Ahmed A. Ismail's research while affiliated with Forensic Medical Authority, Ministry Of Justice,Tanta, Egypt. and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (7)
The contemporary speed at which opinions move on social media makes them an undeniable force in the field of opinion mining (OM). This may cause the OM challenge to become more social than technical. This is when the process can determinately represent everyone to the degree they are worth. Nevertheless, considering perspectivism can result in opin...
Digital evidence is critical in cybercrime investigations because it is used to connect individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily altered, and as such, it must be protected. The Chain of Custody (CoC) is a critical component of the digital evidence procedure. The aim of the CoC is to demonstrate...
Protecting the privacy of healthcare information is an important part of encouraging data custodians to give accurate records so that mining may proceed with confidence. The application of association rule mining in healthcare data has been widespread to this point in time. Most applications focus on positive association rules, ignoring the negativ...
One main incentive for the utilization of opinion mining (OM) in social media is the impossibility of manually analyzing millions of opinions. However, applying OM for decision-making requires imitating human brain reasoning for more pragmatic results. Analyzing opinions with human-like intelligence is vital for avoiding misleading results. This oc...
Because of the increasingly dispersed existence of universal access to databases, it is important to establish security measures that allow the delicate properties of privacy and copyright rights of outsourcing databases. Researchers started studying how watermarking software would allow pervasive datasets accessing more secure work environments. I...
The use of augmented reality technologies in the healthcare sector opens up renewed possibilities. AR in medicine consists predominantly of three technical components, including camera calibration, patient registration, and object tracking. Object tracking assesses the camera or marker's spatial location on surgical instruments and is an integral a...
Finger vein technology is the biometric system that utilizes the vein structure for recognition. Finger vein recognition has gained a great deal of publicity because earlier biometric approaches experienced significant pitfalls. These include its inability to handle the imbalanced collection and failure to extract salient features for finger vein p...
Citations
... To further complicate matters, it is very unlikely that the data received by the system would be wholly complete and determinate, making it impossible to create a precise mathematical model that would represent system behavior. Non-linearity, time-varying processes to be regulated, significant unexpected external disturbances, deteriorating sensors, and other challenges to collecting accurate and trustworthy measurements all contribute to data that is incomplete and uncertain [17][18][19]. The concept of the range of neutralities is absent from fuzzy logic controller and allied logics because the focus of these logics is only on the membership or non-membership of a particular element to a certain class, and thus cannot account for the uncertainty that may arise in the data collection process for the reasons given above. ...
... For medical research to be of higher caliber, data from of the EMR system must be shared. These data are used by researchers to carry out a variety of data mining tasks [4], such as classification (predict the occurrence of diabetes), clustering (identify risks), and statistical tests (correlation between body mass index and diabetes), or query replying [5]. Healthcare researchers are anticipated to benefit from the integration of data and electronic medical records, which should also improve the actualized patient care [6]. Figure 1 displays the main applications of data mining in healthcare; see for additional details. ...
... Modern Internet communication has shifted towards microblogging, community formation (on Twitter, Facebook, and other sites), and opinion-based polling. Most of the generated information falls under the wider umbrella of text mining (TM) schemes, where the data or information are gathered from devices and distributed to different users for consumption [1]. Another field is crowdsourcing [2], which includes the involvement of public opinions, work distribution, and community shares from a large group of persons. ...
... Chain of custody is often a problem when dealing with digital evidence. The chain of custody plays a crucial role in digital forensic investigations by keeping track of every detail of digital evidence as it passes through different organisational levels [5]. Metadata on the method, time, place, and people who handled the data during its acquisition, processing, storage, and eventual use in investigations are all recorded by chain of custody. ...