76 results on '"Islam Hegazy"'
Search Results
2. ENHANCED POLSAR IMAGE CLASSIFICATION USING DEEP CONVOLUTIONAL AND TEMPORAL CONVOLUTIONAL NETWORKS
- Author
-
Batool Anwar, Mohamed M. Morsey, Islam Hegazy, Zaki T. Fayed, and Taha El-Arif
- Subjects
Deep Learning ,Temporary Convolution Neural Network ,Polarimetric Synthetic Aperture Radar ,Support Vector Machine ,Satellite Image ,Industrial engineering. Management engineering ,T55.4-60.8 - Abstract
A new framework in the form of Polarimetric Synthetic Aperture Radar (PolSAR) image classification, where deep Convolutional Neural Networks (CNNs) were integrated with the traditional Machine Learning (ML) techniques under a Temporal Convolutional Network (TCN) architecture, was introduced in the paper. The main aim behind this new approach is to overcome the severe limitations inherent in both deep CNN and conventional ML approaches. The application of the sliding-window strategy eliminates the necessity of requiring extensive feature extraction procedures while reducing computational complexity simultaneously. Experiments on four benchmark PolSAR datasets for C-Band, L-Band, AIRSAR, and RADARSAT-2 data attest to the framework's remarkable classification accuracies in the range of 94.55% to 99.39%. This integrated framework is thus a significant advancement in PolSAR image analysis in offering an efficient methodology that combines the strengths of deep CNNs and traditional ML, by mitigating their respective limitations. It also combines the sliding-window technique with the architecture of TCN and then yields excellent classification accuracy with no much additional computational overhead. The results obtained thus indicate a good chance of revolutionizing the state of the art in PolSAR image classification, providing crucial efficiency improvements and making applications in environmental applications stronger, across almost all kinds of fields. more...
- Published
- 2024
Catalog
3. Attention-Driven Transfer Learning Model for Improved IoT Intrusion Detection
- Author
-
Salma Abdelhamid, Islam Hegazy, Mostafa Aref, and Mohamed Roushdy
- Subjects
attention mechanism ,deep learning ,ensemble learning ,Internet of Things ,intrusion detection ,transfer learning ,Technology - Abstract
The proliferation of Internet of Things (IoT) devices has become inevitable in contemporary life, significantly affecting myriad applications. Nevertheless, the pervasive use of heterogeneous IoT gadgets introduces vulnerabilities to malicious cyber-attacks, resulting in data breaches that jeopardize the network’s integrity and resilience. This study proposes an Intrusion Detection System (IDS) for IoT environments that leverages Transfer Learning (TL) and the Convolutional Block Attention Module (CBAM). We extensively evaluate four prominent pre-trained models, each integrated with an independent CBAM at the uppermost layer. Our methodology is validated using the BoT-IoT dataset, which undergoes preprocessing to rectify the imbalanced data distribution, eliminate redundancy, and reduce dimensionality. Subsequently, the tabular dataset is transformed into RGB images to enhance the interpretation of complex patterns. Our evaluation results demonstrate that integrating TL models with the CBAM significantly improves classification accuracy and reduces false-positive rates. Additionally, to further enhance the system performance, we employ an Ensemble Learning (EL) technique to aggregate predictions from the two best-performing models. The final findings prove that our TL-CBAM-EL model achieves superior performance, attaining an accuracy of 99.93% as well as high recall, precision, and F1-score. Henceforth, the proposed IDS is a robust and efficient solution for securing IoT networks. more...
- Published
- 2024
- Full Text
- View/download PDF
4. 1D CNN model for ECG diagnosis based on several classifiers
- Author
-
Mahmoud Bassiouni, Islam Hegazy, Nouhad Rizk, El-Sayed El-Dahshan, and Abdelbadeeh Salem
- Subjects
electrocardiogram (ecg) ,continuous wavelet transform (cwt) ,1d convolutional neural network (cnn) model ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
One of the main reasons for human death is diseases caused by the heart. Detecting heart diseases in the early stage can stop heart failure or any damage related to the heart muscle. One of the main signals that can be beneficial in the diagnosis of diseases of the heart is the electrocardiogram (ECG). This paper concentrates on the diagnosis of four types of ECG records such as myocardial infarction (MYC), normal (N), variances in the ST-segment (ST), and supraventricular arrhythmia (SV). The methodology captures the data from six main datasets, and then the ECG records are filtered using a pre-processing chain. Afterward, a proposed 1D CNN model is applied to extract features from the ECG records. Then, two different classifiers are applied to test the extracted features’ performance and obtain a robust diagnosis accuracy. The two classifiers are the softmax and random forest (RF) classifiers. An experiment is applied to diagnose the four types of ECG records. Finally, the highest performance was achieved using the RF classifier, reaching an accuracy of 98.3%. The comparison with other related works showed that the proposed methodology could be applied as a medical application for the early detection of heart diseases. more...
- Published
- 2022
- Full Text
- View/download PDF
5. Deep Investigation of the Recent Advances in Dialectal Arabic Speech Recognition.
- Author
-
Hamzah A. Alsayadi, Abdelaziz A. Abdelhamid, Islam Hegazy, Bandar Alotaibi, and Zaki Taha Fayed
- Published
- 2022
- Full Text
- View/download PDF
6. Automated Detection of COVID-19 Using Deep Learning Approaches with Paper-Based ECG Reports.
- Author
-
Mahmoud M. Bassiouni, Islam Hegazy, Nouhad Rizk, El-Sayed A. El-Dahshan, and Abdel-Badeeh M. Salem
- Published
- 2022
- Full Text
- View/download PDF
7. Development of an Effective Bootleg Videos Retrieval System as a Part of Content-Based Video Search Engine.
- Author
-
Ahmad Sedky Adly, Islam Hegazy, Taha ElArif, and M. S. Abdelwahab
- Published
- 2022
- Full Text
- View/download PDF
8. Arabic speech recognition using end‐to‐end deep learning
- Author
-
Hamzah A. Alsayadi, Abdelaziz A. Abdelhamid, Islam Hegazy, and Zaki T. Fayed
- Subjects
Telecommunication ,TK5101-6720 - Abstract
Abstract Arabic automatic speech recognition (ASR) methods with diacritics have the ability to be integrated with other systems better than Arabic ASR methods without diacritics. In this work, the application of state‐of‐the‐art end‐to‐end deep learning approaches is investigated to build a robust diacritised Arabic ASR. These approaches are based on the Mel‐Frequency Cepstral Coefficients and the log Mel‐Scale Filter Bank energies as acoustic features. To the best of our knowledge, end‐to‐end deep learning approach has not been used in the task of diacritised Arabic automatic speech recognition. To fill this gap, this work presents a new CTC‐based ASR, CNN‐LSTM, and an attention‐based end‐to‐end approach for improving diacritisedArabic ASR. In addition, a word‐based language model is employed to achieve better results. The end‐to‐end approaches applied in this work are based on state‐of‐the‐art frameworks, namely ESPnet and Espresso. Training and testing of these frameworks are performed based on the Standard Arabic Single Speaker Corpus (SASSC), which contains 7 h of modern standard Arabic speech. Experimental results show that the CNN‐LSTM with an attention framework outperforms conventional ASR and the Joint CTC‐attention ASR framework in the task of Arabic speech recognition. The CNN‐LSTM with an attention framework could achieve a word error rate better than conventional ASR and the Joint CTC‐attention ASR by 5.24% and 2.62%, respectively. more...
- Published
- 2021
- Full Text
- View/download PDF
9. Issues and Challenges for Content-Based Video Search Engines A Survey.
- Author
-
Ahmad Sedky Adly, M. S. Abdelwahab, Islam Hegazy, and Taha ElArif
- Published
- 2020
- Full Text
- View/download PDF
10. Non-diacritized Arabic speech recognition based on CNN-LSTM and attention-based models.
- Author
-
Hamzah A. Alsayadi, Abdelaziz A. Abdelhamid, Islam Hegazy, and Zaki Taha Fayed
- Published
- 2021
- Full Text
- View/download PDF
11. TUNICATE SWARM BASED CLUSTERING AND ROUTING ALGORITHM FOR INTERNET OF THINGS
- Author
-
Aya Saad Mohammed Mohammed, Islam Hegazy, and El-Sayed El-Horabty
- Subjects
General Medicine - Published
- 2023
- Full Text
- View/download PDF
12. Performance Comparisons of Content-Based Video Search Engine Retrieval Using Different Similarity Algorithms
- Author
-
Ahmad Sedky Adly, Islam Hegazy, Taha Elarif, and M. S. Abdelwahab
- Abstract
Content-based video search engines (CBVSE) are broadly needed in many mainstream video search engines retrieving videos from public video streaming services over the Internet such as YouTube. As they are mostly text-based search engines that index and retrieve videos depending on the surrounding text around the video web page that contains information representing this video file. This paper is an attempt to improve the performance of a previously developed technique for a content-based video search engine designed to firstly index videos on YouTube and search and retrieve videos using a non-semantic video query. Moreover, a large-scale dataset was indexed containing more than 1088 YouTube video records. Each record contains a feature vector of the temporal set, key-objects sets, and keyframes representing video shots in each video file in addition to the URLs and other information gathered from each video file web page. more...
- Published
- 2023
- Full Text
- View/download PDF
13. Exploiting Routing Tree Construction in CTP.
- Author
-
Islam Hegazy, Reihaneh Safavi-Naini, and Carey Williamson
- Published
- 2011
- Full Text
- View/download PDF
14. Towards securing mintroute in wireless sensor networks.
- Author
-
Islam Hegazy, Reihaneh Safavi-Naini, and Carey Williamson
- Published
- 2010
- Full Text
- View/download PDF
15. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks.
- Author
-
Rennie de Graaf, Islam Hegazy, Jeffrey Horton, and Reihaneh Safavi-Naini
- Published
- 2009
- Full Text
- View/download PDF
16. Combination of ECG and PPG Signals for Healthcare Applications: A Survey
- Author
-
Mahmoud M. Bassiouni, Islam Hegazy, Nouhad Rizk, Sayed A. El-Dahshan, and Abdelbadeeh M. Salem
- Subjects
Modeling and Simulation ,Signal Processing ,cardiovascular diseases ,sense organs - Abstract
Most health care systems use various physiological signals to provide an accurate diagnosis performance. The main common signals functional in health care applications are the electrocardiogram (ECG) and photoplethysmogram (PPG). ECG signal represents the electrical cardiac activity of the heart, while the PPG signal measures the changes in the blood volume. There are several applications in which the ECG combined with PPG can be used in the field of medical health care. This survey illustrates the various applications that combine features from the ECG and PPG signals. The review manifests the techniques, methodologies used in the data acquisition, pre-processing of the signals. The feature extraction and classification phases for both ECG and PPG are explained. The limitations, challenges, and future directions for the combined application of ECG and PPG are clarified to solve the medical problems that existed, presented, and feasible. This study aims to increase the interest in applying the combination between ECG and PPG signals in more applications and to obtain optimal measurements related to cardiac activity. more...
- Published
- 2021
- Full Text
- View/download PDF
17. COVID Detection Using ECG Image Reports: A Survey
- Author
-
Mahmoud M. Bassiouni, Islam Hegazy, Nouhad Rizk, El-Sayed A. El-Dahshan, and Abdelbadeeh M. Salem
- Published
- 2022
- Full Text
- View/download PDF
18. Data Augmentation for Arabic Speech Recognition Based on End-to-End Deep Learning
- Author
-
Hamzah A. Alsayadi, Abdelaziz A. Abdelhamid, Zaki Taha, and Islam Hegazy
- Subjects
Reduction (complexity) ,Robustness (computer science) ,business.industry ,Computer science ,Deep learning ,Speech recognition ,Word error rate ,Acoustic model ,Artificial intelligence ,Noise (video) ,Language model ,Overfitting ,business - Abstract
End-to-end deep learning approach has greatly enhanced the performance of speech recognition systems. With deep learning techniques, the overfitting stills the main problem with a little data. Data augmentation is a suitable solution for the overfitting problem, which is adopted to improve the quantity of training data and enhance robustness of the models. In this paper, we investigate data augmentation method for enhancing Arabic automatic speech recognition (ASR) based on end-to-end deep learning. Data augmentation is applied on original corpus for increasing training data by applying noise adaptation, pitch-shifting, and speed transformation. An CNN-LSTM and attention-based encoder-decoder method are included in building the acoustic model and decoding phase. This method is considered as state-of-art in end-to-end deep learning, and to the best of our knowledge, there is no prior research employed data augmentation for CNN-LSTM and attention-based model in Arabic ASR systems. In addition, the language model is built using RNN-LM and LSTM-LM methods. The Standard Arabic Single Speaker Corpus (SASSC) without diacritics is used as an original corpus. Experimental results show that applying data augmentation improved word error rate (WER) when compared with the same approach without data augmentation. The achieved average reduction in WER is 4.55%. more...
- Published
- 2021
- Full Text
- View/download PDF
19. AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach
- Author
-
Amr Amin, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy, and Islam Hegazy
- Subjects
vulnerability detection ,android applications ,static analysis ,dynamic analysis ,mobile security ,user privacy ,Information technology ,T58.5-58.64 - Abstract
The security of mobile applications has become a major research field which is associated with a lot of challenges. The high rate of developing mobile applications has resulted in less secure applications. This is due to what is called the “rush to release” as defined by Ponemon Institute. Security testing—which is considered one of the main phases of the development life cycle—is either not performed or given minimal time; hence, there is a need for security testing automation. One of the techniques used is Automated Vulnerability Detection. Vulnerability detection is one of the security tests that aims at pinpointing potential security leaks. Fixing those leaks results in protecting smart-phones and tablet mobile device users against attacks. This paper focuses on building a hybrid approach of static and dynamic analysis for detecting the vulnerabilities of Android applications. This approach is capsuled in a usable platform (web application) to make it easy to use for both public users and professional developers. Static analysis, on one hand, performs code analysis. It does not require running the application to detect vulnerabilities. Dynamic analysis, on the other hand, detects the vulnerabilities that are dependent on the run-time behaviour of the application and cannot be detected using static analysis. The model is evaluated against different applications with different security vulnerabilities. Compared with other detection platforms, our model detects information leaks as well as insecure network requests alongside other commonly detected flaws that harm users’ privacy. The code is available through a GitHub repository for public contribution. more...
- Published
- 2019
- Full Text
- View/download PDF
20. Indexed Dataset from YouTube for a Content-Based Video Search Engine
- Author
-
Ahmad Sedky Adly, M. S. Abdelwahab, Islam Hegazy, and Taha Elarif
- Subjects
Metadata ,Annotation ,Information retrieval ,Index (publishing) ,Computer science ,Event (computing) ,Shot (filmmaking) ,Feature vector ,Search engine indexing ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Object (computer science) - Abstract
Numerous researches on content-based video indexing and retrieval besides video search engines are tied to a large-scaled video dataset. Unfortunately, reduction in open-sourced datasets resulted in complications for novel approaches exploration. Although, video datasets that index video files located on public video streaming services have other purposes, such as annotation, learning, classification, and other computer vision areas, with little interest in indexing public video links for purpose of searching and retrieval. This paper introduces a novel large-scaled dataset based on YouTube video links to evaluate the proposed content-based video search engine, gathered 1088 videos, that represent more than 65 hours of video, 11,000 video shots, and 66,000 unmarked and marked keyframes, 80 different object names used for marking. Moreover, a state-of-the-art features vector, and combinational-based matching, beneficial to the accuracy, speed, and precision of the video retrieval process. Any video record in the dataset is represented by three features: temporal combination vector, object combination vector with shot annotations, and 6 keyframes, sideways with other metadata. Video classification for the dataset was also imposed to expand the efficiency of retrieval of video-based queries. A two-phased approach has been used based on object and event classification, storing video records in aggregations related to feature vectors extracted. While object aggregation stores video records with the maximal occurrence of extracted object/concept from all shots, event aggregation classify based on groups according to the number of shots per video. This study indexed 58 out of 80 different object/concept categories, each has 9 shot number groups. more...
- Published
- 2021
- Full Text
- View/download PDF
21. High-Density Polyethylene Post-consumer Waste in Natural Fiber-Reinforced Compounds
- Author
-
Amna Ramzy, Islam Hegazy, Noha Ramadan, and Ahmed Elsabbagh
- Published
- 2022
- Full Text
- View/download PDF
22. Combination of ECG And PPG Signals For Smart HealthCare Systems: Techniques, Applications, and Challenges
- Author
-
Mahmoud. M. Bassiouni, Islam Hegazy, Nouhad Rizk, El-Sayed. A. El-Dahshan, and Abdelbadeeh M. Salem
- Published
- 2021
- Full Text
- View/download PDF
23. A Survey on Learning-Based Intrusion Detection Systems for IoT Networks
- Author
-
Salma Abdelhamid, Mostafa Aref, Islam Hegazy, and Mohamed Roushdy
- Published
- 2021
- Full Text
- View/download PDF
24. Efficient Bio-Inspired Routing Algorithm for IoT
- Author
-
Aya Saad, Islam Hegazy, and El Sayed M. El-Horbaty
- Published
- 2021
- Full Text
- View/download PDF
25. Algorithm for Automatic Crack Analysis and Severity Identification
- Author
-
Islam Hegazy, Taha Elarif, and Sara Ashraf
- Subjects
Structure (mathematical logic) ,Identification (information) ,Computer science ,Information system ,Algorithm ,Maintenance engineering - Abstract
Concrete structures are increasing every day, to facilitate people's lives. With this expansion, the traditional manual maintenance method becomes unpractical, costly and time-wasting. The fast detection and maintenance of concrete surfaces defects is necessary to save people's lives, reducing maintenance cost, and increase the lifetime of concrete structures. Thus, the researches came up over the last twenty years to find an automatic way in order to maintain, apply regularly check-ups over concrete structures and assist engineers to take fast decisions. The most researches came up with high precision algorithms to allocate cracks and defects over the concrete surfaces with no human intervention. Nowadays, the computer programs can be dependable to capture large data sets of concrete structure, and then give precise locations of cracks. However, there exists a lack of researches that work on crack interpretation and automatic decision-making, which is considered as a critical part of those systems. Therefore, there exists a need for methods that describe the crack characteristics in terms of width, length, and other morphological attributes. In this paper, a crack interpretation algorithm is proposed to extract crack geometrical attributes and support the decision maker. more...
- Published
- 2019
- Full Text
- View/download PDF
26. Analyzing live migration energy overhead in cloud computing: A survey
- Author
-
Salma K. Elbay, Islam Hegazy, and El-Sayed M. El-Horabty
- Subjects
business.industry ,Computer science ,Distributed computing ,Process (computing) ,020206 networking & telecommunications ,Cloud computing ,Workload ,02 engineering and technology ,Power (physics) ,0202 electrical engineering, electronic engineering, information engineering ,Bandwidth (computing) ,Overhead (computing) ,020201 artificial intelligence & image processing ,business ,Live migration - Abstract
Live Migration is the backbone of dynamic VM consolidation in modern data centers. However, live migration process comes with a cost, including VM performance degradation, downtime and energy cost. In this work, we present and evaluate the research attempts to quantify the energy cost that accompanies live migration process. In order to measure the energy overhead, the amount of power drawn during migration and the total migration time are needed to be quantified using mathematical models. We find that the network bandwidth and the page dirtying rate varying according to the type of workload are the major factors influencing the amount of power drawn by a physical server. While the VM size and the network bandwidth are the factors affecting the total migration time. more...
- Published
- 2017
- Full Text
- View/download PDF
27. Evaluating how well agent-based IDS perform
- Author
-
Hossam Faheem, Islam Hegazy, T. Al-Arif, and T. Ahmed
- Subjects
Engineering ,business.industry ,Strategy and Management ,Distributed computing ,Multi-agent system ,Real-time computing ,Autonomous agent ,Intrusion detection system ,computer.software_genre ,Education ,Host-based intrusion detection system ,Intelligent agent ,Software agent ,Software system ,Electrical and Electronic Engineering ,business ,Agent architecture ,computer - Abstract
Intelligent agents - as a modern artificial intelligence concept - are now widely deployed in various software systems. The agent can be defined as a software entity which functions continuously and autonomously in a particular environment, able to carry out activities in a flexible and intelligent manner that is responsive to changes in the environment, and able to learn from its experience. An intrusion detection system can be decomposed into steps where an agent can perform a single or more step. But performance evaluation techniques of their use are still in the early stage. This infancy status holds especially true for agents used in intrusion detection systems (IDS) since they are new to this field. We believe that the two most important factors to measure for a given IDS are the risk time and the detection time. The risk time is the time at which the computer could be under risk of attack since the intrusion is not discovered yet. The smaller the detection time is the smaller the risk time. Thus, as a step towards a complete evaluation strategy, a simple IDS with agents was tested. more...
- Published
- 2005
- Full Text
- View/download PDF
28. A multi-agent based system for intrusion detection
- Author
-
Hossam Faheem, Zaki Taha Fayed, Islam Hegazy, and T. Al-Arif
- Subjects
Engineering ,business.industry ,Network security ,Strategy and Management ,Distributed computing ,Local area network ,Intrusion detection system ,Education ,Host-based intrusion detection system ,Interactivity ,Software agent ,Network Access Control ,Electrical and Electronic Engineering ,Intrusion prevention system ,business ,Computer network - Abstract
This article describes a framework for intrusion detection using agent-based technology. Agents are ideally qualified due to their reactivity, interactivity, autonomy and intelligence. The system discussed is implemented in a TCP/IP LAN (local area network) environment. It represents a step towards a complete multi-agent based system for networking security. more...
- Published
- 2003
- Full Text
- View/download PDF
29. Dissipation of Chlorantraniliprole in Tomato Fruits and Soil
- Author
-
Farag Malhat, Hend Abdallah, and Islam Hegazy
- Subjects
Insecticides ,Maximum Residue Limit ,Soil test ,Health, Toxicology and Mutagenesis ,fungi ,Pesticide Residues ,food and beverages ,General Medicine ,Toxicology ,Pollution ,Horticulture ,Solanum lycopersicum ,Models, Chemical ,Agronomy ,Soil Pollutants ,Ecotoxicology ,ortho-Aminobenzoates ,Environmental Monitoring ,Mathematics - Abstract
The main objective of this study was to understand the residue and persistence behaviour of new insecticide chlorantraniliprole in tomato fruit and soil samples. Its residue was analyzed by HPLC and it dissipated in tomato fruit and soil following first order kinetics. The results showed half life (t(1/2)) value of 3.30 and 3.66 days for chlorantraniliprole in tomato fruit and soil, respectively. According to maximum residue limit (MRL) the pre-harvest interval (PHI) of chlorantraniliprole on tomato was 8-days after the treatment. more...
- Published
- 2011
- Full Text
- View/download PDF
30. A Framework for Multiagent-Based System for Intrusion Detection
- Author
-
Hossam Faheem, Zaki Taha Fayed, Islam Hegazy, and T. Al-Arif
- Subjects
Interactivity ,Computer science ,Intrusion detection system ,Intrusion prevention system ,Computer security ,computer.software_genre ,computer - Abstract
Networking security demands have been considerably increased during the last few years. One of the critical networking security applications is the intrusion detection system. Intrusion detection systems should be faster enough to catch different types of intruders. This paper describes a framework for multiagent-based system for intrusion detection using the agent-based technology. Agents are ideally qualified to play an important role in intrusion detection systems due to their reactivity, interactivity, autonomy, and intelligence. The system is implemented in a real TCP/IP LAN environment. It is considered a step towards a complete multiagent based system for networking security. more...
- Published
- 2003
- Full Text
- View/download PDF
31. 1D CNN MODEL FOR ECG DIAGNOSIS BASED ON SEVERAL CLASSIFIERS.
- Author
-
BASSIOUNI, MAHMOUD M., HEGAZY, ISLAM, RIZK, NOUHAD, EL-DAHSHAN, EL-SAYED A., and SALEM, ABDELBADEEH M.
- Subjects
ARRHYTHMIA ,HEART disease diagnosis ,EARLY diagnosis ,CONVOLUTIONAL neural networks ,ELECTROCARDIOGRAPHY ,MYOCARDIUM - Abstract
One of the main reasons for human death is diseases caused by the heart. Detecting heart diseases in the early stage can stop heart failure or any damage related to the heart muscle. One of the main signals that can be beneficial in the diagnosis of diseases of the heart is the electrocardiogram (ECG). This paper concentrates on the diagnosis of four types of ECG records such as myocardial infarction (MYC), normal (N), variances in the ST-segment (ST), and supraventricular arrhythmia (SV). The methodology captures the data from six main datasets, and then the ECG records are filtered using a pre-processing chain. Afterward, a proposed 1D CNN model is applied to extract features from the ECG records. Then, two different classifiers are applied to test the extracted features’ performance and obtain a robust diagnosis accuracy. The two classifiers are the softmax and random forest (RF) classifiers. An experiment is applied to diagnose the four types of ECG records. Finally, the highest performance was achieved using the RF classifier, reaching an accuracy of 98.3%. The comparison with other related works showed that the proposed methodology could be applied as a medical application for the early detection of heart diseases. [ABSTRACT FROM AUTHOR] more...
- Published
- 2022
- Full Text
- View/download PDF
32. Attention-Driven Transfer Learning Model for Improved IoT Intrusion Detection.
- Author
-
Abdelhamid, Salma, Hegazy, Islam, Aref, Mostafa, and Roushdy, Mohamed
- Subjects
IMAGE analysis ,DATA security failures ,DEEP learning ,INTERNET of things ,DATA distribution - Abstract
The proliferation of Internet of Things (IoT) devices has become inevitable in contemporary life, significantly affecting myriad applications. Nevertheless, the pervasive use of heterogeneous IoT gadgets introduces vulnerabilities to malicious cyber-attacks, resulting in data breaches that jeopardize the network's integrity and resilience. This study proposes an Intrusion Detection System (IDS) for IoT environments that leverages Transfer Learning (TL) and the Convolutional Block Attention Module (CBAM). We extensively evaluate four prominent pre-trained models, each integrated with an independent CBAM at the uppermost layer. Our methodology is validated using the BoT-IoT dataset, which undergoes preprocessing to rectify the imbalanced data distribution, eliminate redundancy, and reduce dimensionality. Subsequently, the tabular dataset is transformed into RGB images to enhance the interpretation of complex patterns. Our evaluation results demonstrate that integrating TL models with the CBAM significantly improves classification accuracy and reduces false-positive rates. Additionally, to further enhance the system performance, we employ an Ensemble Learning (EL) technique to aggregate predictions from the two best-performing models. The final findings prove that our TL-CBAM-EL model achieves superior performance, attaining an accuracy of 99.93% as well as high recall, precision, and F1-score. Henceforth, the proposed IDS is a robust and efficient solution for securing IoT networks. [ABSTRACT FROM AUTHOR] more...
- Published
- 2024
- Full Text
- View/download PDF
33. Power-saving actionable recommendation system to minimize battery drainage in smartphones
- Author
-
Awad, Yusuf, Hegazy, Islam, and El-Horbaty, El-Sayed M.
- Published
- 2024
- Full Text
- View/download PDF
34. INDEXED DATASET FROM YOUTUBE FOR A CONTENT-BASED VIDEO SEARCH ENGINE.
- Author
-
Adly, Ahmad Sedky, Hegazy, Islam, Elarif, Taha, and Abdelwahab, M. S.
- Subjects
SEARCH engines ,STREAMING video & television ,BIG data ,COMPUTER vision - Abstract
Numerous researches on content-based video indexing and retrieval besides video search engines are tied to a large-scaled video dataset. Unfortunately, reduction in open-sourced datasets resulted in complications for novel approaches exploration. Although, video datasets that index video files located on public video streaming services have other purposes, such as annotation, learning, classification, and other computer vision areas, with little interest in indexing public video links for purpose of searching and retrieval. This paper introduces a novel large-scaled dataset based on YouTube video links to evaluate the proposed content-based video search engine, gathered 1088 videos, that represent more than 65 hours of video, 11,000 video shots, and 66,000 unmarked and marked keyframes, 80 different object names used for marking. Moreover, a state-of-the-art features vector, and combinational-based matching, beneficial to the accuracy, speed, and precision of the video retrieval process. Any video record in the dataset is represented by three features: temporal combination vector, object combination vector with shot annotations, and 6 keyframes, sideways with other metadata. Video classification for the dataset was also imposed to expand the efficiency of retrieval of video-based queries. A two-phased approach has been used based on object and event classification, storing video records in aggregations related to feature vectors extracted. While object aggregation stores video records with the maximal occurrence of extracted object/concept from all shots, event aggregation classify based on groups according to the number of shots per video. This study indexed 58 out of 80 different object/concept categories, each has 9 shot number groups. [ABSTRACT FROM AUTHOR] more...
- Published
- 2021
- Full Text
- View/download PDF
35. ENHANCED POLSAR IMAGE CLASSIFICATION USING DEEP CONVOLUTIONAL AND TEMPORAL CONVOLUTIONAL NETWORKS.
- Author
-
Anwar, Batool, Morsey, Mohamed M., Hegazy, Islam, Fayed, Zaki T., and El-Arif, Taha
- Subjects
DEEP learning ,IMAGE recognition (Computer vision) ,REMOTE-sensing images ,SUPPORT vector machines - Abstract
A new framework in the form of Polarimetric Synthetic Aperture Radar (PolSAR) image classification, where deep Convolutional Neural Networks (CNNs) were integrated with the traditional Machine Learning (ML) techniques under a Temporal Convolutional Network (TCN) architecture, was introduced in the paper. The main aim behind this new approach is to overcome the severe limitations inherent in both deep CNN and conventional ML approaches. The application of the sliding-window strategy eliminates the necessity of requiring extensive feature extraction procedures while reducing computational complexity simultaneously. Experiments on four benchmark PolSAR datasets for C-Band, L-Band, AIRSAR, and RADARSAT-2 data attest to the framework's remarkable classification accuracies in the range of 94.55% to 99.39%. This integrated framework is thus a significant advancement in PolSAR image analysis in offering an efficient methodology that combines the strengths of deep CNNs and traditional ML, by mitigating their respective limitations. It also combines the sliding-window technique with the architecture of TCN and then yields excellent classification accuracy with no much additional computational overhead. The results obtained thus indicate a good chance of revolutionizing the state of the art in PolSAR image classification, providing crucial efficiency improvements and making applications in environmental applications stronger, across almost all kinds of fields. [ABSTRACT FROM AUTHOR] more...
- Published
- 2024
- Full Text
- View/download PDF
36. PROPOSED METHODOLOGY FOR BATTERY AGING AND DRAINAGE MITIGATION.
- Author
-
Awad, Yusuf, Hegazy, Islam, and El-Horbaty, El-Sayed M.
- Subjects
MACHINE learning ,PROBLEM solving ,ELECTRONIC equipment ,ELECTRONIC waste ,LITHIUM-ion batteries - Abstract
A longer battery life is a highly sought-after feature for most smartphone users when considering their next device. However, with the emergence of new hardware technology and software applications that require heavy processing, the demand for battery power has significantly increased. Unfortunately, the development of battery technology has not kept up with the rapid advancements in smartphone hardware and software, which rely heavily on battery power. To address this issue, several approaches have been proposed to regulate battery consumption and the charging process on smartphones. In this paper, we summarize the different approaches related to this problem that managed to achieve up to a 61% increase in battery daily usage in simulation testing, highlighting their strengths, limitations, and current challenges. Furthermore, we provide a comprehensive review of various open-source datasets that have the potential to be used in developing new approaches to improve battery drainage and degradation in smartphones. We also discuss the methodology for collecting each dataset. Finally, we propose a new approach to address the current limitations and challenges to solving the problem of battery drainage and degradation that could be developed using the currently available datasets. These new approaches may involve incorporating Machine Learning (ML) techniques to predict battery charging patterns and minimize battery drainage. [ABSTRACT FROM AUTHOR] more...
- Published
- 2024
- Full Text
- View/download PDF
37. Speech Recognition Models for Holy Quran Recitation Based on Modern Approaches and Tajweed Rules: A Comprehensive Overview.
- Author
-
Al-Fadhli, Sumayya, Al-Harbi, Hajar, and Cherif, Asma
- Published
- 2023
- Full Text
- View/download PDF
38. Speech Emotions Recognition for Online Education.
- Author
-
Abdelhamid, Abdelaziz A.
- Subjects
ONLINE education ,EMOTIONS ,COVID-19 pandemic ,MACHINE learning ,SPEECH perception - Abstract
The severe circumstances caused by COVID-19 make online education the best replacement for regular face-to-face education for continuing the education process. One year ago, and till now most schools adopted online learning during this pandemic shutdown, which indicates the applicability of this teaching methodology. However, the efficiency of this method needs to be improved to guarantee its effectiveness. Although face-to-face teaching has many advantages over online education, there is a chance to promote online learning by utilizing the recent techniques of artificial intelligence. From this perspective, we propose a framework to detect and recognize emotions in the speech of students during virtual classes to keep instructors updated with the feelings of students so and can behave accordingly. The approach of detecting emotions from the speech is much more helpful for cases when turning on the cameras at the student's side could be embarrassing. This case is very common, especially for schools in Middle East countries. The proposed framework can also be applied to other similar scenarios such as online meetings. [ABSTRACT FROM AUTHOR] more...
- Published
- 2023
- Full Text
- View/download PDF
39. Automated Detection of COVID-19 Using Deep Learning Approaches with Paper-Based ECG Reports.
- Author
-
Bassiouni, Mahmoud M., Hegazy, Islam, Rizk, Nouhad, El-Dahshan, El-Sayed A., and Salem, Abdelbadeeh M.
- Subjects
COVID-19 ,DEEP learning ,CONVOLUTIONAL neural networks ,ELECTROCARDIOGRAPHY ,COVID-19 testing ,DIAGNOSIS methods ,DATA augmentation - Abstract
One of the pandemics that have caused many deaths is the Coronavirus disease 2019 (COVID-19). It first appeared in late 2019, and many deaths are increasing day by day until now. Therefore, the early diagnosis of COVID-19 has become a salient issue. Additionally, the current diagnosis methods have several demerits, and a new investigation is required to enhance the diagnosis performance. In this paper, a set of phases are performed, such as collecting data, filtering and augmenting images, extracting features, and classifying ECG images. The data were obtained from two publicly available ECG image datasets, and one of them contained COVID ECG reports. A set of preprocessing methods are applied to the ECG images, and data augmentation is performed to balance the ECG images based on the classes. A deep learning approach based on a convolutional neural network (CNN) is performed for feature extraction. Four different pre-trained models are applied, such as Vgg16, Vgg19, ResNet-101, and Xception. Moreover, an ensemble of Xception and the temporary convolutional network (TCN), which is named ECGConvnet, is proposed. Finally, the results obtained from the former models are fed to four main classifiers. These classifiers are softmax, random forest (RF), multilayer perception (MLP), and support vector machine (SVM). The former classifiers are used to evaluate the diagnosis ability of the proposed methods. The classification scenario is based on fivefold cross-validation. Seven experiments are presented to evaluate the performance of the ECGConvnet. Three of them are multi-class, and the remaining are binary class diagnosing. Six out of seven experiments diagnose COVID-19 patients. The aforementioned experimental results indicated that ECGConvnet has the highest performance over other pre-trained models, and the SVM classifier showed higher accuracy in comparison with the other classifiers. The resulting accuracies from ECGConvnet based on SVM are (99.74%, 98.6%, 99.1% on the multi-class diagnosis tasks) and (99.8% on one of the binary-class diagnoses, while the remaining achieved 100%). It is possible to develop an automatic diagnosis system for COVID based on deep learning using ECG data. [ABSTRACT FROM AUTHOR] more...
- Published
- 2022
- Full Text
- View/download PDF
40. DEEP LEARNING APPROACH BASED ON TRANSFER LEARNING WITH DIFFERENT CLASSIFIERS FOR ECG DIAGNOSIS.
- Author
-
Bassiouni, Mahmoud. M., El-Dahshan, Sayed A., Hegazy, Islam, Rizk, Nouhad, and Salem, Abdelbadeeh M.
- Subjects
DEEP learning ,ELECTROCARDIOGRAPHY ,CARDIOVASCULAR diseases ,ARRHYTHMIA ,SIGNAL processing - Abstract
Heart diseases are one of the main reasons that cause human death. The early-stage detection of heart diseases can prevent irreversible heart muscle damage or heart failure. Electrocardiogram (ECG) is one of the main heart signals that can be useful in early diagnosis because of its obvious peaks and segments. This paper focuses on using a methodology depending on deep learning for the diagnosis of the electrocardiogram records into normal (N), Supraventricular arrhythmia (SV), ST-segment changes (ST), and myocardial infarction (MYC) conditions. The continuous wavelet transform (CWT) converts the ECG signals to the time-frequency domain to compute the scalogram of the ECG signals and for the conversion of ECG signal from one dimension signal to a two-dimension image. In addition to this, a pertained model using transfer learning is applied based on Resnet50. Moreover, three main classifiers are verified to estimate the accuracy of the proposed system which are based on the Softmax, Random Forest (RF), and XGBoost classifier. An experiment is applied for the diagnosis of four main kinds of ECG records. Finally, the results based on the class-oriented schema achieved an accuracy of 98.3% based on Resnet50 with the XGBoost classifier. The comparison with the related previous work presented the excellent performance of the proposed methodology as it can be applied as a clinical application. [ABSTRACT FROM AUTHOR] more...
- Published
- 2022
- Full Text
- View/download PDF
41. Non-diacritized Arabic speech recognition based on CNN-LSTM and attention-based models.
- Author
-
Alsayadi, Hamzah A., Abdelhamid, Abdelaziz A., Hegazy, Islam, and Fayed, Zaki T.
- Subjects
AUTOMATIC speech recognition ,DEEP learning ,SEMANTICS ,SPEECH perception ,TRANSCRIPTION (Linguistics) ,ARABIC language ,ERROR rates - Abstract
Arabic language has a set of sound letters called diacritics, these diacritics play an essential role in the meaning of words and their articulations. The change in some diacritics leads to a change in the context of the sentence. However, the existence of these letters in the corpus transcription affects the accuracy of speech recognition. In this paper, we investigate the effect of diactrics on the Arabic speech recognition based end-to-end deep learning. The applied end-to-end approach includes CNN-LSTM and attention-based technique presented in the state-of-the-art framework namely, Espresso using Pytorch. In addition, and to the best of our knowledge, the approach of CNN-LSTM with attention-based has not been used in the task of Arabic Automatic speech recognition (ASR). To fill this gap, this paper proposes a new approach based on CNN-LSTM with attention based method for Arabic ASR. The language model in this approach is trained using RNN-LM and LSTM-LM and based on nondiacritized transcription of the speech corpus. The Standard Arabic Single Speaker Corpus (SASSC), after omitting the diacritics, is used to train and test the deep learning model. Experimental results show that the removal of diacritics decreased out-of-vocabulary and perplexity of the language model. In addition, the word error rate (WER) is significantly improved when compared to diacritized data. The achieved average reduction in WER is 13.52%. [ABSTRACT FROM AUTHOR] more...
- Published
- 2021
- Full Text
- View/download PDF
42. Arabic speech recognition using end‐to‐end deep learning.
- Author
-
Alsayadi, Hamzah A., Abdelhamid, Abdelaziz A., Hegazy, Islam, and Fayed, Zaki T.
- Subjects
RADAR signal processing ,SIGNAL processing ,RADAR processing ,COMPUTATIONAL complexity ,ELECTRONIC data processing - Abstract
Arabic automatic speech recognition (ASR) methods with diacritics have the ability to be integrated with other systems better than Arabic ASR methods without diacritics. In this work, the application of state‐of‐the‐art end‐to‐end deep learning approaches is investigated to build a robust diacritised Arabic ASR. These approaches are based on the Mel‐Frequency Cepstral Coefficients and the log Mel‐Scale Filter Bank energies as acoustic features. To the best of our knowledge, end‐to‐end deep learning approach has not been used in the task of diacritised Arabic automatic speech recognition. To fill this gap, this work presents a new CTC‐based ASR, CNN‐LSTM, and an attention‐based end‐to‐end approach for improving diacritisedArabic ASR. In addition, a word‐based language model is employed to achieve better results. The end‐to‐end approaches applied in this work are based on state‐of‐the‐art frameworks, namely ESPnet and Espresso. Training and testing of these frameworks are performed based on the Standard Arabic Single Speaker Corpus (SASSC), which contains 7 h of modern standard Arabic speech. Experimental results show that the CNN‐LSTM with an attention framework outperforms conventional ASR and the Joint CTC‐attention ASR framework in the task of Arabic speech recognition. The CNN‐LSTM with an attention framework could achieve a word error rate better than conventional ASR and the Joint CTC‐attention ASR by 5.24% and 2.62%, respectively. [ABSTRACT FROM AUTHOR] more...
- Published
- 2021
- Full Text
- View/download PDF
43. Data Augmentation for Arabic Speech Recognition Based on End-to-End Deep Learning.
- Author
-
Alsayadi, Hamzah A., Abdelhamid, Abdelaziz A., Hegazy, Islam, and Fayed, Zaki T.
- Subjects
DATA augmentation ,SPEECH perception ,DEEP learning ,DATA encryption ,PEARSON correlation (Statistics) - Abstract
End-to-end deep learning approach has greatly enhanced the performance of speech recognition systems. With deep learning techniques, the overfitting stills the main problem with a little data. Data augmentation is a suitable solution for the overfitting problem, which is adopted to improve the quantity of training data and enhance robustness of the models. In this paper, we investigate data augmentation method for enhancing Arabic automatic speech recognition (ASR) based on end-to-end deep learning. Data augmentation is applied on original corpus for increasing training data by applying noise adaptation, pitch-shifting, and speed transformation. An CNN-LSTM and attentionbased encoder-decoder method are included in building the acoustic model and decoding phase. This method is considered as state-of-art in end-to-end deep learning, and to the best of our knowledge, there is no prior research employed data augmentation for CNN-LSTM and attention-based model in Arabic ASR systems. In addition, the language model is built using RNN-LM and LSTM-LM methods. The Standard Arabic Single Speaker Corpus (SASSC) without diacritics is used as an original corpus. Experimental results show that applying data augmentation improved word error rate (WER) when compared with the same approach without data augmentation. The achieved average reduction in WER is 4.55%. [ABSTRACT FROM AUTHOR] more...
- Published
- 2021
- Full Text
- View/download PDF
44. An Efficient Routing Approach for Detection of Syn Flooding Attacks in Wireless Sensor Networks.
- Author
-
Sasilatha, T., Balaji, S., and Suresh Mohan Kumar, P.
- Subjects
ROUTING (Computer network management) ,WIRELESS sensor networks ,DATA transmission systems ,BANDWIDTHS ,COMPUTER network security - Abstract
In wireless environment researches on security issues in various layering level of the networks are focused recent times. One of the major issue is denial of service attacks. This paper mainly deals with the detection of syn flooding attacks which is one form of denial of service attacks in wireless sensor networks. It is a type of attack done by the attacker to a specific server to down them by flooding the requests. So, the server will be busy waiting for the requests created by the attacker. In view to this attack an efficient routing approach by distance-2 dominating set is proposed to exhibit the plan of clustering the nodes in the network for effective data transmission. The traffic limit method is used to monitor the bandwidth usage of the nodes concerned in the network to find the flooding attacks in real time event detection environment. The test cases are implemented using network simulation tool. The outcomes discussed about here are to demonstrate the packet delivery ratio, end-to-end delay and the bandwidth usage by the malicious nodes which will be high of the various other authorized nodes in the system. [ABSTRACT FROM AUTHOR] more...
- Published
- 2018
- Full Text
- View/download PDF
45. Live Migration Overhead-Aware Dynamic VM Consolidation Algorithm in Cloud Computing.
- Author
-
Elbay, Salma K., Hegazy, Islam, and El-Horbaty, El-Sayed M.
- Subjects
SERVER farms (Computer network management) ,CLOUD computing ,DISTRIBUTED computing ,VIRTUAL machine systems ,CLOUD storage - Abstract
Energy Efficiency has become a crucial concern in modern data centers. Dynamic VM consolidation is one of the effective approaches endorsed to achieve energy efficiency in cloud data centers hosting thousands of servers. Live migration is a core feature enabling VM consolidation. However, live migration is a costly operation imposing energy and performance overhead. An efficient dynamic virtual machine consolidate should consider the cost due to live migration. In this paper, we design and implement a dynamic VM consolidation algorithm based on simulated annealing that accounts for the migration cost imposed by a consolidation plan. We conduct simulation-based experiments on CloudSim using real cloud workload traces from PlanetLab to evaluate the performance of the proposed algorithm. Results show that the using the proposed algorithm, the simulated data center consumes almost the same amount of energy of that using a FF based consolidation. However, the proposed algorithm accounts for the cost due to live migration and hence, reducing SLA violations and performance degradations. [ABSTRACT FROM AUTHOR] more...
- Published
- 2018
46. Dissipation of Chlorantraniliprole in Tomato Fruits and Soil.
- Author
-
Malhat, Farag, Abdallah, Hend, and Hegazy, Islam
- Subjects
TOMATOES ,CHLORANTRANILIPROLE ,INSECTICIDE residues ,SOIL testing ,AGRICULTURAL pollution ,HIGH performance liquid chromatography - Abstract
The main objective of this study was to understand the residue and persistence behaviour of new insecticide chlorantraniliprole in tomato fruit and soil samples. Its residue was analyzed by HPLC and it dissipated in tomato fruit and soil following first order kinetics. The results showed half life (t) value of 3.30 and 3.66 days for chlorantraniliprole in tomato fruit and soil, respectively. According to maximum residue limit (MRL) the pre-harvest interval (PHI) of chlorantraniliprole on tomato was 8-days after the treatment. [ABSTRACT FROM AUTHOR] more...
- Published
- 2012
- Full Text
- View/download PDF
47. AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach.
- Author
-
Amin, Amr, Eldessouki, Amgad, Magdy, Menna Tullah, Abdeen, Nouran, Hindy, Hanan, and Hegazy, Islam
- Subjects
WEB-based user interfaces ,MOBILE apps ,INFORMATION modeling ,MULTIPURPOSE buildings ,TABLET computers ,COMPUTER security vulnerabilities - Abstract
The security of mobile applications has become a major research field which is associated with a lot of challenges. The high rate of developing mobile applications has resulted in less secure applications. This is due to what is called the "rush to release" as defined by Ponemon Institute. Security testing—which is considered one of the main phases of the development life cycle—is either not performed or given minimal time; hence, there is a need for security testing automation. One of the techniques used is Automated Vulnerability Detection. Vulnerability detection is one of the security tests that aims at pinpointing potential security leaks. Fixing those leaks results in protecting smart-phones and tablet mobile device users against attacks. This paper focuses on building a hybrid approach of static and dynamic analysis for detecting the vulnerabilities of Android applications. This approach is capsuled in a usable platform (web application) to make it easy to use for both public users and professional developers. Static analysis, on one hand, performs code analysis. It does not require running the application to detect vulnerabilities. Dynamic analysis, on the other hand, detects the vulnerabilities that are dependent on the run-time behaviour of the application and cannot be detected using static analysis. The model is evaluated against different applications with different security vulnerabilities. Compared with other detection platforms, our model detects information leaks as well as insecure network requests alongside other commonly detected flaws that harm users' privacy. The code is available through a GitHub repository for public contribution. [ABSTRACT FROM AUTHOR] more...
- Published
- 2019
- Full Text
- View/download PDF
48. Encyclopedia of Green Materials
- Author
-
Chinnappan Baskar, Seeram Ramakrishna, Angela Daniela La Rosa, Chinnappan Baskar, Seeram Ramakrishna, and Angela Daniela La Rosa
- Subjects
- Biomaterials, Materials, Catalysis, Force and energy, Refuse and refuse disposal, Biopolymers, Sustainability
- Abstract
Encyclopedia of Green Materials covers comprehensive overview, recent research and development of Green Materials and Green Nanomaterials, and their applications in all areas, including electronics, sensors, textiles, biomedical, energy and energy storage, building constructions and interiors design, automotive, green plastic manufacturing, food packing, membrane technology, wastewater treatment, rubber technology, and tire manufacturing. The contents focus on sustainable development, renewable, circular economy, Chemistry 4.0: Chemistry through innovation in transforming the world, green chemistry and green engineering, upcycling, and recycling. more...
- Published
- 2024
49. New Approaches for Multidimensional Signal Processing : Proceedings of International Workshop, NAMSP 2022
- Author
-
Roumen Kountchev, Rumen Mironov, Kazumi Nakamatsu, Roumen Kountchev, Rumen Mironov, and Kazumi Nakamatsu
- Subjects
- Signal processing, Computational intelligence, Artificial intelligence
- Abstract
This book is a collection of papers presented at the International Workshop on New Approaches for Multidimensional Signal Processing (NAMSP 2022), held at Technical University of Sofia, Sofia, Bulgaria, during 23–25 June 2022. The book covers research papers in the field of N-dimensional multicomponent image processing, multidimensional image representation and super-resolution, 3D image processing and reconstruction, MD computer vision systems, multidimensional multimedia systems, neural networks for MD image processing, data-based MD image retrieval and knowledge data mining, watermarking, hiding and encryption of MD images, MD image processing in robot systems, tensor-based data processing, 3D and multi-view visualization, forensic analysis systems for MD images and many more. more...
- Published
- 2022
50. Egypt : Revolution, Failed Transition and Counter-Revolution
- Author
-
Azmi Bishara and Azmi Bishara
- Abstract
Azmi Bishara's seminal study of the 2011 Egyptian Revolution chronicles in granular detail the lead up to the momentous uprisings and the subsequent transition and coup. The book critically investigates the social and economic conditions that formed the backdrop to the revolution and the complex challenges posed by the transition from authoritarianism to democracy.Part One,'From July Coup to January Revolution', goes back to what is called the'1952 revolution'or the'1952 Coup d'état'and traces events until 2011 when Hosni Mubarak stepped down as the president of Egypt after weeks of protest. It highlights the relationship between the presidency and the army to show that, contrary to popular belief, the presidency grew gradually stronger at the expense of other institutions, especially the army, and reached its apogee under Mubarak. Part Two'From Revolution to Coup d'Etat', covers the critical stages from when the military junta took over the governing of Egypt as the Supreme Council of the Armed Forces (SCAF), and the election of Morsi, up until the coup to overthrow his presidency. Using a democratic transition theory perspective, Azmi Bishara explains the failure of the democratic transition and how it has impacted on Arab revolutions ever since.Written while the revolutions were taking place, this book conveys a sense of immediacy and urgency as Bishara makes wide-ranging assessments with many of his forecasts corroborated in later years. The book is renowned for its use of primary source material - including interviews, statistics and public opinion polls – thus preserving the memory of the revolution and remaining one of the most comprehensive reference books on the subject to date. more...
- Published
- 2022
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.