Mohammad Nassef

Mohammad Nassef
  • Ph.D. Computer Science - Bioinformatics
  • Professor (Associate) at Cairo University/University of Jeddah

About

30
Publications
31,268
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
854
Citations
Current institution
Cairo University/University of Jeddah
Current position
  • Professor (Associate)
Additional affiliations
August 2014 - present
Cairo University
Position
  • Lecturer

Publications

Publications (30)
Article
Background and objective: Salmonella and Escherichia coli are different types of bacteria that cause food poisoning in humans. In the elderly, infants and people with chronic conditions, it is very dangerous if Salmonella or E. coli gets into the bloodstream and then they must be treated by phage therapy. Treating Salmonella and E. coli by phage th...
Article
Full-text available
Cancer is a serious disease that causes death worldwide. DNA methylation (DNAm) is an epigenetic mechanism, which controls the regulation of gene expression and is useful in early detection of cancer. The challenge with DNA methylation microarray datasets is the huge number of CpG sites compared to the number of samples. Recent research efforts att...
Article
Full-text available
Due to the vital role of the aberrant DNA methylation during the disease development such as cancer, the comprehension of its mechanism had become essential in the recent years for early detection and diagnosis. With the advent of the high-throughput technologies, there are still several challenges to achieve the classification process using the DN...
Article
Cancer is a dangerous disease that causes death worldwide. Discovering few genes relevant to one cancer disease can result in effective treatments. The challenge associated with the Microarray datasets is its high dimensionality; the huge number of features compared to the modest number of samples in these datasets. Recent research efforts attempte...
Article
Full-text available
Enormous number of images are generated daily in all areas of life, including social media, medical and navigation images. Moreover, the development of smart phones among other specialized media-capturing devices has witnessed great advances during the last decade. Consequently, the storage, transmission, and analysis of images become essential and...
Article
Full-text available
Image encryption is essential to keep images secure either in personal devices or over the cloud drives. Various robust image cryptosystems have been implemented during the past decades to keep the encrypted images far from illegal decryption by eavesdroppers. Biological sequences contain high density information that introduce new challenges and o...
Article
Full-text available
Numerous Automated Essay Scoring (AES) systems have been developed over the past years. Recent advances in deep learning have shown that applying neural network approaches to AES systems has accomplished state-ofthe-art solutions. Most neural-based AES systems assign an overall score to given essays, even if they depend on analytical rubrics/traits...
Article
Full-text available
Background Writing composition is a significant factor for measuring test-takers’ ability in any language exam. However, the assessment (scoring) of these writing compositions or essays is a very challenging process in terms of reliability and time. The need for objective and quick scores has raised the need for a computer system that can automatic...
Article
Full-text available
In the process of selecting the most appropriate classification algorithm, there are two main tasks. The determination of the factors that will be used in the selection process and the methodology that will be used to make use of these factors and decide upon the most appropriate algorithm to solve the problem. The first task is to characterize dat...
Article
Full-text available
Recently, fractional edge detection algorithms have gained focus of many researchers. Most of them concern on the fractional masks implementation without optimization of threshold levels of the algorithm for each image. One of the main problems of the edge detection techniques is the choice of optimal threshold for each image. In this paper, the ge...
Article
Background: Chronic diseases are becoming more serious and widely spreading and this carries a heavy burden on doctors to deal with such patients. Although many of these diseases can be treated by bacteriophages, the situation is significantly dangerous in patients having concomitant more than one chronic disease, where conflicts between phages us...
Article
Full-text available
Matrix factorization is one of the best approaches for collaborative filtering, because of its high accuracy in presenting users and items latent factors. The main disadvantages of matrix factorization are its complexity, and being very hard to be parallelized, specially with very large matrices. In this paper, we introduce a new method for collabo...
Preprint
Matrix factorization is one of the best approaches for collaborative filtering, because of its high accuracy in presenting users and items latent factors. The main disadvantages of matrix factorization are its complexity, and being very hard to be parallelized, specially with very large matrices. In this paper, we introduce a new method for collabo...
Article
Mycobacteriophage is a virus that infects and replicates within a mycobacteria. It infects mycobacterium species that cause serious diseases in humans such as tuberculosis. Although the benefits of mycobacteriophage in destroying mycobacteria, it has a critical effect on the human body since it can cause a disease due to its ability to colonise hum...
Article
Full-text available
This paper demonstrates a computer-aided diagnosis (CAD) system for lung cancer classification of CT scans with unmarked nodules, a dataset from the Kaggle Data Science Bowl 2017. Thresholding was used as an initial segmentation approach to segment out lung tissue from the rest of the CT scan. Thresholding produced the next best lung segmentation....
Conference Paper
Full-text available
This paper presents a comparative study of edge detection algorithms based on integer and fractional order differentiation. A performance comparison of the two algorithms has been proposed. Then, a soft computing technique has been applied to both algorithms for better edge detection. From the simulations, it shows that better performance is obtain...
Conference Paper
The high dimensionality of data is a common problem in classification. In this work, a small number of significant features is investigated to classify data of two sample groups. Various feature selection and classification techniques are applied in a collection of four high-throughput DNA methylation microarray data sets. Using accuracy as a perfo...
Chapter
Full-text available
The high dimensionality of data is a common problem in classification. In this work, a small number of significant features is investigated to classify data of two sample groups. Various feature selection and classification techniques are applied in a collection of four high-throughput DNA methylation microarray data sets. Using accuracy as a perfo...
Book
Modern genome sequencing technologies produce enormous amount of data daily. Biologists in turn are keen to precisely explore this genomic data in order to discover effective patterns that have a real impact on the function and evolution of living creatures. Therefore, it becomes very critical to professionally store this data in order to efficient...
Article
Full-text available
Full text can be found here: http://www.ijcaonline.org/archives/volume88/number1/15313-3624
Article
Full-text available
Full text can be found here: http://www.ijcaonline.org/archives/volume86/number8/15002-3134
Article
Peer-to-peer (P2P) file-sharing systems are characterized by highly replicated content that is distributed among nodes with enormous aggregate resources for storage and communication. File consistency is often compromised by undesirable changes, which should be detected and corrected in a timely fashion. The artificial immune system (AIS) is a nove...

Questions

Questions (2)
Question
Dears,
Can you kindly please provide your experience in performing key-analysis for a cryptosystem? This includes brute-force analysis, sensitivity analysis, statistical analysis ... etc.
Also, are there any tools that help in that analysis? I mean to provide the plain and encrypted file as an input and receive the key-analysis as an output.
Thanks for your time.
Question
If they contributed to the research before their graduation but they are not postgraduate students yet.

Network

Cited By