about.jpg

IoT Based AI and its Implementations in Industries

The Internet of Things (IoT) is an Internet revolution that is increasingly used in business, industry, medicine, the economy and other modern information society. IoT, particularly transport, industrial robots and automation systems are supported by artificial intelligence in a wide range of daily implementations with dominant industrial applications. IoT is an interconnected network of physical objects, which enables them to gather and share information, using software, sensor units and network connectivity. In industries; IoT brought about a new revolution in industries. In the field of IoT

Artificial Intelligence
Software and Communications

Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption

Pseudo-random number generator (PRNG) are a key component in the design of modern cryptographic mechanisms and are regarded as a backbone element of many modern cryptographic applications. However and in spite of their robustness, quantum computers could crack down PNGR-based systems. Quantum walks, a universal model of quantum computation, have nonlinear properties that make them a robust candidate to produce PRNG. In this paper, we utilize controlled alternate quantum walk (CAQW) to create PRNG. Moreover, we use the presented PRNG mechanism as a component of a new quantum color image

Artificial Intelligence
Software and Communications

Combating sybil attacks in vehicular ad hoc networks

Vehicular Ad Hoc Networks (VANETs) are considered as a promising approach for facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, they are subject to an attack that has a severe impact on their security. This attack is called the Sybil attack, and it is considered as one of the most serious attacks to VANETs, and a threat to lives of drivers and passengers. In this paper, we propose a detection scheme for the Sybil attack. The idea is based on public key cryptography and aims to ensure privacy preservation, confidentiality, and non

Artificial Intelligence
Software and Communications

Complexwavelet Transform Cwt Based Video Magnification for 3d Facial Video Identification

Magnifying micro changes in motion and brightness of videos that are unnoticeable by the human visual system have recently been an interesting area to explore. In this paper, we explore this technique in 3D facial video identification, we utilize this technique to identify 3D objects from 2D images. We present a Complex Wavelet Transform CWT, 2D-Dual CWT based technique, to calculate any changes between subsequent video frames of CWT sub-bands at different spatial locations. In this technique, a gradient based method is proposed to determine the orientation of each CWT sub band in addition to

Artificial Intelligence
Software and Communications

A distributed data collection algorithm for wireless sensor networks with persistent storage nodes

A distributed data collection algorithm to accurately store and forward information obtained by wireless sensor networks is proposed. The proposed algorithm does not depend on the sensor network topology, routing tables, or geographic locations of sensor nodes, but rather makes use of uniformly distributed storage nodes. Analytical and simulation results for this algorithm show that, with high probability, the data disseminated by the sensor nodes can be precisely collected by querying any small set of storage nodes.

Artificial Intelligence
Software and Communications

Real-time scale-adaptive compressive tracking using two classification stages

In this paper, we describe a method for Scale-Adaptive visual tracking using compressive sensing. Instead of using scale-invariant-features to estimate the object size every few frames, we use the compressed features at different scale then perform a second stage of classification to detect the best-fit scale. We describe the proposed mechanism of how we implement the Bayesian Classifier used in the algorithm and how to tune the classifier to address the scaling problem and the method of selecting the positive training samples and negative training samples of different scales. The obtained

Artificial Intelligence
Software and Communications
Mechanical Design

Complete genome sequence and bioinformatics analysis of nine Egyptian females with clinical information from different geographic regions in Egypt

Egyptians are at a crossroad between Africa and Eurasia, providing useful genomic resources for analyzing both genetic and environmental factors for future personalized medicine. Two personal Egyptian whole genomes have been published previously by us and here nine female whole genome sequences with clinical information have been added to expand the genomic resource of Egyptian personal genomes. Here we report the analysis of whole genomes of nine Egyptian females from different regions using Illumina short-read sequencers. At 30x sequencing coverage, we identified 12 SNPs that were shared in

Artificial Intelligence
Healthcare

A Survey of COVID-19 Contact Tracing Apps

The recent outbreak of COVID-19 has taken the world by surprise, forcing lockdowns and straining public health care systems. COVID-19 is known to be a highly infectious virus, and infected individuals do not initially exhibit symptoms, while some remain asymptomatic. Thus, a non-negligible fraction of the population can, at any given time, be a hidden source of transmissions. In response, many governments have shown great interest in smartphone contact tracing apps that help automate the difficult task of tracing all recent contacts of newly identified infected individuals. However, tracing

Artificial Intelligence
Healthcare
Software and Communications

A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms

Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e., classical, stego protocol. On its part, quantum walks can be tailored to utilise their astounding ‘quantumness’ to propagate nonlinear chaotic behaviours as well as its sufficient sensitivity to alterations in primary key parameters both important

Artificial Intelligence
Healthcare
Software and Communications

A Theoretical Approach for Correlating Proteins to Malignant Diseases

Malignant Tumors are developed over several years due to unknown biological factors. These biological factors induce changes in the body and consequently, they lead to Malignant Tumors. Some habits and behaviors initiate these biological factors. In effect, the immune system cannot recognize a Malignant Tumor as foreign tissue. In order to discover a fascinating pattern of these habits, behaviors, and diseases and to make effective decisions, different machine learning techniques should be used. This research attempts to find the association between normal proteins (environmental factors) and

Artificial Intelligence
Healthcare
Software and Communications