Search Results - "Youssif, Aliaa. A. A."
-
1
Optimization of Cryptocurrency Algorithmic Trading Strategies Using the Decomposition Approach
Published in Big data and cognitive computing (01-12-2023)“…A cryptocurrency is a non-centralized form of money that facilitates financial transactions using cryptographic processes. It can be thought of as a virtual…”
Get full text
Journal Article -
2
Detection and Classification of Human-Carrying Baggage Using DenseNet-161 and Fit One Cycle
Published in Big data and cognitive computing (01-12-2022)“…In recent decades, the crime rate has significantly increased. As a result, the automatic video monitoring system has become increasingly important for…”
Get full text
Journal Article -
3
Impulsive Aggression Break, Based on Early Recognition Using Spatiotemporal Features
Published in Big data and cognitive computing (01-09-2023)“…The study of human behaviors aims to gain a deeper perception of stimuli that control decision making. To describe, explain, predict, and control behavior,…”
Get full text
Journal Article -
4
Single Image Super Resolution Model Using Learnable Weight Factor in Residual Skip Connection
Published in IEEE access (2019)“…In single image super-resolution problems, the recent feed forward deep learning architectures use residual connections in order to preserve local features and…”
Get full text
Journal Article -
5
ACWSN: an adaptive cross layer framework for video transmission over wireless sensor networks
Published in Wireless networks (01-11-2015)“…Wireless multimedia sensor networks (WMSNs), have limited resources in terms of computational, memory, bandwidth, and battery capability, which makes…”
Get full text
Journal Article -
6
Energy Aware and Adaptive Cross-Layer Scheme for Video Transmission Over Wireless Sensor Networks
Published in IEEE sensors journal (01-11-2016)“…Wireless multimedia sensor networks (WMSNs), is an ad hoc network of wirelessly connected sensor nodes that allow retrieving video and audio streams, still…”
Get full text
Journal Article -
7
Natural Genetic Engineering of Hepatitis C Virus NS5A for Immune System Counterattack
Published in Annals of the New York Academy of Sciences (01-10-2009)“…The Hepatitis C virus nonstructural 5A (NS5A) protein is a hydrophilic phosphoprotein with diverse functions. The domain assignment of NS5A had been refined…”
Get full text
Journal Article -
8
An integrated methodology for mining promiscuous proteins: a case study of an integrative bioinformatics approach for hepatitis C virus non-structural 5A protein
Published in Advances in experimental medicine and biology (2010)“…A methodology for elucidation of structural, functional, and mechanistic knowledge on promiscuous proteins is proposed that constitutes a workflow of…”
Get more information
Journal Article -
9
Automatic Enhancement of Two-Dimensional Gel electrophoresis images using Denoising Autoencoder
Published in 2019 14th International Conference on Computer Engineering and Systems (ICCES) (01-12-2019)“…Image denoising is an important preprocessing step in two-dimensional gel electrophoresis (2-DGE) that strongly affect spot detection or pixel-based methods…”
Get full text
Conference Proceeding -
10
Medical image denoising system based on stacked convolutional autoencoder for enhancing 2-dimensional gel electrophoresis noise reduction
Published in Biomedical signal processing and control (01-08-2021)“…•Stacked Convolutional Autoencoder (CAES) is proposed for denoising 2-DGE images.•CAES was never applied on real gel images before.•This system is trained…”
Get full text
Journal Article -
11
The Role of Applying Artificial Intelligence in Improving Supply Chain Management and Sustainability: Evidence from Egypt Ports
Published in International journal of mathematical, engineering and management sciences (01-10-2024)“…This study aims to determine to what extent the application of AI could optimize supply chain management and contribute to the sustainability of Egyptian…”
Get full text
Journal Article -
12
A Hybrid Approach for Co-Channel Speech Segregation based on CASA, HMM Multipitch Tracking, and Medium Frame Harmonic Model
Published 15-12-2013“…International Journal of Advanced Computer Science and Applications (IJACSA)Volume 4 Issue 7, 2013 This paper proposes a hybrid approach for co-channel speech…”
Get full text
Journal Article -
13
LIDAR Data Compression Challenges and Difficulties
Published in 2019 5th International Conference on Frontiers of Signal Processing (ICFSP) (01-09-2019)“…Airborne light detection and ranging (LIDAR) system uses in many field such as military, agriculture, geology and transportation. LIDAR data acquisition…”
Get full text
Conference Proceeding -
14
Handsets Malware Threats and Facing Techniques
Published 07-04-2012“…(IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 2, No. 12, 2011 Nowadays, mobile handsets combine the functionality of mobile…”
Get full text
Journal Article -
15
Content Aware multi-MetricRouting for MPEG-4 video over IEEE 802.11e wireless mesh networks using cross-layer approach
Published in 2014 31st National Radio Science Conference (NRSC) (01-04-2014)“…Video streams over wireless channel require stringent QoS constraints, such as low packet loss and latency. It becomes the main challenge to design a network…”
Get full text
Conference Proceeding -
16
An intelligent technique for endogenously silencing a specific human gene by siRNA
Published in 2011 E-Health and Bioengineering Conference (EHB) (01-11-2011)“…The use of short interfering RNA (siRNA) is an emerging powerful method for gene silencing. siRNA is a short RNA sequence that targets mRNA and causes the…”
Get full text
Conference Proceeding -
17
Fingerprint Recognition System Using Hybrid Matching Techniques
Published in 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007) (01-07-2007)“…With an increasing emphasis on the emerging automatic person identification application, biometrics based, especially fingerprint-based identification, is…”
Get full text
Conference Proceeding -
18
Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs)
Published in 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007) (01-07-2007)“…In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed…”
Get full text
Conference Proceeding