
Hesham ElmahdyCairo University | CU · Department of Information Technology (IT)
Hesham Elmahdy
Ph. D. in Computers Science and Information Systems, University of Mississippi, USA
About
44
Publications
18,834
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
277
Citations
Citations since 2017
Introduction
Additional affiliations
December 2011 - present
Publications
Publications (44)
Human’s health information is considered momentous information, which is represented in medical systems. The amount of medical image information available for analysis is increasing with the modern medical image devices and biomedical image processing techniques. To prevent data modification from unauthorized persons from an insecure network, medic...
Introduction:
Contemporary stethoscope has limitations in diagnosis of chest conditions, necessitating further imaging modalities.
Methods:
We created 2 diagnostic computer aided non-invasive machine-learning models to recognize chest sounds. Model A was interpreter independent based on hidden markov model and mel frequency cepstral coefficient...
Genomic variation can cause several types of human cancer so the selection of significant genes from the DNA copy number variations (CNVs) data carriages a hard challenge to researchers because of the high-dimensionality of features and multiclass categories being involved. Machine learning has important role in genomic variation it can help for pr...
Heart sounds recognition is essential for heart defects diagnosis. Diagnosis of structural heart defects is not always possible using the contemporary stethoscope and need further assessment using high cost devices such as X-ray, electrocardiogram (ECG), echocardiography (ECHO) and computed tomography (CT)). Automatic computer assisted auscultation...
Diagnosis of congenital cardiac defects is challenging, with some being diagnosed during pregnancy while others are diagnosed after birth or later on during childhood. Prompt diagnosis allows early intervention and best prognosis. Contemporary diagnosis relies upon the history, clinical examination, pulse oximetery, chest X-ray, electrocardiogram (...
For the last few years, mobile usage has grown significantly especially smartphones. Most people decided dispensing the use of their personal computers (i.e. desktops or laptops) and use mobile device instead. Because of mobile limitations, such as limited battery life, limited size of memory, and limited processor's power, the need for Mobile Clou...
Biometrics have lately been receiving attention in popular media. Biometrics deal with identification of individuals based on their physiological or behavioral characteristics. Biometrics will become one of the most important ways of the identification technology. Ear seems to be a good candidate solution since ear is visible, Ear images are easy t...
Wireless Body area Networks (WBANs)- groups of sensors deployed inside a human body- are envisioned to improve the healthcare domain by continuously monitoring and reporting patient's health to the health care systems. However, the nature of openly deployed sensor nodes, coupled with the lack of security, make it easy for intruders to attack WBANs....
This issue (DOI: 10.13140/RG.2.1.4405.4488) includes several papers on image processing, they are; P1151351311 authored by Gangadhar Tiwari and Debashis Nandi which discusses Secure Image Encryption using Two Dimensional Logistic Map. Paper P1151345302 authored by Gangadhar Tiwari, Debashis Nandi and Madhusudhan Mishra and discusses Non-Invertible...
The use of wireless sensor networks (WSNs) has grown very fast in the last decade. The main concern in wireless Sensor Network is how to keep the network working in spite of sensors limited energy resource case the performance of that Network depends on their lifetime. Maximizing network lifetime in Wireless Sensor Networks (WSNs) was done by contr...
Abstract Evidence-based medicine (EBM) is delivered through a didactic, blended learning, and mixed models. Students are supposed to construct an answerable question in PICO (patient, intervention, comparison, and outcome) framework, acquire evidence through search of literature, appraise evidence, apply it to the clinical case scenario, and assess...
The security of images transferred via internet is very important issue. The proposed system tries to satisfy all
requirements of security to ensure that any medical image related to any patient do not allow to be accessed via any unauthorized person. We can use an encryption scheme for encrypt medical image. Only the authorized person can decrypt...
This research expands the scope of wireless sensor network (WSN) optimization from single objective to multi objective optimization. It introduces a WSNs energy-aware and coverage preserve hierarchal clustering and routing model based on multi-objective bat swarm optimization algorithm. Two objectives are taken into consideration; coverage and node...
this paper presents an automatic translation model forth combination official expressions of user and gestures of manual alphabets in the Arabic sign language. The part of facial expression depends on locations of user's mouth, nose and eyes. The part of gestures of manual alphabets in the Arabic sign language does not rely on using any gloves or v...
The biometrics recognition has been paid more attention by people with the advancement of technology nowadays. The human ear is a perfect source of data for passive person identification. Ear seems to be a good candidate solution since ear is visible, their images are easy to take and structure of ear does not change radically over time. Ear satisf...
Challenges of wireless sensor networks under-optimization in field of research have been globally concerned. Generally, lifetime extension is still considered to be the most dominant challenge for WSNs. Clustering and routing protocols have been proposed as optimization solutions to extend WSNs lifetime. In this paper, we introduce a newly meta-heu...
A new approach is introduced for energy saving control problem in ad hoc wireless networks in this research. This project discusses the energy saving control problem in ad hoc wireless networks. The inputs of the problem are given as a set of nodes in a plane, end-to-end traffic demands and delay bounds between node pairs, the problem is to find an...
Wireless Sensor Networks (WSNs) are defined as dynamic, self-deployed, highly constrained structured network. It`s high computational environment with limited and controlled transmission range, processing, as well as limited energy sources. The sever power constraints strongly affect the existence of active nodes and hence the network lifetime. In...
Wireless Sensor Networks (WSNs) are defined as dynamic, self-deployed, highly constrained structured network. It`s high computational environment with limited and controlled transmission range, processing, as well as limited energy sources. The sever power constraints strongly affect the existence of active nodes and hence the network lifetime. In...
Wireless sensor networks (WSNs) have become an attracted research and industry interest. In WSN, each node is attached to a battery, which supply the node with energy required for data sensing, processing and transmission. Transmitted packets are queued at intermediate nodes. Each node schedules the queued packets by assigning priorities to each pa...
Wireless Wireless Sensor Networks (WSNs) have become an important component in our daily lives. In near future, it will dominate the technology industry around the world. WSNs gain its importance due to the variety of vital applications it can participate in such as military, health care, agriculture, surveillance and monitoring natural phenomena a...
in this work, a new approach is introduced for
energy saving control problem in ad hoc wireless networks.
This project discusses the energy saving control problem in ad
hoc wireless networks. The inputs of the problem are given as
a set of nodes in a plane, end-to-end traffic demands and delay
bounds between node pairs, the problem is to find...
Wireless sensor networks (WSNs) are usually deployed for gathering data from unattended or hostile environments. Therefore, securing data transmission across these environments is a must. Due to the fact that the sensors have a limited power, any security mechanism for sensor network must be energy efficient. In this paper, a secure energy efficien...
Large scale of watermarking methods is available in the literature. These methods differ in visibility, capacity, and robustness. In watermarking, the robustness against attacks is the most challenging issue. The desynchronization attacks are the most serious problems facing the watermarking process. The traditional correlation methods fail in wate...
Bluetooth is a low-cost, low-power wireless technology
initially designed for cable replacement. With the new mobile lifestyle
based on battery powered devices, Bluetooth came short in satisfying
the needs of the high-rate applications due to its’ limited data rate.
Introducing BluetoothV3.0+HS specification in 2009, Bluetooth can
now meet tho...
The Ad hoc On-Demand Distance Vector (AODV) routing protocol is an efficient Mobile Ad hoc NETworks (MANETs) routing protocol. It uses hop count as a metric for the path selection. AODV does not support Quality of Service (QoS) and neither any load-balancing mechanism. The performance of the network can be improved by using a load balancing mechani...
This paper presents a proposal for transmitting images using Multiple Description Coding (MDC) techniques over multiple links in a mesh network, while using network coding technique to add protection paths. In pure MDC, the losses of one or two of the multiple descriptions degrade the received image quality. In the proposed technique, the protectio...
This paper presents a proposal for transmitting images using Multiple Description Coding (MDC) techniques over multiple links in a mesh network, while using network coding technique to add a protection path. In pure MDC, the loss of one of the multiple descriptions degrades the received image quality. In the proposed technique, the protection path...
Providing Quality of Service (QoS) for real time applications in mobile Ad hoc networks is a challenging task, due to the characteristics of the wireless links and networks. These Characteristics include: dynamic nature, infrastructure less architecture, and time varying unstable links and topology. Features as: low cost, ease of deployment, increa...
This paper improves the performance of GPS jamming signal using new technology of jamming. We use new technology called multi-band limit white noise. We identify jamming design issues. How those issues may affect jamming system performance. It addresses fabrication issues, data requirements, error handling, local and remote operations, how to attai...
The nature of playing video streams over a network in a real time requires that the transmitted frames are sent in a bounded delay. Also, video frames need to be displayed at a certain rate; therefore, sending and receiving encrypted packets must be sent in a certain amount of time in order to utilize the admissible delay. There are two main compon...
The nature of playing video streams over a network in a real time requires that the transmitted frames are sent in a bounded delay. Also, video frames need to be displayed at a certain rate; therefore, sending and receiving encrypted packets must be sent in a certain amount of time in order to utilize the admissible delay. There are two main compon...
The demand for voice over IP (VoIP) applications has increased tremendously through the last two decades. This great demand leads to a great increase in the Quality of Service (QoS) researches and other related fields. One of these fields is the Differentiated Services (DiffServ). In this paper, we studied the effect of the packet size and the effe...
This issue includes the following papers; P1140827001 S.Anuradha and G.Raghuram and K.E.Sreenivasa murthy and B.Gurunath Reddy “New Routing Technique to improve Transmission Speed of Data Packets in Point to Point Networks” P1140841393 S. S. Sonavane and V. Kumar and B. P. Patil “MSP430 and nRF24L01 based Wireless Sensor Network Design with Adaptiv...
The design of data communication protocols in wireless sensor networks often take into account real-time delivery of reports of the mission critical applications. The sensed data need to be delivered with some real-time constraints, such as end-to-end deadlines. Since the data communication model is different from the traditional wireless ad hoc ne...
I-ServiceDelivery is an idea of the author to organize the services needed in homes and business. It is a virtual system that uses mobiles and the Internet as vehicles to satisfy clients necessities from service desk. It guarantees: provisions of services on time with quality that can be measured, pushing standard of both prices and "to do" procedu...
The last decade has testified developing and huge utilization of webcams. On Jan. 8 th , 2004, a google.com search showed over 33 million sites contained the word "webcam". 1.25 million sites of them handled the "webcam software", while 0.6 million sites were discussing "webcam hardware". A lot of sites use webcams for the benefit of the human bein...
Data communication protocols in wireless sensor networks are influenced by the packet scheduling algorithm and the routing protocol. The packet scheduling algorithms can arbitrate the use of the network in a deadline sensitive manner to ensure that most packets make their deadline. The routing protocol can influence the paths taken in the network a...
Real-time transmission of audio and video streams has become a common way of interaction and communication all over the world. With the tremendous uses of the Internet, the need for a secure communication environment is a must. Towards this direction, this paper presents a technique of improving the performance of security of video over IP networks...
Projects
Projects (3)