
Mohiy M. HadhoudMenoufia University · Department of Information Technology
Mohiy M. Hadhoud
Ex Vice president for Menofia university for education and Student affairs
About
212
Publications
73,236
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,669
Citations
Introduction
Image processing, image coloring, 2D and 3D enhancement , restoration , watermarking,
Additional affiliations
January 2018 - present
NAtional Authority for quality assurance and accreditation NAQAAE
Position
- Reviewer
January 2001 - present
January 1987 - present
Publications
Publications (212)
This paper presents a simplified fractal image compression algorithm, which is implemented on a block-by-block basis. This algorithm achieves a Compression Ratio (CR) of up to 10 with a Peak Signal-to-Noise Ratio (PSNR) as high as 35 dB. Hence, it is very appropriate for the new applications of underwater communication. The idea of the proposed alg...
This paper proposes a simplified fractal image compression algorithm which is implemented on a block by block basis. This algorithm achieves a compression ratio of up to 1:10 with a peak signal to noise ratio (PSNR) as high as 35dB. The idea of the proposed algorithm is based on the segmentation of the image, first, into blocks to setup reference b...
Images compression techniques are required in digital multimedia communications systems across the internet. In order to reduce transmission time and storage cost, efficient image compression methods are needed to reduce digital data without loss for the transmitted image quality. This paper introduces a lossless object compression method based on...
The web is growing very fast; it has a very large amount of information from different types. This necessitates the need to ways to arrange and organize this vast amount of data. One of these ways is automatic Web page classification; that is used in many other applications. In this paper, the comparison between various page structural elements, wh...
Web page classification is a very important topic today; this is due to the increasing volume of data available on the World Wide Web and the heterogeneity in the formats of the data. For that, there exist a need to ways to manage and extract important knowledge from the web and to facilitate indexing and searching. This paper proposes a method for...
This paper aims to reduce the embedding errors, maintain the image fidelity, and reduce the errors, when detecting the embedded messages in images. An embedding approach is proposed that depends on using the orthogonal matrices of the Singular Value Decomposition (SVD) as a vessel for embedding information instead of embedding in the singular value...
In this paper a new lossless objects compression method for images is proposed. The proposed method first the pixels number of all objects within an image and, then, it minimizes the number of these objects without loss for the image content. This method includes three techniques to choose the objects that will be compressed. In the first technique...
Participatory sensing is an emerging paradigm in which citizens voluntarily use their mobile phones to capture and share sensed data from their surrounding environment in order to monitor and analyze some phenomena (e.g., weather, road traffic, pollution, etc.). Malicious participants can disrupt the system by contributing corrupted, fabricated, or...
Tracking objects under the presence of noise, objects with partial and full occlusions in complex environments is a challenge for classical mean shift and unscented Kalman filter algorithms. In this paper we present a new method combining mean shift algorithm with corrected background-weighted histogram (CBWH) and unscented Kalman filter (UKF). The...
The integration of privacy into reputation systems is a crucial need for building secure and reliable participatory sensing applications. Participants are given the assurance that their privacy is preserved even if they contribute some personal sensitive data. In addition, reputation systems allow an application server to monitor participants' beha...
Wireless sensor networks consist of a varying number of randomly deployed tiny sensors. One of its main applications is monitoring environmental phenomenons in remote and rugged places. In such applications, sensors are distributed with a helicopter passing over the area of study. This method of distribution causes different density subregions insi...
Sensor nodes are characterized with limited resources of processing, memory, and battery. These features motivate the researchers to propose power-aware communication protocols. Clustering is used to help for this purpose. It is used to organize the massive number of deployed sensors in the network to minimize energy consumption. Different categori...
Achieving full sensing coverage is a critical issue in wireless sensor networks applications such as military surveillance and environmental monitoring. In such applications, a large number of sensors are randomly deployed with helicopter passing over the area of interest. This method of deployment is the main reason for the emergence of holes in t...
Wireless sensor network applications are composed of a vast number of inexpensive battery-powered sensors. One of its primary applications is environmental monitoring for physical phenomena in rigid areas such as forests and volcanoes. In such applications, a large number of sensors are randomly scattered by aircraft over the area of monitoring. Th...
Augmented reality (AR) is the combination of a real scene viewed by the user and a virtual scene generated by the computer that augments the scene with additional information. The user of an AR application should feel that the augmented object is a part of the real world. One of the factors that greatly affect this condition is the tracking techniq...
This paper investigates the problem of the effectiveness of input quality on the performance evaluation of Arabic OCR systems. The experimental results show that performance for Arabic OCR systems gives accepted error rate for low noisy images and gives high error rate for images with high noises and Arabic OCR accuracy can be increased by filterin...
Speaker identification identifies the speaker among a set of users by matching against a set of voiceprints. In speaker identification, the identification time depends on the number of feature vectors, their dimensionality and the number of speakers. In this paper, text independent speaker identification model is developed by taking in MFCCs with V...
This paper introduces a fully automated approach for defect detection in patterned fabrics. First, the fabric pattern period is determined by calculating the image mean vectors in both horizontal and vertical directions. Second, Gray Level Co-occurrence matrices are calculated to both the reference defect-free image and defected image after dividin...
This paper represents a complete system for using Electrocardiogram (ECG) images for human authentication. In this study, the proposed algorithm is divided into three main stages: Pre-processing stage, feature extraction stage and classification stage. A real database is used; it consists of 120 ECG images which are collected from 20 persons. The p...
The Bi-level programming problem (BLPP) is considered to be NP-hard problem. This article introduces an effective approach based on modified Artificial Immune System (AIS) to solve nonlinear BLPP, handling by Karush-Kuhn–Tucker conditions to convert nonlinear BLPP to single objective problem and exterior penalty function to convert it to unconstrai...
Wireless sensor networks consist of a varying number of randomly deployed tiny sensors. One of its main applications is monitoring environmental phenomenons in remote and rugged places. In such applications, sensors are distributed with a helicopter passing over the area of study. This method of distribution causes different density subregions insi...
This paper is a part of comprehensive research and development towards eventually enhanced AOCR (Arabic Optical Character Recognition) accuracy. This paper presents a comparative study of four most reported as high primitive printed Arabic Character Recognition works (Hamdi et al. [1], Marwa et al. [2], Marwa et al. [3] and Andrey et al. [4]). The...
Due to the several forms of different Arabic font types, Arabic character recognition is still a challenge. Most literature works consider only one font per text what results in low recognition accuracy. This paper tends to enhance the accuracy of AOCR (Arabic Optical Character Recognition) by considering an automatic Optical Font Recognition (OFR)...
There have been a number of evaluations and comparisons between feature detectors and descriptors and between their different implementations. These detectors and descriptors respond differently depending on the image structure. In this paper, we evaluate the overall performance of the most efficient detectors and descriptors in terms of speed and...
Local feature detection and description are widely used for object recognition such as augmented reality applications. There have been a number of evaluations and comparisons between feature detectors and descriptors and between their different implementations. Those evaluations are carried out on random sets of image structures. However, feature d...
Clustering multi-dense large scale high dimensional numeric datasets is a challenging task duo to high time complexity of most clustering algorithms. Nowadays, data collection tools produce a large amount of data. So, fast algorithms are vital requirement for clustering such data. In this paper, a fast clustering algorithm, called Dimension-based P...
Clustering multi-dense large scale high dimensional datasets are a challenging task duo to scalability limits of most of clustering algorithms. Nowadays, data collection tools produce large amounts of data. So, fast and scalable algorithms are vital requirement for clustering such data. In this paper, a fast and scalable algorithm called dimension-...
Tracking objects under the presence of noise, objects with partial and full occlusions in complex environments is a challenge for classical mean shift and unscented Kalman filter algorithms. In this paper we propose a new algorithm combining mean shift algorithm with corrected background-weighted histogram (CBWH) and unscented Kalman filter (UKF)....
Quantum-inspired evolutionary algorithm is a new evolutionary algorithm using concepts and principles of quantum computing to work on classical computer rather than quantum mechanical hardware. This article introduces main concepts behind the intersection between evolutionary algorithms and quantum computing, such as quantum-bit, superposition feat...
Clustering multi-dense large scale high dimensional datasets is a challenging task duo to high time complexity of most clustering algorithms. Nowadays, data collection tools produce a large amount of data. So, fast algorithms are vital requirement for clustering such data. In this paper, a fast clustering algorithm, called Dimension-based Partition...
During the last decade, Intrusion Detection Systems (IDSs) have played an important role in defending critical computer systems and networks from cyber-attacks. Anomaly detection techniques have received a particularly great amount of attention because they offer intrinsic ability to detect unknown attacks. In this paper, we propose an enhanced hyb...
Digital image tampering becomes a common information falsification trend.Copy-Move forgery is one of the tampering types that are used. Image forgery is the science of detecting image tempering whether with a previous knowledge about the source image (active) or without (passive). In this paper, we propose a method which is efficient and fast for d...
The electrocardiogram (ECG) signal is one of the new trends techniques for human identification and authentication. So detecting all waves that formed this signal is very important for human identification and authentication. This research work proposes a new algorithm for detecting most of ECG signals like the signals that have positive R-peaks, t...
Image forgery detection is currently one of the interested research fields of image processing. Copy-Move (CM) forgery is one of the frequently used techniques. In this paper, we propose a method which is efficient and fast for detect copy-move regions. The proposed method accelerates block matching strategy. Firstly, the image is divided into fixe...
Image forgery detection is currently one of the interested research fields of image processing. Copy-Move (CM) forgery is one of the most commonly techniques. In this paper, we propose an efficient methodology for fast CM forgery detection. The proposed method accelerates blocking matching strategy. Firstly, the image is divided into fixed-size ove...
The idea of this paper is to implement an efficient block-by-block singular value (SV) decomposition digital image watermarking algorithm, which is implemented in both the spatial and transforms domains. The discrete wavelet transform (DWT), the discrete cosine transform and the discrete Fourier transform are exploited for this purpose. The origina...
Quantum inspired evolutionary algorithms are heuristic search methods, where all individuals in the search space directed to the best solution position. Using quantum gate operator with other evolutionary operators such as selection, crossover and mutation constitute a challenge in terms of their types and their parameters. In this paper we design...
An efficient algorithm for detecting frontal-view faces in color images is proposed. The proposed algorithm has a special task; it detects faces in the presence of skin-tone regions (human body, clothes, and background) Firstly, a pixel based color classifier is applied to segment the skin pixels from background. Next, a hybrid cluster algorithm is...
Regularized restoration is one of the powerful image restoration techniques because it preserves image details with a high degree of fidelity in the restored image. The main problem encountered in regularized image restoration is the evaluation of the regularization parameter. There are several methods for the evaluation of this parameter which req...
The primary goal of this paper is security management in data image transmission and storage. Because of the increased use of images in industrial operations, it is necessary to protect the secret data of the image against unauthorized access. In this paper, we introduce a novel approach for image encryption based on employing a cyclic shift and th...
Image enhancement is one of the most important issues in low-level image processing. The goal of image
enhancement is to improve the quality of an image such that enhanced image is better than the original
image. Conventional Histogram equalization (HE) is one of the most algorithms used in the contrast
enhancement of medical images, this due to it...
Wireless Sensor networks consist of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. As wireless sensor networks continue to grow, so does the need for effective security mechanisms because sensor networks may interact with sensitive data. Encryption algorithms play good roles in information secur...
The contrast enhancement of medical images has an important role in diseases diagnostic,
specially, cancer cases. Histogram equalization is considered as the most popular algorithm for
contrast enhancement according to its effectiveness and simplicity. In this paper, we present a
modified version of the Histogram Based Fast Enhancement Algorithm. T...
In this paper, we study the affect of using the spiral architecture instead of the square block decomposition in fractal compression. Comparisons with other systems like the conventional square and the simplified fractal compression systems are presented. A comparison with standard JPEG system is also introduced. We apply these types of fractal com...
The increasing use of wireless Internet and smartphone has accelerated the need for widespread computing. Smartphones stimulate growth of Global Position Systems (GPS) and mobile cloud computing. Mobile cloud computing is the cloud infrastructure where the computation and storage are moved away from mobile devices. However, smartphone mobile comput...
Common compression systems treat color image channels similarly. Nonlinear color models like Hue-Saturation -Value/ Brightness/ Luminance/ Intensity (HSV/ HSB/ HSL/ HSI) have special features for each channel. In this paper a new hybrid compression system is proposed for encoding color images in HSI color model. The proposed encoding system deals w...
This book is devoted to the issue of image super-resolution-obtaining high-resolution images from single or multiple low-resolution images. Although there are numerous algorithms available for image interpolation and super-resolution, there’s been a need for a book that establishes a common thread between the two processes. Filling this need, Image...