Mohamed Elhoseny

Mohamed Elhoseny
American University in the Emirates (AUE) | AUE · Computer Science

PhD, Computers and Information Sciences

About

241
Publications
85,487
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,285
Citations
Introduction
Dr. Mohamed Elhoseny is an Assistant Professor at the Department of Computer Science, American University in the Emirates. Dr. Elhoseny is an ACM Distinguished Speaker and IEEE Senior Member. He is the founder and the EiC of IJSSTA. Also, he is an Associate Editor at IEEE J-BHI, IEEE Access, Scientific Reports, IEEE Future Directions, Remote Sensing. Dr. Elhoseny is the EiC of three book series published in Springer and Taylor& Francis. He was granted several national and international awards.
Research Experience
January 2016 - January 2019
Mansoura University
Position
  • Professor (Associate)
January 2016 - present
Mansoura University
Position
  • Professor (Associate)
January 2014 - January 2016
University of North Texas
Position
  • PhD Student
Description
  • PhD Researcher

Publications

Publications (241)
Article
Full-text available
In a heterogeneous Wireless Sensor Network (WSN), factors such as initial energy, data processing capability, etc. greatly influence the network lifespan. Despite the success of various clustering strategies of WSN, the numerous possible sensor clusters make searching for an optimal network structure an open challenge. In this paper, we propose a G...
Article
With the rapid development of in-vehicle communication technology and the integration of big data intelligent technology, intelligent algorithms for vehicle communication used to predict traffic flow and location information have been widely used. Aiming at the problem that the gravitational algorithm is difficult to minimize the complex function a...
Article
Full-text available
To improve the quality of service (QOS) needed by several applications areas, the internet of things (IoT) tasks is offloaded into the Fog computing instead of the cloud. However, the availability of ongoing energy heads for fog computing servers is one of the constraints for IoT applications. In this work, an energy-aware model basis on the marine...
Article
As a major priority to get better resource utilization and to ensure a high quality of life, research on smart disaster response systems (smart DRS) that based on information and communication technology (ICT) has been widespread. It’s imperative for smart cities to have smart disaster response systems so they can easily manage natural disasters ef...
Article
Recently, the advancements in the field of wireless technologies and micro-electro-mechanical systems lead to the development of potential applications in wireless sensor networks (WSNs). The visual sensors in WSN create a significant impact on computer vision based applications such as pattern recognition and image restoration. generate a massive...
Article
Full-text available
Heart disease (HD) is a serious widespread life-threatening disease. The heart of patients with HD fails to pump sufficient amounts of blood to the entire body. Diagnosing the occurrence of HD early and efficiently may prevent the manifestation of the debilitating effects of this disease and aid in its effective treatment. Classical methods for dia...
Article
In this work, we present a real-time embedded implementation of an algorithm dedicated to monitoring agricultural fields. This algorithm is based on normalized indices, such as the Normalized Difference Vegetation Index (NDVI) and the Normalized Difference Water Index (NDWI). The problem of most algorithms in this context is real-time processing, e...
Article
Full-text available
Call for Special Issue Journal: “Information” an MDPI Journal. The journal is listed in Scopus (CiteScore: 2.4) and in the Web of Science Core Collection: Emerging Sources Citation Index. Deadline: 30 September 2021 Submission Link: https://www.mdpi.com/journal/information/special_issues/Fighting_Financial_Crime Artificial intelligence, machine...
Chapter
This chapter presents the possibilities of applying the triangulation method in the biometric identification process. The chapter includes a method in field of computational geometry (specifically polygon triangulation) in combination with face recognition techniques. The chapter describes some authentication techniques with an emphasis on face rec...
Book
This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors class...
Book
Full-text available
Collects contributions from leading experts with the latest insights on distributed sensing applications Includes reviews, surveys, and research chapters covering all aspects of distributed sensing and intelligent systems Provides numerous specific use-cases throughout, showing practical applications of the presented concepts. https://www.springer...
Article
Full-text available
One of the most complex tasks for computer-aided diagnosis (Intel-ligent decision support system) is the segmentation of lesions. Thus, this study proposes a new fully automated method for the segmentation of ovarian and breast ultrasound images. The main contributions of this research is the development of a novel Viola-James model capable of segm...
Chapter
Trading systems are of course systems with high geographic distribution and het-erogeneous systems. Now we find trading markets all over the world. And their techniques vary widely. However, the buying and selling conditions remain high-ly centralized, and the financial institutions remain intermediary among traders, which makes the trading process...
Chapter
Scene understanding remains a challenging task due to the complex and ambiguous nature of scene images in defiance of several networks pre-trained on large-scale benchmark datasets are available. In this paper, we proposed a multi-scale, discriminative integrating method to aggregate both context and multi-scale object information of urban scene im...
Article
Full-text available
Recently, the advancements of Internet-of-Things (IoT) have expanded its application in underwater environment which leads to the development of a new field of Internet of Underwater Things (IoUT). It offers a broader view of applications such as atmosphere observation, habitat monitoring of sea animals, defense and disaster prediction. Data transm...
Article
Full-text available
In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most...
Article
Evolution of the Internet of Things (IoT) makes a revolution in connecting, monitoring, controlling, and managing things, objects, and almost surroundings through the Internet. To reveal the potential of IoT, rich knowledge has to be extracted, indexed, and shared securely in real-time. Recent comprehensive researches on IoT spot the light on main...
Article
Human activity recognition (HAR) has been regarded as an indispensable part of many smart home systems and smart healthcare applications. Specifically, HAR is of great importance in the Internet of Healthcare Things (IoHT), owing to the rapid proliferation of Internet of Things (IoT) technologies embedded in various smart appliances and wearable de...
Article
Sustainable energy efficient networking models are needed to satisfy the increasing demands of the information and communication technologies (ICT) applications like healthcare, smart cities, education, and so on. The futuristic sustainable computing solutions in e-healthcare applications are based on the Internet of Things (IoT) and cloud computin...
Article
Full-text available
Wireless sensor network is a hot research topic with massive applications in different domains. Generally, wireless sensor network comprises hundreds to thousands of sensor nodes, which communicate with one another by the use of radio signals. Some of the challenges exist in the design of wireless sensor network are restricted computation power, st...
Article
Your article is protected by copyright and all rights are held exclusively by Springer-Verlag GmbH Germany, part of Springer Nature. This e-offprint is for personal use only and shall not be self-archived in electronic repositories. If you wish to self-archive your article, please use the accepted manuscript version for posting on your own website....
Article
Full-text available
The rapid spread of the COVID-19 virus around the world poses a real threat to public safety. Some COVID-19 symptoms are similar to other viral chest diseases, which makes it challenging to develop models for effective detection of COVID-19 infection. This article advocates a model to differentiate between COVID-19 and other four viral chest diseas...
Article
Full-text available
One of the major drawbacks of cheminformatics is a large amount of information present in the datasets. In the majority of cases, this information contains redundant instances that affect the analysis of similarity measurements with respect to drug design and discovery. Therefore, using classical methods such as the protein bank database and quantu...
Article
In recent years, the need for high security with reliability in the wireless network has tremendously been increased. To provide high security in reliable networks, mobile ad hoc networks (MANETs) play a top role, like open network boundary, distributed network, and fast and quick implementation. By expanding the technology, the MANET faces a numbe...
Article
This article presents a novel data encryption technique suitable for Internet of Things (IoT) applications. The cryptosystem is based on the application of a Catalan object (as a cryptographic key) that provides encryption based on combinatorial structures with noncrossing or nonnested matching. The experimental part of this article includes a comp...
Article
Full-text available
Due to the advanced growth in multimedia data and Cloud Computing (CC), Secure Image Archival and Retrieval System (SIARS) on cloud has gained more interest in recent times. Content based image retrieval (CBIR) systems generally retrieve the images relevant to the query image (QI) from massive databases. However, the secure image retrieval process...
Article
Full-text available
The development of the Internet of Things (IoT) is predicted to change the healthcare industry and might lead to the rise of the Internet of Medical Things. The IoT revolution is surpassing the present-day human services with promising mechanical, financial, and social prospects. This paper investigated the security of medical images in IoT by util...
Article
Full-text available
Restoring image from motion deblur faces great challenges in the estimation of the motion blur kernel that is the key to recover the latent sharp image. In this paper, we present a method to iteratively estimate the structural image and account for the textural component. A scale-aware smoothing operation is developed to remove fine-scale edges wit...
Article
In Industrial Internet of Things applications (IIoT), fog computing has soared as a means to improve the quality of services provided to users through cloud computing, which has become overwhelmed by the massive flow of data. Transmitting all these amounts of data to the cloud and coming back with a response can cause high latency and requires high...
Article
Full-text available
The rapid development in 5G cellular and IoT technologies is expected to be deployed widespread in the next few years. At the same time, crime rates are also increasing to a greater extent while the investigation officers are held responsible to deal with a broad range of cyber and internet issues in investigations. Therefore, advanced IT technolog...
Article
Combining intelligence elements with product-service systems (PSS) has become a significant requirement because of the recent increase in customers’ demands for smart products and services. In order to have a successful smart PSS that satisfies customers’ requirements, investigation and evaluation of the innovation value propositions (IVPs) became...
Article
The booming applications of bitcoin Blockchain technologies made investors concerned about the return and risk of financial products. So, the return rate of bitcoin must be foreseen in prior. This research article devises an effective return rate prediction technique for Blockchain financial products based on Optimal Least Square Support Vector Mac...
Article
Today, management and orchestration are considered prime components of the new network management layer. Multi-domain orchestration has helped in simplifying infrastructural operations and enables better scaling and faster deployment of network services. However, resource provisioning considering network optimization and fulfillment of multi-constr...
Article
Full-text available
A cloud data center consumes more energy for computation and switching servers between modes. Virtual Machine (VM) migration enhances the execution of cloud server farm in terms of energy proficiency, adaptation to internal failure, and accessibility. Cloud suppliers, be that as it may, ought to likewise enhance for amounts like energy consumption...
Article
Full-text available
Secret Image Sharing (SIS) scheme is to encrypt a secret image into ‘n’ specious shadows. It is unable to reveal any data on the secret image if at least one of the shadows is not achieved. In this paper, wavelet-based secret image sharing scheme is proposed with encrypted shadow images using optimal Homomorphic Encryption (HE) technique. Initially...
Article
Earlier studies in the sustainable supply chain (SSC) have been introduced since its submission, yet, research of sustainable supply chain finance (SSCF) is still insufficient. Also, these studies did not consider uncertainty in corresponding with the uncertain environment of the supply chain deficiencies, the integration of sustainable development...
Research
E-GOVERNMENT APPLICATIONS FOR SMART CITIES Published by Inderscience Enterprises Ltd.
Article
Full-text available
Many countries are challenged by the medical resources required for COVID-19 detection which necessitates the development of a low-cost, rapid tool to detect and diagnose the virus effectively for a large numbers of tests. Although a chest X-Ray scan is a useful candidate tool the images generated by the scans must be analyzed accurately and quickl...
Article
In recent years, massive growth in the number of images on the web has raised the requirement of developing an effective indexing model to search digital images from a large‐scale database. Though cloud service offers effective indexing of compressed images, it remains a major issue due to the semantic gap between the user query and diverse semanti...
Article
Full-text available
Recently, neutrosophic systems modeling gained great attention in indeterminacy handling. Generating suitable membership, indeterminacy and non-membership functions for neutrosophic temperature variable in the forest fires data is a challenging problem. This paper presents a platform for integrating information theory measures with particle swarm o...
Article
Wireless sensor network (WSN) comprises a collection of sensor nodes employed to monitor and record the status of the physical environment and organize the gathered data at a central location. This paper presents a deep learning based distributed data mining (DDM) model to achieve energy efficiency and optimal load balancing at the fusion centre of...
Article
Load balancing, in Cloud Computing (CC) environment, is defined as the method of splitting workloads and computing properties. It enables the enterprises to manage workload demands or application demands by distributing the resources among computers, networks or servers. In this research article, a new load balancing algorithm is proposed as an hyb...
Article
Full-text available
Due to the rapid increase of internet-based data, there is urgent need for a robust intelligent documents security mechanism. Although there are many attempts to build a plagiarism detection system in natural language documents, the unlimited variation and different writing styles of each character in Arabic documents make building such systems cha...
Article
Full-text available
An amendment to this paper has been published and can be accessed via a link at the top of the paper.
Article
The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of data classification research. With the emergence of big data, the performance and the efficiency of the traditional k-NN algorithm is fast becoming a critical issue. The traditional k-NN algorithm is inefficient to solve the high volume multi-categorical trainin...
Article
Full-text available
The design of Two-Dimensional Infinite Input Response Filters (2D IIR) is an important task in the field of signal processing. These filters are widely used in several areas of engineering as an important tool to eliminate undesired frequencies in high-noised signals. However, 2D IIR filters have parameters that need to be calibrated in order to ob...
Article
Full-text available
Cuckoo optimization algorithm (COA) is inspired from the special and exotic lifestyle of a bird family called the cuckoo and her amazing and unique behavior in egg laying and breeding. Just like any other population-based swarm intelligence metaheuristic algorithms, the basic COA starts with a set of randomly generated solutions called “habitats.”...
Article
Full-text available
Recently, video surveillance has garnered considerable attention in various real-time applications. Due to advances in the field of machine learning, numerous techniques have been developed for multi-object detection and tracking (MODT). This paper introduces a new MODT methodology. The proposed method uses an optimal Kalman filtering technique to...
Article
Recently, medical image compression becomes essential to effectively handle large amounts of medical data for storage and communication purposes. Vector quantization (VQ) is a popular image compression technique, and the commonly used VQ model is Linde–Buzo–Gray (LBG) that constructs a local optimal codebook to compress images. The codebook constru...
Chapter
Vehicular Ad Hoc Network (VANET) is a kind of extraordinary remote ad hoc network, which has high node portability and quick topology changes. Clustering is a system for gathering nodes, making the network increasingly vigorous. With no consciousness of nodes, at some point, it comes up short on energy which causes execution issues in network and t...
Article
Physical world integration with cyber world opens the opportunity of creating smart environments; this new paradigm is called the Internet of Things (IoT). Communication between humans and objects has been extended into those between objects and objects. Industrial IoT (IIoT) takes benefits of IoT communications in business applications focusing in...
Chapter
WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, health care and military applications. Although there are a lot of secure image processing schemas designed for image transmission over a network, the limited resources and the dynamic e...
Book
This volume presents selected papers from the International Conference on Urban Intelligence and Applications (ICUIA), which took place on May 10-12, 2019 in Wuhan, China. The goal of the conference was to bring together researchers, industry leaders, policy makers, and administrators to discuss emerging technologies and their applications to advan...
Article
The rapid spread of novel coronavirus pneumonia (COVID-19) has led to a dramatically increased mortality rate worldwide. Despite many efforts, the rapid development of an effective vaccine for this novel virus will take considerable time and relies on the identification of drug-target (DT) interactions utilizing commercially available medication to...
Book
This book constitutes revised papers from the Second International Conference on Urban Intelligence and Applications, ICUIA 2020, held in August 2020. Due to the COVID-19 pandemic the conference was held online. The 26 papers were thoroughly reviewed and selected from 122 submissions. They are organised in the topical sections on technology and i...
Article
Many real-world problems are large in scale and hence difficult to address. Due to the large number of features in microarray datasets, feature selection and classification are even more challenging for such datasets. Not all of these numerous features contribute to the classification task, and some even impede performance. Through feature selectio...
Article
Full-text available
Watermarking scheme is not helpful in conveying the original image continually so as identifying the owner's mark from the watermarked image. In the current situation, our chosen topic is significant in real‐time applications like fraud recognition, emergency clinic, and government divisions. In this study, an optimal multiblind watermarking model...
Article
Full-text available
Cloud Computing (CC) and the Internet of Things (IoT) have emerged as new platforms in the ICT revolution of the twenty-first century. The adoption of the CloudIoT paradigm in the healthcare field can bring several opportunities to medical IT, and experts believe that it can significantly improve healthcare services and contribute to its continuous...
Article
Full-text available
The main objective of this paper is to help the orthopaedic in selecting the most suitable artificial intervertebral disc material that can be used in intervertebral disc replacement surgery based on the finite element method. The study uses a three-dimensional model for the lumber 4–lumber 5 spine vertebras for real patient DICOM dataset and saves...
Article
Similarity plays a significant implicit or explicit role in various fields. In some real applications in decision making, similarity may bring counterintuitive outcomes from the decision maker's standpoint. Therefore, in this research, we propose some novel similarity measures for bipolar and interval-valued bipolar neutrosophic set such as the cos...
Article
Full-text available
In our rapidly-growing big-data area, often the big sensory data from Internet of Things (IoT) cannot be sent directly to the far data-center in an efficient way because of the limitation in the network infrastructure. Fog computing, which has increasingly gained popularity for real-time applications, offers the utilization of local mini data-cente...