to address the ear recognition problem. This is done either through utilizing the ResNet architectures as feature extractors or through...
In this paper we propose two novel deep convolutional network architectures, CovidResNet and CovidDenseNet, to diagnose COVID-19 based on CT images. The models enable transfer learning between different architectures, which might significantly boost the diagnostic performance. Whereas novel architectures usually suffer from the lack of pretrained w...
Diabetic retinopathy (DR) is a diabetes complication that affects the eye and can cause damage from mild vision problems to complete blindness. It has been observed that the eye fundus images show various kinds of color aberrations and irrelevant illuminations, which degrade the diagnostic analysis and may hinder the results. In this research, we p...
Seagull Optimization Algorithm (SOA) is a metaheuristic algorithm that mimics the migrating and hunting behaviour of seagulls. SOA is able to solve continuous real-life problems, but not to discrete problems. The eight different binary versions of SOA are proposed in this paper. The proposed algorithm uses four transfer functions, S-shaped and V-sh...
A k-means algorithm is a method for clustering that has already gained a wide range of acceptability. However, its performance extremely depends on the opening cluster centers. Besides, due to weak exploration capability, it is easily stuck at local optima. Recently, a new metaheuristic called Moth Flame Optimizer (MFO) is proposed to handle comple...
This paper introduces two novel deep convolutional neural network (CNN) architectures for automated detection of COVID-19. The first model, CovidResNet, is inspired by the deep residual network (ResNet) architecture. The second model, CovidDenseNet, exploits the power of densely connected convolutional networks (DenseNet). The proposed networks are...
This paper explores how well deep learning models trained on chest CT images can diagnose COVID-19 infected people in a fast and automated process. To this end, we adopted advanced deep network architectures and proposed a transfer learning strategy using custom-sized input tailored for each deep architecture to achieve the best performance. We con...
This paper explores how well deep learning models trained on chest CT images can diagnose COVID-19 infected people in a fast and automated process. To this end, we adopt advanced deep network architectures and propose a transfer learning strategy using custom-sized input tailored for each deep architecture to achieve the best performance. We conduc...
Extraction and description of image features is an active research topic and important for several applications of computer vision field. This paper presents a new noise-tolerant and rotation-invariant local feature descriptor called robust local oriented patterns (RLOP). The proposed descriptor extracts local image structures utilizing edge direct...
This paper employs state-of-the-art Deep Convolutional Neural Networks (CNNs), namely AlexNet, VGGNet, Inception, ResNet and ResNeXt in a first experimental study of ear recognition on the unconstrained EarVN1.0 dataset. As the dataset size is still insufficient to train deep CNNs from scratch, we utilize transfer learning and propose different dom...
Ear recognition is an active research area in the biometrics community with the ultimate goal to recognize individuals effectively from ear images. Traditional ear recognition methods based on handcrafted features and conventional machine learning classifiers were the prominent techniques during the last two decades. Arguably, feature extraction is...
The recognition performance of visual recognition systems is highly dependent on extracting and representing the discriminative characteristics of image data. Convolutional neural networks (CNNs) have shown unprecedented success in a variety of visual recognition tasks due to their capability to provide in-depth representations exploiting visual im...
Identity recognition using local features extracted from ear images has recently attracted a great deal of attention in the intelligent biometric systems community. The rich and reliable information of the human ear and its stable structure over a long period of time present ear recognition technology as an appealing choice for identifying individu...
Feature keypoint descriptors have become indispensable tools and have been widely utilized in a large number of computer vision applications. Many descriptors have been proposed in the literature to describe regions of interest around each keypoint and each claims distinctiveness and robustness against certain types of image distortions. Among thes...
Recently, intensive research efforts are conducted on the human ear as a promising biometric modality for identity recognition. However, one of the main challenges facing ear recognition systems is to find robust representation for the image information that is invariant to different imaging variations. Recent studies indicate that using the distri...
In this presentation, a comprehensive performance evaluation of the current state-of-the-art binary descriptors; namely, BRIEF, ORB, BRISK, FREAK, and LATCH is presented in the context of image matching. This performance evaluation highlights several points regarding the performance characteristics of binary descriptors under various geometric and...
Efficient and compact representation of local image patches in the form of features descriptors that are distinctive/robust as well as fast to compute and match is an essential and inevitable step for many computer vision applications. One category of these representations is the binary descriptors which have been shown to be successful alternative...
Feature detection, description
and matching
are essential components
of various computer vision applications, thus they have received a considerable attention in the last decades. Several feature detectors and descriptors have been proposed in the literature with a variety of definitions for what kind of points in an image is potentially interestin...
Embedded systems have received significant attention during the last decade mainly because of their numerous applications. They can be found in robotics, smart buildings, fabrication equipments as well as medical, automation, industrial, commercial, military applications. Most of the modern embedded systems are based on microcontrollers. In this pa...
The increasing demands on robot automation and robots that work independently without human interaction necessitate the need for remote controllers that enable communications between the user and the robot. However, these controllers must be wireless in order to give the robot its movement freedom. The need for wireless communication protocol desig...
Face detection as one of the most challenging tasks in computer vision has received a lot of attention in recent decades due to its wide range of use in face based image analysis. In this paper, we propose an efficient approach for face detection that efficiently combines generalized Hough transform within random decision forests framework. In this...
Presentation of (Effect of Hough Forests Parameters on Face Detection: An Empirical Analysis)