
Mohammad Nassef- Ph.D. Computer Science - Bioinformatics
- Professor (Associate) at Cairo University/University of Jeddah
Mohammad Nassef
- Ph.D. Computer Science - Bioinformatics
- Professor (Associate) at Cairo University/University of Jeddah
About
30
Publications
31,268
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
854
Citations
Introduction
Current institution
Cairo University/University of Jeddah
Current position
- Professor (Associate)
Additional affiliations
August 2014 - present
Publications
Publications (30)
Background and objective: Salmonella and Escherichia coli are different types of bacteria that cause food poisoning in humans. In the elderly, infants and people with chronic conditions, it is very dangerous if Salmonella or E. coli gets into the bloodstream and then they must be treated by phage therapy. Treating Salmonella and E. coli by phage th...
Cancer is a serious disease that causes death worldwide. DNA methylation (DNAm) is an epigenetic mechanism, which controls the regulation of gene expression and is useful in early detection of cancer. The challenge with DNA methylation microarray datasets is the huge number of CpG sites compared to the number of samples. Recent research efforts att...
Due to the vital role of the aberrant DNA methylation during the disease development such as cancer, the comprehension of its mechanism had become essential in the recent years for early detection and diagnosis. With the advent of the high-throughput technologies, there are still several challenges to achieve the classification process using the DN...
Cancer is a dangerous disease that causes death worldwide. Discovering few genes relevant to one cancer disease can result in effective treatments. The challenge associated with the Microarray datasets is its high dimensionality; the huge number of features compared to the modest number of samples in these datasets. Recent research efforts attempte...
Enormous number of images are generated daily in all areas of life, including social media, medical and navigation images. Moreover, the development of smart phones among other specialized media-capturing devices has witnessed great advances during the last decade. Consequently, the storage, transmission, and analysis of images become essential and...
Image encryption is essential to keep images secure either in personal devices or over the cloud drives. Various robust image cryptosystems have been implemented during the past decades to keep the encrypted images far from illegal decryption by eavesdroppers. Biological sequences contain high density information that introduce new challenges and o...
Numerous Automated Essay Scoring (AES)
systems have been developed over the past years. Recent
advances in deep learning have shown that applying neural
network approaches to AES systems has accomplished state-ofthe-art solutions. Most neural-based AES systems assign an
overall score to given essays, even if they depend on analytical
rubrics/traits...
Background
Writing composition is a significant factor for measuring test-takers’ ability in any language exam. However, the assessment (scoring) of these writing compositions or essays is a very challenging process in terms of reliability and time. The need for objective and quick scores has raised the need for a computer system that can automatic...
In the process of selecting the most appropriate classification algorithm, there are two main tasks. The determination of the factors that will be used in the selection process and the methodology that will be used to make use of these factors and decide upon the most appropriate algorithm to solve the problem. The first task is to characterize dat...
Recently, fractional edge detection algorithms have gained focus of many researchers. Most of them concern on the fractional masks implementation without optimization of threshold levels of the algorithm for each image. One of the main problems of the edge detection techniques is the choice of optimal threshold for each image. In this paper, the ge...
Background:
Chronic diseases are becoming more serious and widely spreading and this carries a heavy burden on doctors to deal with such patients. Although many of these diseases can be treated by bacteriophages, the situation is significantly dangerous in patients having concomitant more than one chronic disease, where conflicts between phages us...
Matrix factorization is one of the best approaches for collaborative filtering, because of its high accuracy in presenting users and items latent factors. The main disadvantages of matrix factorization are its complexity, and being very hard to be parallelized, specially with very large matrices. In this paper, we introduce a new method for collabo...
Matrix factorization is one of the best approaches for collaborative filtering, because of its high accuracy in presenting users and items latent factors. The main disadvantages of matrix factorization are its complexity, and being very hard to be parallelized, specially with very large matrices. In this paper, we introduce a new method for collabo...
Mycobacteriophage is a virus that infects and replicates within a mycobacteria. It infects mycobacterium species that cause serious diseases in humans such as tuberculosis. Although the benefits of mycobacteriophage in destroying mycobacteria, it has a critical effect on the human body since it can cause a disease due to its ability to colonise hum...
This paper demonstrates a computer-aided diagnosis (CAD) system for lung cancer classification of CT scans with unmarked nodules, a dataset from the Kaggle Data Science Bowl 2017. Thresholding was used as an initial segmentation approach to segment out lung tissue from the rest of the CT scan. Thresholding produced the next best lung segmentation....
This paper presents a comparative study of edge detection algorithms based on integer and fractional order differentiation. A performance comparison of the two algorithms has been proposed. Then, a soft computing technique has been applied to both algorithms for better edge detection. From the simulations, it shows that better performance is obtain...
The high dimensionality of data is a common problem in classification. In this work, a small number of significant features is investigated to classify data of two sample groups. Various feature selection and classification techniques are applied in a collection of four high-throughput DNA methylation microarray data sets. Using accuracy as a perfo...
The high dimensionality of data is a common problem in classification. In this work, a small number of significant features is investigated to classify data of two sample groups. Various feature selection and classification techniques are applied in a collection of four high-throughput DNA methylation microarray data sets. Using accuracy as a perfo...
Modern genome sequencing technologies produce enormous amount of data daily. Biologists in turn are keen to precisely explore this genomic data in order to discover effective patterns that have a real impact on the
function and evolution of living creatures. Therefore, it becomes very critical to professionally store this data in order to efficient...
Full text can be found here:
http://www.ijcaonline.org/archives/volume88/number1/15313-3624
Full text can be found here:
http://www.ijcaonline.org/archives/volume86/number8/15002-3134
Peer-to-peer (P2P) file-sharing systems are characterized by highly replicated content that is distributed among nodes with enormous aggregate resources for storage and communication. File consistency is often compromised by undesirable changes, which should be detected and corrected in a timely fashion. The artificial immune system (AIS) is a nove...
Questions
Questions (2)
Dears,
Can you kindly please provide your experience in performing key-analysis for a cryptosystem? This includes brute-force analysis, sensitivity analysis, statistical analysis ... etc.
Also, are there any tools that help in that analysis? I mean to provide the plain and encrypted file as an input and receive the key-analysis as an output.
Thanks for your time.
If they contributed to the research before their graduation but they are not postgraduate students yet.