about.jpg

Instance Segmentation of 2D Label-Free Microscopic Images using Deep Learning

The precise detection and segmentation of cells in microscopic image sequences is an essential task in biomedical research, such as drug discovery and studying the development of tissues, organs, or entire organisms. However, the detection and segmentation of cells in phase contrast images with a halo and shade-off effects is still challenging. Lately, Mask Regional Convolutional Neural Network (Mask R-CNN) has been introduced for object detection and instance segmentation of natural images. This study investigates the efficacy of the Mask R-CNN to instantly detect and segment label-free

Artificial Intelligence
Healthcare
Innovation, Entrepreneurship and Competitiveness

Survey of Code Reuse Attacks and Comparison of Mitigation Techniques

Code-Reuse Attacks (CRAs) are solid mechanisms to bypass advanced software and hardware defenses. Due to vulnerabilities found in software which allows attackers to corrupt the memory space of the vulnerable software to modify maliciously the contents of the memory; hence controlling the software to be able to run arbitrary code. The CRAs defenses either prevents the attacker from reading program code, controlling program memory space directly or indirectly through the usage of pointers. This paper provides a thorough evaluation of the current mitigation techniques against CRAs with regards to

Artificial Intelligence
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Strain correction in interleaved strain-encoded (SENC) cardiac MR

The strain encoding (SENC) technique directly encodes regional strain of the heart into the acquired MR images and produces two images with two different tunings so that longitudinal strain, on the short-axis view, or circumferential strain on the long-axis view, are measured. Interleaving acquisition is used to shorten the acquisition time of the two tuned images by 50%, but it suffers from errors in the strain calculations due to inter-tunings motion of the heart. In this work, we propose a method to correct for the inter-tunings motion by estimating the motion-induced shift in the spatial

Artificial Intelligence
Healthcare
Software and Communications
Innovation, Entrepreneurship and Competitiveness

New governance framework to secure cloud computing

Cloud computing is enabling proper, on-demand network access to a shared pool of computing resources that is elastic in reserve and release with minimal interaction from cloud service provider. As cloud gains maturity, cloud service providers are becoming more competitive, which increase the percentage of cloud adoption. But security remains the most cited challenge in Cloud. So, while we are progressing in cloud adoption, we have to define key elements of our cloud strategy and governance. Governance is about applying policies relating to used services. Therefore, it has to include the

Software and Communications
Innovation, Entrepreneurship and Competitiveness

Streaming support for data intensive cloud-based sequence analysis

Cloud computing provides a promising solution to the genomics data deluge problem resulting from the advent of next-generation sequencing (NGS) technology. Based on the concepts of "resources-on-demand" and "pay-as-you-go", scientists with no or limited infrastructure can have access to scalable and cost-effective computational resources. However, the large size of NGS data causes a significant data transfer latency from the client's site to the cloud, which presents a bottleneck for using cloud computing services. In this paper, we provide a streaming-based scheme to overcome this problem
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Named entity recognition of persons' names in Arabic tweets

The rise in Arabic usage within various socialmedia platforms, and notably in Twitter, has led to a growing interest in building ArabicNatural Language Processing (NLP) applications capable of dealing with informal colloquialArabic, as it is the most commonly used form of Arabic in social media. The uniquecharacteristics of the Arabic language make the extraction of Arabic named entities achallenging task, to which, the nature of tweets adds new dimensions. The majority ofprevious research done on Arabic NER focused on extracting entities from the formallanguage, namely Modern Standard Arabic

Software and Communications
Innovation, Entrepreneurship and Competitiveness

Survey and taxonomy of information-centric vehicular networking security attacks

Information Centric Networks (ICNs) overcome the current IP-based networks weakness and aim to ensure efficient data distribution. The Main ICN features are location-independent naming, in-network caching, name-based routing, built-in security, and high mobility. ICN vehicular networks stratify the ICN architecture on the Vehicular Ad hoc Networks (VANETs) to reinforce a massive amount of data transmission and handle the critical time interests inside the vehicular networks while taking into consideration the vehicles’ high mobility. Original Equipment Manufacturers (OEMs) gather the real-time

Artificial Intelligence
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Neural Machine Based Mobile Applications Code Translation

Although many cross platform mobile development software used a trans-compiler-based approach, it was very difficult to generalize it to work in both directions. For example, to convert between Java for Android Development and Swift for iOS development and vice versa. This is due to the need of writing a specific parser for each source language, and a specific code generator for each destination language. Neural network-based models are used successfully to translate between natural languages, including English, French, German any many others by providing enough datasets and without the need

Artificial Intelligence
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Interactive 3D visualization for wireless sensor networks

Wireless sensor networks open up a new realm of ubiquitous computing applications based on distributed large-scale data collection by embedded sensor nodes that are wirelessly connected and seamlessly integrated within the environment. 3D visualization of sensory data is a challenging issue, however, due to the large number of sensors used in typical deployments, continuous data streams, and constantly varying network topology. This paper describes a practical approach for interactive 3D visualization of wireless sensor network data. A regular 3D grid is reconstructed using scattered sensor

Software and Communications
Innovation, Entrepreneurship and Competitiveness

Myocardial segmentation using contour-constrained optical flow tracking

Despite the important role of object tracking using the Optical Flow (OF) in computer graphics applications, it has a limited role in segmenting speckle-free medical images such as magnetic resonance images of the heart. In this work, we propose a novel solution of the OF equation that allows incorporating additional constraints of the shape of the segmented object. We formulate a cost function that include the OF constraint in addition to myocardial contour properties such as smoothness and elasticity. The method is totally different from the common naïve combination of OF estimation within

Healthcare
Software and Communications
Innovation, Entrepreneurship and Competitiveness