Mohamed Taha

Mohamed Taha
  • Professor
  • Lecturer at Benha University

About

39
Publications
24,981
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
544
Citations
Introduction
Mohamed Taha currently works at the Department of Computer Science, Benha University. Mohamed does research in Data Mining and Artificial Intelligence. Their most recent publication is 'Energy Efficient Routing In Wireless Sensor Networks: A Survey'.
Current institution
Benha University
Current position
  • Lecturer
Additional affiliations
July 2015 - January 2016
Faculty of Computers & Informatics, Banha University, Banha, Egypt
Position
  • Lecturer
October 2010 - February 2015
Benha University
Position
  • Research Assistant
December 2003 - September 2010
Suez Canal University
Position
  • Research Assistant

Publications

Publications (39)
Article
Full-text available
Identifying and mitigating fake profiles is an urgent issue during the age of widespread integration with social media platforms. this study addresses the challenge of fake profile detection on major social platforms-Facebook, Instagram, and X (Twitter). Employing a two-sided approach, it compares stacking model of machine learning algorithms with...
Article
Full-text available
The eHealth sector has witnessed significant growth due to technological advancements, facilitating care delivery in patients' homes and moving away from traditional hospital settings. Blockchain and the Internet of Things (IoT) play pivotal roles in enhancing healthcare services, offering features such as remote patient monitoring, streamlined ele...
Article
Full-text available
span>In recent years, Source printer identification has become increasingly important for detecting forged documents. A printer's distinguishing feature is its fingerprints. Each printer has a unique collection of fingerprints on every printed page. A model for identifying the source printer and classifying the questioned document into one of the p...
Article
Full-text available
Advancements in technology have significantly changed how we interact on social media platforms, where reviews and comments heavily influence consumer decisions. Traditionally, opinion mining has focused on textual data, overlooking the valuable insights present in customer-uploaded images—a concept we term Multus-Medium. This paper introduces a mu...
Article
Full-text available
span lang="EN-US">Social media impacts society whether these impacts are positive or negative, or even both. It has become a key component of our lives and a vital news resource. The crisis of covid-19 has impacted the lives of all people. The spread of misinformation causes confusion among individuals. So automated methods are vital to detect the...
Preprint
Full-text available
This paper describes the systems submitted to iSarcasm shared task. The aim of iSarcasm is to identify the sarcastic contents in Arabic and English text. Our team participated in iSarcasm for the Arabic language. A multi-Layer machine learning based model has been submitted for Arabic sarcasm detection. In this model, a vector space TF-IDF has been...
Article
Full-text available
Because of the widespread availability of low-cost printers and scanners, document forgery has become extremely popular. Watermarks or signatures are used to protect important papers such as certificates, passports, and identification cards. Identifying the origins of printed documents is helpful for criminal investigations and also for authenticat...
Article
Full-text available
Misinformation about COVID-19 overwhelmed our lives due to the tremendous usage of social media, especially Twitter. Spreading misinformation caused fear and panic among people affecting the national economic security of many countries. Vaccination is the crucial key to limiting the pandemic spread of COVID-19. Therefore, researchers start to detec...
Conference Paper
Full-text available
Analysing the contents of social media platforms such as YouTube, Facebook and Twitter gained interest due to the vast number of users. One of the important tasks is homophobia/transphobia detection. This paper illustrates the system submitted by our team for the homophobia/transphobia detection in social media comments shared task. A machine learn...
Conference Paper
Full-text available
This paper describes the systems submitted to iSarcasm shared task. The aim of iSarcasm is to identify the sarcastic contents in Arabic and English text. Our team participated in iSarcasm for the Arabic language. A multi-Layer machine learning based model has been submitted for Arabic sarcasm detection. In this model, a vector space TF-IDF has been...
Article
Full-text available
The integration of biometric recognition with smartphones becomes necessary for increasing security, especially in financial transactions such as online payment. Vein recognition of dorsal hand is outstanding than other methods like palm, finger, and wrist as it has a wide area to be captured and does not have any wrinkles. Most of the current syst...
Article
Social media presence is a crucial portion of our life. It is considered one of the most important sources of information than traditional sources. Twitter has become one of the prevalent social sites for exchanging viewpoints and feelings. This work proposes a supervised machine learning system for discovering false news. One of the credibility de...
Article
Visually impaired (VI) people suffer from many difficulties when accessing printed material using existing technologies. These problems may include text alignment, focus, accuracy, software processing speed, mobility, and efficiency. Current technologies such as flatbed scanners and OCR programs need to scan an entire page. Recently, VI people pref...
Article
Full-text available
COVID-19 has affected all peoples’ lives. Though COVID-19 is on the rising, the existence of misinformation about the virus also grows in parallel. Additionally, the spread of misinformation has created confusion among people, caused disturbances in society, and even led to deaths. Social media is central to our daily lives. The Internet has become...
Article
Full-text available
Vein detection is an important issue for the medical field. There are some commercial devices for detecting veins using infrared radiation. However, most of these commercial solutions are cost-prohibitive. Recently, veins detection has attracted much attention from research teams. The main focus is on developing real-time systems with low-cost hard...
Article
Full-text available
The development of biometric applications, such as facial recognition (FR), has recently become important in smart cities. Many scientists and engineers around the world have focused on establishing increasingly robust and accurate algorithms and methods for these types of systems and their applications in everyday life. FR is developing technology...
Article
Full-text available
Humans suffer from health problems due to pollution and diseases, especially in the Middle East and African countries. So citizens need safe medicines to help them with a safe, speedy recovery. In turn, a medical refrigerator can monitor storage temperature, expire dates, and quantity to keep drugs, vaccines, and blood donations useful and safe for...
Article
Full-text available
Cloud computing is a new technology that has become a massive demand for computing solutions. Users can access computing resources from anywhere with the help of the cloud. Nowadays, more companies can hire cloud resources for storage and other computational purposes so that infrastructure costs are considered to be exceedingly reduced. The resourc...
Article
Visual object tracking remains a challenge facing an intelligent control system. A variety of applications serve many purposes such as surveillance. The developed technology faces plenty of obstacles that should be addressed including occlusion. In visual tracking, online learning techniques are most common due to their efficiency for most video se...
Research
Full-text available
In the era of IoT, the energy consumption of sensor nodes in WSN is one of the main challenges. It is crucial to reduce energy consumption due to the limited battery life of the sensor nodes. Recently, Zone-based Energy-Aware data coLlection (ZEAL) routing protocol is proposed to improve energy consumption and data delivery. In this paper, an enhan...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) has emerged as a powerful technology, which has multiple applications such as health, military surveillance, home applications, and many more. WSN consists of multiple numbers of nodes deployed randomly in a remote environment. Each node has a sensing device to capture data from the environment. Processing units are...
Article
Full-text available
Despite the quickly expanding utilization of Master cards and other electronic types of payment, money is still broadly utilized for ordinary exchanges because of its convenience. However, the visually impaired people may suffer from knowing each currency paper apart. Currency Recognition Systems (CRS) can be used to help blind and visually impaire...
Conference Paper
CITATIONS 0 READS 509 3 authors, including: Some of the authors of this publication are also working on these related projects: ABSTRACT Wireless Sensor Networks (WSNs) has emerged as a powerful technology, which has multiple applications such as health, military surveillance, home applications, and many more. WSN consists of multiple numbers of no...
Conference Paper
Full-text available
As road networks become more congested, traffic surveillance using computer vision techniques is increasingly important. Traffic surveillance can help in improving road network efficiency, rerouting traffic when accidents occur and minimizing delays. Although, there are many algorithms developed to detect and track moving vehicles in daytime, only...
Article
Full-text available
Traffic surveillance using computer vision techniques is an emerging research area. Many algorithms are being developed to detect and track moving vehicles in daytime in effective manner. However, little work is done for nighttime traffic scenes. For nighttime, vehicles are identified by detecting and locating vehicle headlights and rear lights. In...
Article
Full-text available
Traffic surveillance plays a vital role in computer vision and Intelligent Transportation Systems (ITS). Image analysis provides several effective techniques to detect moving objects in images. Thus, it has been extensively used for traffic monitoring systems. Recently, the problem of detecting and tracking vehicles is an important emerging researc...
Article
Full-text available
Shadow detection and removal has had great interest in computer vision especially in outdoor environments. It is an important task for visual tracking, object recognition, and many other important applications. One of the fundamental challenges for accurate tracking is achieving invariance to shadows. Two or more separate objects can appear to be c...
Conference Paper
Full-text available
Identifying moving objects from a video scene is a fundamental and critical task in object tracking. However, shadows extracted along with the objects can result in large errors in object localization and recognition. Despite many attempts, the problem remains largely unsolved due to several challenges. Since cast shadows can be as big as the actua...
Article
Full-text available
Frequent item sets mining plays an important role in association rules mining. A variety of algorithms for finding frequent item sets in very large transaction databases have been developed. Although many techniques were proposed for maintenance of the discovered rules when new transactions are added, little work is done for maintaining the discove...
Article
Full-text available
This paper presents the concept of temporal association rules in order to solve the problem of handling time series by including time expressions into association rules. Actually, temporal databases are continually appended or updated so that the discovered rules need to be updated. Re-running the temporal mining algorithm every time is ineffective...
Article
Recent developments in information technology resulted in rapid accumulation of huge amounts of data. Therefore, the task of managing large databases efficiently, in addition to quickly retrieving useful information and mining association rules, has become increasingly important. In this paper, an efficient technique is proposed for updating the di...

Network

Cited By