Kamal Eldahshan

Kamal Eldahshan
Al-Azhar University · Department of Mathematics

Professor

About

93
Publications
61,043
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
475
Citations
Introduction

Publications

Publications (93)
Article
Full-text available
Forecasting violence has become a critical obstacle in the field of video monitoring to guarantee public safety. Lately, YOLO (You Only Look Once) has become a popular and effective method for detecting weapons. However, identifying and forecasting violence remains a challenging endeavor. Additionally, the classification results had to be enhanced...
Article
Full-text available
As data grow exponentially, the demand for advanced intelligent solutions has become increasingly urgent. Unfortunately, not all businesses have the expertise to utilize machine learning algorithms effectively. To bridge this gap, the present paper introduces a cost-effective, user-friendly, dependable, adaptable, and scalable solution for visualiz...
Article
Full-text available
Motion prediction has gotten much attention in the past few years. It has endless uses either in real life or in virtual life (gaming). The current dynamic motion prediction models, such as the Markov model, depend only on the object motions’ history. They ignore the object’s direction and speed, which play a key role in dynamic motion prediction....
Article
Full-text available
Respiratory genetic diseases are considered a major participant in the reasons of death worldwide nowadays and were one of the major participants in helping in increasing the numbers of COVID-19 patients. It is considered one of the most alarming diseases affecting in particular the respiratory system. The journey of early detection of respiratory...
Article
Data Warehouses (DWs) are essential for enterprises, containing valuable business information and thus becoming prime targets for internal and external attacks. Data warehouses are crucial assets for organizations, serving critical purposes in business and decision-making. They consolidate data from diverse sources, making it easier for organizatio...
Preprint
Full-text available
In the big data era, businesses are in dire need of intelligent solutions to rapidly extract valuable insights. However, not all companies possess the specialized expertise required to operate machine learning algorithms. To bridge this gap, this paper introduces a cost-effective, user-friendly, dependable, adaptable, and scalable solution for visu...
Article
Full-text available
p>This paper presents a novel deep learning-based approach for anomaly detection in surveillance films. A deep network that has been trained to recognize objects and human activity in movies forms the foundation of the suggested approach. In order to detect anomalies in surveillance films, the proposed method combines the strengths of 3D-convolutio...
Article
Full-text available
Cloud computing is an advanced technology that offers types of assistance on requests. Because of the huge measure of requests got from cloud clients, all requests should be managed efficiently. Therefore, the task scheduling is critical in cloud computing. The provision of computational resources in cloud is controlled by a cloud provider. It...
Article
Full-text available
Cloud computing is an advanced technology that offers types of assistance on requests. Because of the huge measure of requests got from cloud clients, all requests should be managed efficiently. Therefore, the task scheduling is critical in cloud computing. The provision of computational resources in cloud is controlled by a cloud provider. It is n...
Article
Full-text available
Some human diseases are recognized through of each type of White Blood Cell (WBC) count, so detecting and classifying each type is important for human healthcare. The main aim of this paper is to propose a computer-aided WBCs utility analysis tool designed, developed, and evalu- ated to classify WBCs into five types namely neutrophils, eosinophils,...
Article
Full-text available
Rapid advancements in deep learning-based technologies have developed several synthetic video and audio generation methods producing incredibly hyper-realistic deepfakes. These deepfakes can be employed to impersonate the identity of a source person in videos by swapping the source's face with the target one. Deepfakes can also be used to clone the...
Thesis
Full-text available
Flexible Manufacturing Systems (FMS) have gained recently the concern of researchers in the majority of real-world environments. One of the challenges for FMS is the existence of numerous alternatives for deciding how to allocate resources to jobs. Planning and schedule execution are handled by the FMS scheduling function. The Job Shop Scheduling P...
Article
Full-text available
Numerous network cyberattacks have been launched due to inherent weaknesses. Network intrusion detection is a crucial foundation of the cybersecurity field. Intrusion detection systems (IDSs) are machine learning (ML) software proposed for making decisions without explicit programming and with little human intervention. Although ML-based IDS advanc...
Article
Full-text available
Real-time task scheduling is a critical part of systems since processes must finish their work at a certain time. Large data streams require high energy efficiency and rapid response times. Real-time system performance must be improved through task scheduling on resources. Numerous researchers have recently and rapidly proposed enormous efforts wit...
Article
Full-text available
Recent years have seen a significant increase in the data volumenarity, which has led to the emergence of Big Data. Therefore, it has become impossible to dispense with the term big data in dealing with many applications; one of these applications is the healthcare system.The healthcare system generates a vast amount of data that premise around dru...
Article
Full-text available
This study focuses on meeting the challenges of big data visualization by using of data reduction methods based the feature selection methods. To reduce the volume of big data and minimize model training time (Tt) while maintaining data quality. We contributed to meeting the challenges of big data visualization using the embedded method based “Sele...
Article
Full-text available
Rapid advances in deep learning models have made it easier for public and crackers to generate hyper-realistic deepfake videos in which faces are swapped. Such deepfake videos may constitute a significant threat to the world if they are misused to blackmail public figures and to deceive systems of face recognition. As a result, distinguishing these...
Article
Full-text available
Industry 4.0 production environments and smart manufacturing systems integrate both the physical and decision-making aspects of manufacturing operations into autonomous and decentralized systems. One of the key aspects of these systems is a production planning, specifically, Scheduling operations on the machines. To cope with this problem, this pap...
Conference Paper
Due to the rapid development in our world today, multiple data sources from various sources such as sensors, the internet of things, healthcare data, etc., have been increased. So, it is necessary to analyze these data to obtain valuable data and visualize it with visualization tools. Big data visualization plays an essential role in today's world...
Article
Full-text available
The growth of the Internet of Things (IoT) generates new processing, networking infrastructure, data storage, and management capabilities. This massive volume of data may be used to provide high-value information for decision support and data-intensive science research, etc. However, owing to the nature of IoT in distribution, virtualisation, cloud...
Article
Full-text available
Currently, relational database management systems (RDBMSs) face different challenges in application development due to the massive growth of unstructured and semi-structured data. This introduced new DBMS categories, known as not only structured query language (NoSQL) DBMSs, which do not adhere to the relational model. The migration from relational...
Article
Within the exponential growth in raw data production, attributed in no small part to social media-Facebook, Youtube, and others. Video is proving to be the most important data type thanks to the substantial amount of raw data it contains, requiring an efficient way to be understood, organized, structured, and stored for ease of retrieval. Hence, an...
Article
Full-text available
In this paper, we approach the problem of detecting and diagnosing COVID-19 infections using multisource scan images including CT and X-ray scans to assist the healthcare system during the COVID-19 pandemic. Here, a computer-aided diagnosis (CAD) system is proposed that utilizes analysis of the CT or X-ray to diagnose the impact of damage in the re...
Article
Full-text available
Big data technologies are used majorly for computational biology research nowadays due to the emerge of massive amounts of biological data that have been generated and collected at an unprecedented speed and scale and with different structures. As an example, the processing of billions of DNA sequence data per day represents the new generation of s...
Article
Full-text available
Nowadays, the world suffers a Coronavirus mutation in 2019 (COVID-19). The COVID-19 data sources possess three main characteristics: big volume, velocity, and variety. These challenges have compelled the authors to employ Big Data technology, data mining techniques, and Ontology-based approaches instead of using a statistics hypothesis. Big Data Fr...
Article
Full-text available
Recently, the deepfake techniques for swapping faces have been spreading, allowing easy creation of hyper-realistic fake videos. Detecting the authenticity of a video has become increasingly critical because of the potential negative impact on the world. Here, a new project is introduced; You Only Look Once Convolution Recurrent Neural Networks (YO...
Chapter
Blockchain technology offers several advantages to Human Resource Management (HRM); easier verification of job candidates’ education and skills, efficient recording of job candidates’ education, expertise, and training, easier payment of cross-border transfers, international expenses, and tax liabilities, elimination of fraud and improved cyber-sec...
Article
Full-text available
Security attacks become daily news due to an exposure of a security threat in a widely used software. Taking software security into consideration during the analysis, design, and implementation phases is a must. A software application should be protected against any security threat such as unauthorized distribution or code retrieval. Due to the lac...
Article
We live in a time where data stream by the second, which makes intrusion detection a more difficult and tiresome task, and in turn intrusion detection systems require an efficient and improved detection mechanism to detect the intrusive activities. Moreover, handling the size, complexity, and availability of big data requires techniques that can cr...
Article
Relational databases are usually used for data storage and retrieval. They are suitable for limited data volume. But when it comes to Bigdata, we need to use more flexible databases that satisfy the need to handle semi-structured and unstructured data. These databases are called NoSQL (Not only SQL) databases. This type of database was developed to...
Article
Full-text available
Background As the COVID-19 crisis endures and the virus continues to spread globally, the need for collecting epidemiological data and patient information also grows exponentially. The race against the clock to find a cure and a vaccine to the disease means researchers require storage of increasingly large and diverse types of information; for doct...
Article
Full-text available
Background As the COVID-19 crisis endures and the virus continues to spread globally, the need for collecting epidemiological data and patient information also grows exponentially. The race against the clock to find a cure and a vaccine to the disease means researchers require storage of increasingly large and diverse types of information; for doct...
Article
Full-text available
Classification of human face images into emotion categories is a hard challenge. Deep learning is mostly effective for this task. In this paper, we propose a facial emotions recognition system based on Deep Belief Networks (DBNs) and Quantum Particle Swarm Optimization (QPSO). The proposed methodology is composed of four phases: first, the input im...
Article
Full-text available
This paper presents a general Semantic Smart World framework (SSWF), to cover the Migratory birds’ paths. This framework combines semantic and big data technologies to support meaning for big data. In order to build the proposed smart world framework, technologies such as cloud computing, semantic technology, big data, data visualization, and the I...
Article
Full-text available
Background Portable-devices applications (Android applications) are becoming complex software systems that must be developed quickly and continuously evolved to fit new user requirements and execution contexts. Applications must be produced rapidly and advance persistently in order to fit new client requirements and execution settings. However, cat...
Article
Most authentication schemes are using passwords only to restrict access to services. Which are suffering from many weaknesses, such as key-logger attack and dictionary attack. Also, other authentication schemes are using physical token such as smart cards. These schemes are also impractical due to their infrastructure requirements. Since, many rese...
Conference Paper
Software design has a main impact in the quality of the software systems. Anti-patterns are shortcomings exist in the software designs and impact negatively software quality. Mobile applications (apps) with anti-patterns have bad quality and short lifetime. Many empirical studies have assessed that the anti-patterns have a negative impact on change...
Preprint
Background: Portable applications (Android applications) are becoming increasingly complicated by mind-boggling programming frameworks. Applications must be produced rapidly and advance persistently in order to fit new client requirements and execution settings. However, catering to these imperatives may bring about poor outline decisions on design...
Preprint
Full-text available
Background: Portable applications (Android applications) are becoming increasingly complicated by mind-boggling programming frameworks. Applications must be produced rapidly and advance persistently in order to fit new client requirements and execution settings. However, catering to these imperatives may bring about poor outline decisions on design...
Article
Full-text available
Scheduling is the process of allocating processes to the CPU in order to optimize some objective function. There are many algorithms used to schedule processes. The Round Robin (RR) CPU scheduling algorithm is one of these algorithms which is effective in time sharing and real time operating systems. It gives reasonable response time. But it...
Data
This issue includes the following articles; P1130945914, author="Alaa Sheta and Mohammad Salamah", title="An Innovative NXT Mobile Robot System for Landmine Detection", P1111733578, author="Prof. Dr. Kamen M. Yanev", title="Advanced D-Partitioning Stability Analysis of Digital Control Systems with Multivariable Parameters", P1111748593, author="Ali...
Article
Full-text available
This issue includes the following articles; P1130945914, author="Alaa Sheta and Mohammad Salamah", title="An Innovative NXT Mobile Robot System for Landmine Detection", P1111733578, author="Prof. Dr. Kamen M. Yanev", title="Advanced D-Partitioning Stability Analysis of Digital Control Systems with Multivariable Parameters", P1111748593, author="Ali...
Article
Full-text available
Scheduling is the process of allocating processes to the CPU in order to optimize some objective function. There are many algorithms used to schedule processes. The Round Robin (RR) CPU scheduling algorithm is one of these algorithms which is effective in time sharing and real time operating systems. It gives reasonable response time. But it suffer...
Article
Full-text available
The Round Robin algorithm is a CPU scheduling algorithm that is designed especially for time sharing systems. Each process is assigned a slice of time called time quantum to execute. To increase the performance of a Round Robin algorithm, it is important to choose an optimal time quantum. Many algorithms developed the Round Robin algorithm. This pa...
Data
This issue includes the following papers; P1121653529, AUTHOR="Sameh Magdy and Tarek Mahmoud and Mohamed Ibrahim", TITLE="Improved Face Recognition based on Hidden Markov Model" P1121705544, AUTHOR="Afaf Abd Elkader Abd Elhafiz", TITLE="Enhancing the Minimum Average Scheduling Algorithm (MASA) based on Makespan Minimizing", P1121711553, AUTHOR="Jim...
Article
Full-text available
This issue includes the following papers; P1121653529, AUTHOR="Sameh Magdy and Tarek Mahmoud and Mohamed Ibrahim", TITLE="Improved Face Recognition based on Hidden Markov Model" P1121705544, AUTHOR="Afaf Abd Elkader Abd Elhafiz", TITLE="Enhancing the Minimum Average Scheduling Algorithm (MASA) based on Makespan Minimizing", P1121711553, AUTHOR="Jim...
Conference Paper
The amount of videos over the internet and media storage systems has dramatically increased. This poses challenges in video content understanding and management. A video is a complex and resource consuming media. In addition, efficient use of video data requires the data to be understood and accessed without having to watch it entirely. For those r...
Conference Paper
Full-text available
Coupling Biometrics with Quantum algorithms offers a new range of security. In this paper, we give a brief overview of the field of biometrics specially face authentication. Also, we propose a quantum face authentication method. The proposed method phases are detection face boundaries, image resizing, remove noisy, feature extraction, matching and...
Article
Full-text available
Most authentication schemes are using physical token such as smart cards to restrict services. Although these schemes have been widely deployed for various kinds of daily applications; there are severe challenges regarding their infrastructure requirements and security. This paper proposes an efficient authentication protocol based on user's machin...
Article
Full-text available
Scheduling is the process of allocating tasks to resources in order to optimize some objective function. There have been many algorithms used to schedule tasks on their resources .One of these scheduling algorithms is the Enhanced Max-min task scheduling algorithm which selects a task with average execution time(average or nearest greater than aver...
Conference Paper
Recently, mobile crowd sensing (MCS) is an important approach for collecting data from the participants in the urban streets. The main problem in collecting data process is how to cover all segments the street sides and select a minimal number of participants in each street segment that preserves the energy of the mobile devices and prolongs the MC...
Article
in the context of mobile computing and multimedia processing, video summarization plays an important role for video browsing, streaming, indexing and storing. In this paper, an effective and efficient video summarization approach for mobile devices is proposed. The goal of this approach is to generate a video summary (static and dynamic) based on V...
Data
Full-text available
This issue includes the following articles; P1121521384, EL GRAOUI EL MEHDI and BENELALLAM IMADE and BOUYAKHF EL HOUSSINE, "A novel Hybrid Search for Minimal Perturbation Problems based on Backjumping and Dynamic backtracking methods", P1121517374, Sara Elsir M. Ahmed and Alaa F. Sheta and Hossam Faris, "Evolving Stock Market Prediction Models Usin...
Data
Full-text available
This issue (DOI: 10.13140/RG.2.1.1578.1843) includes the following articles; P1120838366 B. S. ANAMI and D. G. SAVAKAR Improved Method for Identification and Classification of Foreign Bodies Mixed Food Grains Image Samples P1120841394 K.Sri Rama Krishna and J.Lakshmi Narayana and L.Pratap Reddy Performance Evaluation of ANN Models for the Analysis...
Data
Full-text available
This issue includes four papers, they are; P1151424332 by Vishnu Murthy. G and Vakulabharanam Vijaya Kumar which entitled Overwriting Grammar Model to Represent 2D Image Patterns. P1151442347 by M.A. Fkirin and S.M. Badway and A.K. Helmy and S.A. Mohamed which entitled Measuring Sub Pixel Erratic Shift in Egyptsat-1 Aliased Images: proposed method....
Article
Full-text available
RC4 is the most widely used stream cipher algorithm. It is used to protect valuable electronic information. How- ever, RC4 encryption algorithm su�ers from a secret key generation as a seed problems. This paper proposes an intelligent dynamic secret key generation as a seed by em- ploying an Evolutionary Algorithm (EA). The proposed RC4-EA method t...