
Mohamed ElhosenyAmerican University in the Emirates (AUE) | AUE · Computer Science
Mohamed Elhoseny
PhD, Computers and Information Sciences
About
241
Publications
85,487
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,285
Citations
Introduction
Dr. Mohamed Elhoseny is an Assistant Professor at the Department of Computer Science, American University in the Emirates. Dr. Elhoseny is an ACM Distinguished Speaker and IEEE Senior Member. He is the founder and the EiC of IJSSTA. Also, he is an Associate Editor at IEEE J-BHI, IEEE Access, Scientific Reports, IEEE Future Directions, Remote Sensing. Dr. Elhoseny is the EiC of three book series published in Springer and Taylor& Francis. He was granted several national and international awards.
Research Experience
January 2016 - January 2019
Mansoura University
Position
- Professor (Associate)
January 2016 - present
Mansoura University
Position
- Professor (Associate)
January 2014 - January 2016
University of North Texas
Position
- PhD Student
Description
- PhD Researcher
Publications
Publications (241)
In a heterogeneous Wireless Sensor Network (WSN), factors such as initial energy, data processing capability, etc. greatly influence the network lifespan. Despite the success of various clustering strategies of WSN, the numerous possible sensor clusters make searching for an optimal network structure an open challenge. In this paper, we propose a G...
With the rapid development of in-vehicle communication technology and the integration of big data intelligent technology, intelligent algorithms for vehicle communication used to predict traffic flow and location information have been widely used. Aiming at the problem that the gravitational algorithm is difficult to minimize the complex function a...
To improve the quality of service (QOS) needed by several applications areas, the internet of things (IoT) tasks is offloaded into the Fog computing instead of the cloud. However, the availability of ongoing energy heads for fog computing servers is one of the constraints for IoT applications. In this work, an energy-aware model basis on the marine...
As a major priority to get better resource utilization and to ensure a high quality of life, research on smart disaster response systems (smart DRS) that based on information and communication technology (ICT) has been widespread. It’s imperative for smart cities to have smart disaster response systems so they can easily manage natural disasters ef...
Recently, the advancements in the field of wireless technologies and micro-electro-mechanical systems lead to the development of potential applications in wireless sensor networks (WSNs). The visual sensors in WSN create a significant impact on computer vision based applications such as pattern recognition and image restoration. generate a massive...
Heart disease (HD) is a serious widespread life-threatening disease. The heart of patients with HD fails to pump sufficient amounts of blood to the entire body. Diagnosing the occurrence of HD early and efficiently may prevent the manifestation of the debilitating effects of this disease and aid in its effective treatment. Classical methods for dia...
In this work, we present a real-time embedded implementation of an algorithm dedicated to monitoring agricultural fields. This algorithm is based on normalized indices, such as the Normalized Difference Vegetation Index (NDVI) and the Normalized Difference Water Index (NDWI). The problem of most algorithms in this context is real-time processing, e...
Call for Special Issue
Journal: “Information” an MDPI Journal. The journal is listed in Scopus (CiteScore: 2.4) and in the Web of Science Core Collection: Emerging Sources Citation Index.
Deadline: 30 September 2021
Submission Link: https://www.mdpi.com/journal/information/special_issues/Fighting_Financial_Crime
Artificial intelligence, machine...
This chapter presents the possibilities of applying the triangulation method in the biometric identification process. The chapter includes a method in field of computational geometry (specifically polygon triangulation) in combination with face recognition techniques. The chapter describes some authentication techniques with an emphasis on face rec...
This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors class...
Collects contributions from leading experts with the latest insights on distributed sensing applications
Includes reviews, surveys, and research chapters covering all aspects of distributed sensing and intelligent systems
Provides numerous specific use-cases throughout, showing practical applications of the presented concepts.
https://www.springer...
One of the most complex tasks for computer-aided diagnosis (Intel-ligent decision support system) is the segmentation of lesions. Thus, this study proposes a new fully automated method for the segmentation of ovarian and breast ultrasound images. The main contributions of this research is the development of a novel Viola-James model capable of segm...
Trading systems are of course systems with high geographic distribution and het-erogeneous systems. Now we find trading markets all over the world. And their techniques vary widely. However, the buying and selling conditions remain high-ly centralized, and the financial institutions remain intermediary among traders, which makes the trading process...
Scene understanding remains a challenging task due to the complex and ambiguous nature of scene images in defiance of several networks pre-trained on large-scale benchmark datasets are available. In this paper, we proposed a multi-scale, discriminative integrating method to aggregate both context and multi-scale object information of urban scene im...
Recently, the advancements of Internet-of-Things (IoT) have expanded its application in underwater environment which leads to the development of a new field of Internet of Underwater Things (IoUT). It offers a broader view of applications such as atmosphere observation, habitat monitoring of sea animals, defense and disaster prediction. Data transm...
In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most...
Evolution of the Internet of Things (IoT) makes a revolution in connecting, monitoring, controlling, and managing things, objects, and almost surroundings through the Internet. To reveal the potential of IoT, rich knowledge has to be extracted, indexed, and shared securely in real-time. Recent comprehensive researches on IoT spot the light on main...
Human activity recognition (HAR) has been regarded as an indispensable part of many smart home systems and smart healthcare applications. Specifically, HAR is of great importance in the Internet of Healthcare Things (IoHT), owing to the rapid proliferation of Internet of Things (IoT) technologies embedded in various smart appliances and wearable de...
Sustainable energy efficient networking models are needed to satisfy the increasing demands of the information and communication technologies (ICT) applications like healthcare, smart cities, education, and so on. The futuristic sustainable computing solutions in e-healthcare applications are based on the Internet of Things (IoT) and cloud computin...
Wireless sensor network is a hot research topic with massive applications in different domains. Generally, wireless sensor network comprises hundreds to thousands of sensor nodes, which communicate with one another by the use of radio signals. Some of the challenges exist in the design of wireless sensor network are restricted computation power, st...
Your article is protected by copyright and all rights are held exclusively by Springer-Verlag GmbH Germany, part of Springer Nature. This e-offprint is for personal use only and shall not be self-archived in electronic repositories. If you wish to self-archive your article, please use the accepted manuscript version for posting on your own website....
The rapid spread of the COVID-19 virus around the world poses a real threat to public safety. Some COVID-19 symptoms are similar to other viral chest diseases, which makes it challenging to develop models for effective detection of COVID-19 infection. This article advocates a model to differentiate between COVID-19 and other four viral chest diseas...
One of the major drawbacks of cheminformatics is a large amount of information present in the datasets. In the majority of cases, this information contains redundant instances that affect the analysis of similarity measurements with respect to drug design and discovery. Therefore, using classical methods such as the protein bank database and quantu...
In recent years, the need for high security with reliability in the wireless network has tremendously been increased. To provide high security in reliable networks, mobile ad hoc networks (MANETs) play a top role, like open network boundary, distributed network, and fast and quick implementation. By expanding the technology, the MANET faces a numbe...
This article presents a novel data encryption technique suitable for Internet of Things (IoT) applications. The cryptosystem is based on the application of a Catalan object (as a cryptographic key) that provides encryption based on combinatorial structures with noncrossing or nonnested matching. The experimental part of this article includes a comp...
Due to the advanced growth in multimedia data and Cloud Computing (CC), Secure Image Archival and Retrieval System (SIARS) on cloud has gained more interest in recent times. Content based image retrieval (CBIR) systems generally retrieve the images relevant to the query image (QI) from massive databases. However, the secure image retrieval process...
The development of the Internet of Things (IoT) is predicted to change the healthcare industry and might lead to the rise of the Internet of Medical Things. The IoT revolution is surpassing the present-day human services with promising mechanical, financial, and social prospects. This paper investigated the security of medical images in IoT by util...
Restoring image from motion deblur faces great challenges in the estimation of the motion blur kernel that is the key to recover the latent sharp image. In this paper, we present a method to iteratively estimate the structural image and account for the textural component. A scale-aware smoothing operation is developed to remove fine-scale edges wit...
In Industrial Internet of Things applications (IIoT), fog computing has soared as a means to improve the quality of services provided to users through cloud computing, which has become overwhelmed by the massive flow of data. Transmitting all these amounts of data to the cloud and coming back with a response can cause high latency and requires high...
The rapid development in 5G cellular and IoT technologies is expected to be deployed widespread in the next few years. At the same time, crime rates are also increasing to a greater extent while the investigation officers are held responsible to deal with a broad range of cyber and internet issues in investigations. Therefore, advanced IT technolog...
Combining intelligence elements with product-service systems (PSS) has become a significant requirement because of the recent increase in customers’ demands for smart products and services. In order to have a successful smart PSS that satisfies customers’ requirements, investigation and evaluation of the innovation value propositions (IVPs) became...
The booming applications of bitcoin Blockchain technologies made investors concerned about the return and risk of financial products. So, the return rate of bitcoin must be foreseen in prior. This research article devises an effective return rate prediction technique for Blockchain financial products based on Optimal Least Square Support Vector Mac...
Today, management and orchestration are considered prime components of the new network management layer. Multi-domain orchestration has helped in simplifying infrastructural operations and enables better scaling and faster deployment of network services. However, resource provisioning considering network optimization and fulfillment of multi-constr...
A cloud data center consumes more energy for computation and switching servers between modes. Virtual Machine (VM) migration enhances the execution of cloud server farm in terms of energy proficiency, adaptation to internal failure, and accessibility. Cloud suppliers, be that as it may, ought to likewise enhance for amounts like energy consumption...
Secret Image Sharing (SIS) scheme is to encrypt a secret image into ‘n’ specious shadows. It is unable to reveal any data on the secret image if at least one of the shadows is not achieved. In this paper, wavelet-based secret image sharing scheme is proposed with encrypted shadow images using optimal Homomorphic Encryption (HE) technique. Initially...
Earlier studies in the sustainable supply chain (SSC) have been introduced since its submission, yet, research of sustainable supply chain finance (SSCF) is still insufficient. Also, these studies did not consider uncertainty in corresponding with the uncertain environment of the supply chain deficiencies, the integration of sustainable development...
E-GOVERNMENT APPLICATIONS FOR SMART CITIES Published by Inderscience Enterprises Ltd.
Many countries are challenged by the medical resources required for COVID-19 detection which necessitates the development of a low-cost, rapid tool to detect and diagnose the virus effectively for a large numbers of tests. Although a chest X-Ray scan is a useful candidate tool the images generated by the scans must be analyzed accurately and quickl...
In recent years, massive growth in the number of images on the web has raised the requirement of developing an effective indexing model to search digital images from a large‐scale database. Though cloud service offers effective indexing of compressed images, it remains a major issue due to the semantic gap between the user query and diverse semanti...
Recently, neutrosophic systems modeling gained great attention in indeterminacy handling. Generating suitable membership, indeterminacy and non-membership functions for neutrosophic temperature variable in the forest fires data is a challenging problem. This paper presents a platform for integrating information theory measures with particle swarm o...
Wireless sensor network (WSN) comprises a collection of sensor nodes employed to monitor and record the status of the physical environment and organize the gathered data at a central location. This paper presents a deep learning based distributed data mining (DDM) model to achieve energy efficiency and optimal load balancing at the fusion centre of...
Load balancing, in Cloud Computing (CC) environment, is defined as the method of splitting workloads and computing properties. It enables the enterprises to manage workload demands or application demands by distributing the resources among computers, networks or servers. In this research article, a new load balancing algorithm is proposed as an hyb...
Due to the rapid increase of internet-based data, there is urgent need for a robust intelligent documents security mechanism. Although there are many attempts to build a plagiarism detection system in natural language documents, the unlimited variation and different writing styles of each character in Arabic documents make building such systems cha...
An amendment to this paper has been published and can be accessed via a link at the top of the paper.
The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of data classification research. With the emergence of big data, the performance and the efficiency of the traditional k-NN algorithm is fast becoming a critical issue. The traditional k-NN algorithm is inefficient to solve the high volume multi-categorical trainin...
The design of Two-Dimensional Infinite Input Response Filters (2D IIR) is an important task in the field of signal processing. These filters are widely used in several areas of engineering as an important tool to eliminate undesired frequencies in high-noised signals. However, 2D IIR filters have parameters that need to be calibrated in order to ob...
Cuckoo optimization algorithm (COA) is inspired from the special and exotic lifestyle of a bird family called the cuckoo and her amazing and unique behavior in egg laying and breeding. Just like any other population-based swarm intelligence metaheuristic algorithms, the basic COA starts with a set of randomly generated solutions called “habitats.”...
Recently, video surveillance has garnered considerable attention in various real-time applications. Due to advances in the field of machine learning, numerous techniques have been developed for multi-object detection and tracking (MODT). This paper introduces a new MODT methodology. The proposed method uses an optimal Kalman filtering technique to...
Recently, medical image compression becomes essential to effectively handle large amounts of medical data for storage and communication purposes. Vector quantization (VQ) is a popular image compression technique, and the commonly used VQ model is Linde–Buzo–Gray (LBG) that constructs a local optimal codebook to compress images. The codebook constru...
Vehicular Ad Hoc Network (VANET) is a kind of extraordinary remote ad hoc network, which has high node portability and quick topology changes. Clustering is a system for gathering nodes, making the network increasingly vigorous. With no consciousness of nodes, at some point, it comes up short on energy which causes execution issues in network and t...
Physical world integration with cyber world opens the opportunity of creating smart environments; this new paradigm is called the Internet of Things (IoT). Communication between humans and objects has been extended into those between objects and objects. Industrial IoT (IIoT) takes benefits of IoT communications in business applications focusing in...
WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, health care and military applications. Although there are a lot of secure image processing schemas designed for image transmission over a network, the limited resources and the dynamic e...
This volume presents selected papers from the International Conference on Urban Intelligence and Applications (ICUIA), which took place on May 10-12, 2019 in Wuhan, China. The goal of the conference was to bring together researchers, industry leaders, policy makers, and administrators to discuss emerging technologies and their applications to advan...
The rapid spread of novel coronavirus pneumonia (COVID-19) has led to a dramatically increased mortality rate worldwide. Despite many efforts, the rapid development of an effective vaccine for this novel virus will take considerable time and relies on the identification of drug-target (DT) interactions utilizing commercially available medication to...
This book constitutes revised papers from the Second International Conference on Urban Intelligence and Applications, ICUIA 2020, held in August 2020. Due to the COVID-19 pandemic the conference was held online.
The 26 papers were thoroughly reviewed and selected from 122 submissions. They are organised in the topical sections on technology and i...
Many real-world problems are large in scale and hence difficult to address. Due to the large number of features in microarray datasets, feature selection and classification are even more challenging for such datasets. Not all of these numerous features contribute to the classification task, and some even impede performance. Through feature selectio...
Watermarking scheme is not helpful in conveying the original image continually so as identifying the owner's mark from the watermarked image. In the current situation, our chosen topic is significant in real‐time applications like fraud recognition, emergency clinic, and government divisions. In this study, an optimal multiblind watermarking model...
Cloud Computing (CC) and the Internet of Things (IoT) have emerged as new platforms in the ICT revolution of the twenty-first century. The adoption of the CloudIoT paradigm in the healthcare field can bring several opportunities to medical IT, and experts believe that it can significantly improve healthcare services and contribute to its continuous...
The main objective of this paper is to help the orthopaedic in selecting the most suitable artificial intervertebral disc material that can be used in intervertebral disc replacement surgery based on the finite element method. The study uses a three-dimensional model for the lumber 4–lumber 5 spine vertebras for real patient DICOM dataset and saves...
Similarity plays a significant implicit or explicit role in various fields. In some real applications in decision making, similarity may bring counterintuitive outcomes from the decision maker's standpoint. Therefore, in this research, we propose some novel similarity measures for bipolar and interval-valued bipolar neutrosophic set such as the cos...
In our rapidly-growing big-data area, often the big sensory data from Internet of Things (IoT) cannot be sent directly to the far data-center in an efficient way because of the limitation in the network infrastructure. Fog computing, which has increasingly gained popularity for real-time applications, offers the utilization of local mini data-cente...
The world is consuming large amounts of ener