Papers by Sahar A. El_Rahman
Soft Computing, Jul 27, 2021
Internet of Things (IoT) can be used in the healthcare sector to exchange patients' informati... more Internet of Things (IoT) can be used in the healthcare sector to exchange patients' information, but there are many concerns about the privacy and security of the patients' confidential information or transferring this information. Data integrity is difficult to ensure since generated data from IoT devices are split into parts and stored in numerous edge servers in various locations. Data loss and improper data storage in edge servers make it difficult to ensure data integrity. The various security challenges and data integrity of edge computing can be handled by integrating blockchain (BC) technologies. BC paradigm provides a new infrastructure and security rules to enable IoT devices to get trusted interoperability for information and business. So, many healthcare institutions based on BC technology have the ability for data storage and support trust. This work aims to presents an IoT-Edge framework for the exchange of data without changing utilizing data processing and BC techniques. IoT devices can monitor follow the patient's status remotely and subsequently overcome the possibility of difficult cases. The proposed system presents many healthcare institutions' features by providing the complete preservation of patients' data with its confidential transmission and submits the results of the patient examination safely. The proposed system is user-friendly and offers the required utilities for integrity and confidentiality of information. Some simulation and performance experiments are conducted; the findings indicate an acceptable performance as an IoT-Edge framework based on BC technology.
Bookmarks Related papers MentionsView impact
IGI Global eBooks, 2021
Due to internet development, data transfer becomes faster and easier to transmit and receive diff... more Due to internet development, data transfer becomes faster and easier to transmit and receive different data types. The possibility of data loss or data modification by a third party is high. So, designing a model that allows stakeholders to share their data confidently over the internet is urgent. Steganography is a term used to hide information and an attempt to conceal the existence of embedded information in different types of multimedia. In this chapter, a steganography model is proposed to embed an image into a cover image based on DWT approach as the first phase. Then, the embedded secret image is extracted from the stego-image as the second phase. Model performance was evaluated based on signal noise ratio (SNR), PSNR, and MSE (mean square error). The proposed steganographic model based on DWT is implemented to hide confidential images about a nuclear reactor and military devices. The findings indicate that the proposed model provides a relatively high embedding payload with no visual distortion in the stego-image. It improves the security and maintains the hidden image correctness.
Bookmarks Related papers MentionsView impact
International journal of software innovation, Jul 1, 2018
Bookmarks Related papers MentionsView impact
International Journal of E-services and Mobile Applications, Jul 1, 2018
Bookmarks Related papers MentionsView impact
Soft Computing
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Providing air pollution information to individuals enables them to understand the air quality of ... more Providing air pollution information to individuals enables them to understand the air quality of their living environments. Thus, the association between people’s wellbeing and the properties of the surrounding environment is an essential area of investigation. This paper proposes Air Quality Prediction through harvesting public/open data and leveraging them to get Personal Air Quality index. These are usually incomplete. To cope with the problem of missing data, we applied KNN imputation method. To predict Personal Air Quality Index, we apply a voting regression approach based on three base regressors which are Gradient Boosting regressor, Random Forest regressor and linear regressor. Evaluating the experimental results using the RMSE metric, we got an average score of 35.39 for Walker and 51.16 for Car.
Bookmarks Related papers MentionsView impact
IEEE Access, 2021
Bookmarks Related papers MentionsView impact
Computers, Materials & Continua
Bookmarks Related papers MentionsView impact
International Journal of Computing and Digital Systems, 2016
Hyperspectral imaging is employed in a broad array of applications. The usual idea in all of thes... more Hyperspectral imaging is employed in a broad array of applications. The usual idea in all of these applications is the requirement for classification of a hyperspectral image data. Where Hyperspectral data consists of many bands - up to hundreds of bands - that cover the electromagnetic spectrum. This results in a hyperspectral data cube that contains approximately hundreds of bands - which means BIG DATA CHALLENGE. In this paper, unsupervised hyperspectral image classification algorithm, in particular, Iterative Self-Organizing Data Analysis Technique Algorithm (ISODATA) algorithm used to produce a classified image and extract agricultural information, using ENVI (Environment of Visualizing Images) that is a software application utilized to process and analyze geospatial imagery. The study area, which has been applied on is Florida, USA. Hyperspectral dataset of Florida was generated by the SAMSON sensor. In this paper, the performance was evaluated on the base of the accuracy assessment of the process after applying Principle Component Analysis (PCA) and ISODATA algorithm. The overall accuracy of the classification process is 75.6187%.
Bookmarks Related papers MentionsView impact
2019 International Conference on Computer and Information Sciences (ICCIS)
This paper proposes a comparative study using machine learning algorithms to predict the shooting... more This paper proposes a comparative study using machine learning algorithms to predict the shooting success by basketball players in the National Basketball Association (NBA). This work is focusing on analyzing NBA’s regular session dataset, which will help NBA teams to prepare their play plan for future games based on the other team players’ performance. For instance, how good is each player usually in shooting from different distance and what defense strategies they often use. In this work, Random Forest and XGBoost models are used for shooting prediction.
Bookmarks Related papers MentionsView impact
International Journal of Data Science, 2020
This paper aims to improve the quality of the patient's life and provide them with the lifest... more This paper aims to improve the quality of the patient's life and provide them with the lifestyle they need. And we have the intention to obtain this by creating a mobile application that analyzes the patient's data such as diabetes, blood pressure, and kidney. Then, implement the system to diagnose patients of chronic diseases using machine learning techniques such as classification. It's hard for the patients of chronic diseases to record their measurements on a paper every time they measure either the blood pressure or sugar level or any other disease that needs periodic measurements. The paper might be lost, and this can lead the doctor not fully to understand the case. So, the application is going to record measurements in the database. Also, it's difficult for patients to decide what to eat or how many times they should exercise according to their situation. Our idea is to recommend a lifestyle for the patient and make the doctor participate in it by writing not...
Bookmarks Related papers MentionsView impact
2019 International Conference on Fourth Industrial Revolution (ICFIR), 2019
Genetic mapping is an approach in identifying genes and processes. Genetic maps are essential too... more Genetic mapping is an approach in identifying genes and processes. Genetic maps are essential tools for analyzing DNA sequence data, not only providing a blueprint of the genome but also unlocking linkage patterns between genetic markers, chromosomal regions with more than one sequence variant. Studying these linkage patterns enables diverse applications to identifying the biological underlying feature of problems in health, agriculture, and the study of biodiversity. Genetic mapping provides a mean to understand the basis of genetic and biochemical diseases and provides genetic markers. Mapping studies can be done in a single large pedigree; the larger the number of affected individuals sampled the better the estimate of recombination between the gene causing the disease and one or more nearby genetic marker. This work proposes an algorithm for improving the methods to detect breast cancer by analyzing the DNA data and detect the issue in the DNA samples. This work based on the big data and machine learning techniques to get classifications for all samples. All samples will be classified into two main classes. This work evaluates the performance of different classification algorithms on the dataset. It also provides a website application as the tool that can help specialist predict the of breast cancer based on stated genetic mutation.
Bookmarks Related papers MentionsView impact
International Journal of Software Innovation, 2019
Data protection has become a more critical issue and the necessity to secure a transmission chann... more Data protection has become a more critical issue and the necessity to secure a transmission channel is become more serious. Therefore, steganography, the art of hidden data into a digital media in a way that embed a secret message in the cover document without permitting anyone to suspect the data existence except the intended recipient, has become a relevant topic of research. The actual challenge in steganography is how it could obtain high robustness and capacity without damaging the cover document imperceptibility. This article presents two steganography approaches that based on the Similarity of English Font Styles (SEFS). This process has the main document font style replaced by a similar font style to embed the secret message after encoding it. This is done by using 1) the upper-case letters and punctuation marks of the carrier document or 2) the white space between words, start and end letters of each word that has more than 2 letters in the carrier document. These approache...
Bookmarks Related papers MentionsView impact
International Journal of Intelligent Engineering Informatics, 2017
Bookmarks Related papers MentionsView impact
2016 Fourth International Japan-Egypt Conference on Electronics, Communications and Computers (JEC-ECC), 2016
IBM is one of the top companies in technology and business field, the aim of the research is to m... more IBM is one of the top companies in technology and business field, the aim of the research is to measure the awareness gauge of computer science students and graduates about some of the main IBM cloud solutions which are IBM Bluemix, and Watson Analytics in Saudi Arabia. The method used in the research to measure the awareness was publishing both online and paper surveys. The surveys got a total of 208 participants, they come from different universities, and with different majors in the computer science field. The survey results show that 139 out of 208 people did know about IBM company and their knowledge about the company come from colleges and social media network, but not from the IBM website or its charity and community works, also the study show that few people know about IBM solutions where (Only 16 people know about IBM Bluemix and Only 14 people know about Watson Analytics).
Bookmarks Related papers MentionsView impact
Website is a software product used by different organizations for marketing and information excha... more Website is a software product used by different organizations for marketing and information exchange. It is one of the best technologies for information system applications. Generally, universities have complex websites, which include a collection of many sub-websites related to the different sections of universities. This work employed software tools-based evaluation method and evaluator-based evaluation method to comprehensively evaluate five big university websites in Saudi Arabia that are King Saud University (KSU), King Faisal University (KFU), Princess Nourah Bint Abdulrahman University (PNU), Prince Sultan University (PSU) and Dar Al Uloom University (DAU). The evaluation involves testing sample pages related to the selected universities. This study provides an overview regarding the weakness and strengths of the five Saudi university websites. Where it aims to comprehensively evaluate the five Saudi university websites, using the software tools (WebCHECK and Sitebeam), and...
Bookmarks Related papers MentionsView impact
International Journal of Image, Graphics and Signal Processing, 2015
Bookmarks Related papers MentionsView impact
International Journal of Image, Graphics and Signal Processing, 2015
Bookmarks Related papers MentionsView impact
2010 International Computer Engineering Conference (ICENCO), 2010
Page 1. Reconstruction of High Resolution Image from a set of Blurred, Warped, Undersampled, and ... more Page 1. Reconstruction of High Resolution Image from a set of Blurred, Warped, Undersampled, and Noisy Measured Images Sahar A. EI_ Rahman, Hala A. Elqader, Mazen Selim Electrical Department, Faculty ofEngineering-Shoubra, Benha University Cairo, Egypt ...
Bookmarks Related papers MentionsView impact
Uploads
Papers by Sahar A. El_Rahman