Skip to main content

Research Repository

Advanced Search

All Outputs (41)

Deep learning model for fully automated breast cancer detection system from thermograms (2022)
Journal Article
Mohamed, E., Rashed, E., Gaber, T., & Karam, O. (2022). Deep learning model for fully automated breast cancer detection system from thermograms. PLoS ONE, 17(1), e0262349. https://doi.org/10.1371/journal.pone.0262349

Breast cancer is one of the most common diseases among women worldwide. It is considered one of the leading causes of death among women. Therefore, early detection is necessary to save lives. Thermography imaging is an effective diagnostic technique... Read More about Deep learning model for fully automated breast cancer detection system from thermograms.

Phishing website detection from URLs using classical machine learning ANN model (2021)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (2021). Phishing website detection from URLs using classical machine learning ANN model. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Internet), 2, 509-523. https://doi.org/10.1007/978-3-030-90022-9_28

Phishing is a serious form of online fraud made up of spoofed websites that attempt to gain users’ sensitive information by tricking them into believing that they are visiting a legitimate site. Phishing attacks can be detected many ways, including a... Read More about Phishing website detection from URLs using classical machine learning ANN model.

Phishing email detection using Natural Language Processing techniques : a literature survey (2021)
Journal Article
Salloum, S., Gaber, T., Vadera, S., & Shaalan, K. (2021). Phishing email detection using Natural Language Processing techniques : a literature survey. Procedia Computer Science, 189, 19-28. https://doi.org/10.1016/j.procs.2021.05.077

Phishing is the most prevalent method of cybercrime that convinces people to provide sensitive information; for instance, account IDs, passwords, and bank details. Emails, instant messages, and phone calls are widely used to launch such cyber-attacks... Read More about Phishing email detection using Natural Language Processing techniques : a literature survey.

Autonomous haulage systems in the mining industry: cybersecurity, communication and safety issues and challenges (2021)
Journal Article
Gaber, T., El Jazouli, Y., Eldesouky, E., & Ali, A. (2021). Autonomous haulage systems in the mining industry: cybersecurity, communication and safety issues and challenges. Electronics, 10(11), e1357. https://doi.org/10.3390/electronics10111357

The current advancement of robotics, especially in Cyber-Physical Systems (CPS), leads to a prominent combination between the mining industry and connected-embedded technologies. This progress has arisen in the form of state-of-the-art automated gian... Read More about Autonomous haulage systems in the mining industry: cybersecurity, communication and safety issues and challenges.

Acceptance of Google Meet during the spread of Coronavirus by Arab university students (2021)
Journal Article
Al-Maroof, R., Alshurideh, M., Salloum, S., AlHamad, A., & Gaber, T. (2021). Acceptance of Google Meet during the spread of Coronavirus by Arab university students. Informatics, 8(2), e24. https://doi.org/10.3390/informatics8020024

The COVID-19 pandemic not only affected our health and medical systems but also has created large disruption of education systems at school and universities levels. According to the United Nation’s report, COVID-19 has influenced more than 1.6 billio... Read More about Acceptance of Google Meet during the spread of Coronavirus by Arab university students.

A grey wolf-based method for mammographic mass classification (2020)
Journal Article
Tahoun, M., Almazroi, A., Alqarni, M., Gaber, T., Mahmoud, E., & Eltoukhy, M. (2020). A grey wolf-based method for mammographic mass classification. Applied Sciences, 10(23), e8422. https://doi.org/10.3390/app10238422

Breast cancer is one of the most prevalent cancer types with a high mortality rate in women worldwide. This devastating cancer still represents a worldwide public health concern in terms of high morbidity and mortality rates. The diagnosis of breast... Read More about A grey wolf-based method for mammographic mass classification.

Implicit authentication method for smartphone users based on rank aggregation and random forest (2020)
Journal Article
rank aggregation and random forest. Alexandria engineering journal : AEJ, 60(1), 273-283. https://doi.org/10.1016/j.aej.2020.08.006

Currently, the smartphone devices have become an essential part of our daily activities. Smartphone’ users run various essential applications (such as banking and e-health Apps), which contains very confidential information (e.g., credit card number... Read More about Implicit authentication method for smartphone users based on rank aggregation and random forest.

thermogram Breast Cancer Detection : a comparative study of two machine learning techniques (2020)
Journal Article
AlFayez, F., El-Soud, M., & Gaber, T. (2020). thermogram Breast Cancer Detection : a comparative study of two machine learning techniques. Applied Sciences, 10(2), e551. https://doi.org/10.3390/app10020551

Breast cancer is considered one of the major threats for women’s health all over the world. The World Health Organization (WHO) has reported that 1 in every 12 women could be subject to a breast abnormality during her lifetime. To increase survival r... Read More about thermogram Breast Cancer Detection : a comparative study of two machine learning techniques.

Trust-based secure clustering in WSN-based intelligent transportation systems (2018)
Journal Article
transportation systems. Computer Networks, 146, 151-158. https://doi.org/10.1016/j.comnet.2018.09.015

Increasing the number of vehicles on roads leads to congestion and safety problems. Wireless Sensor Network (WSN) is a promising technology providing Intelligent Transportation Systems (ITS) to address these problems. Usually, WSN-based applications,... Read More about Trust-based secure clustering in WSN-based intelligent transportation systems.

Automated toxicity test model based on a bio-inspired technique and AdaBoost classifier (2018)
Journal Article
Tharwat, A., Gaber, T., Hassanien, A., & Elhoseny, M. (2018). Automated toxicity test model based on a bio-inspired technique and AdaBoost classifier. Computers and Electrical Engineering, 71, 346-358. https://doi.org/10.1016/j.compeleceng.2018.07.049

Measuring toxicity is one of the most important steps to develop a new drug. During the drug development, animals are widely used to investigate the toxic effects by exposing them to the toxicants. Zebrafish embryo is one of the most suitable animals... Read More about Automated toxicity test model based on a bio-inspired technique and AdaBoost classifier.

Optimized superpixel and AdaBoost classifier for human thermal face recognition (2017)
Journal Article
Ibrahim, A., Tharwat, A., & Gaber, T. (2018). Optimized superpixel and AdaBoost classifier for human thermal face recognition. Signal, Image and Video Processing, 12(4), 711-719. https://doi.org/10.1007/s11760-017-1212-6

Infrared spectrum-based human recognition systems offer straightforward and robust solutions for achieving an excellent performance in uncontrolled illumination. In this paper, a human thermal face recognition model is proposed. The model consists of... Read More about Optimized superpixel and AdaBoost classifier for human thermal face recognition.

A wheelchair control system using human-machine interaction: single-modal and multimodal approaches (2017)
Journal Article
Shahin, M., Tharwat, A., Gaber, T., & Hassanien, A. (2017). A wheelchair control system using human-machine interaction: single-modal and multimodal approaches. Journal of Intelligent Systems, 28(1), https://doi.org/10.1515/jisys-2017-0085

Recent research studies showed that brain-controlled systems/devices are breakthrough technology. Such devices can provide disabled people with the power to control the movement of the wheelchair using different signals (e.g. EEG signals, head moveme... Read More about A wheelchair control system using human-machine interaction: single-modal and multimodal approaches.

An improved moth flame optimization algorithm based on rough sets for tomato diseases detection (2017)
Journal Article
Hassanien, A., Gaber, T., Mokhtar, U., & Hefny, H. (2017). An improved moth flame optimization algorithm based on rough sets for tomato diseases detection. Computers and Electronics in Agriculture, 136, 86-96. https://doi.org/10.1016/j.compag.2017.02.026

Plant diseases is one of the major bottlenecks in agricultural production that have bad effects on the economic of any country. Automatic detection of such disease could minimize these effects. Features selection is a usual pre-processing step used f... Read More about An improved moth flame optimization algorithm based on rough sets for tomato diseases detection.

Trust-based security models in wireless sensor networks: a survey (2017)
Journal Article
Abdelwahab, S., Gaber, T., & Wahed, M. (2017). Trust-based security models in wireless sensor networks: a survey. International Journal of Computational Intelligence Studies, 6(2/3), 245. https://doi.org/10.1504/IJCISTUDIES.2017.089057

One of the major challenges facing wireless sensor networks today is the security. The deployment of sensor nodes is usually done in unattended or hostile environment. This makes the networks susceptible to various threats. It is known that sensor no... Read More about Trust-based security models in wireless sensor networks: a survey.

Privacy-preserving Twitter-based solution for visually impaired people (2017)
Journal Article
Ahmed, D., Gaber, T., & Wahed, M. (2017). Privacy-preserving Twitter-based solution for visually impaired people. International Journal of Advanced Computer Science and Applications, 8(7), https://doi.org/10.14569/IJACSA.2017.080770

Visually impaired people is a big community all over the world. They usually seek help to perform their daily activities such as reading the expired date of food cans or medicine, reading out PIN of a certain ATM Visa, identifying the color of clothe... Read More about Privacy-preserving Twitter-based solution for visually impaired people.

Linear discriminant analysis : a detailed tutorial (2017)
Journal Article
Gaber, T., Tharwat, A., Ibrahim, A., & Hassanien, A. (2017). Linear discriminant analysis : a detailed tutorial. Ai communications : the European journal on artificial intelligence, 30(2), 169-190. https://doi.org/10.3233/AIC-170729

Linear Discriminant Analysis (LDA) is a very common technique for dimensionality reduction problems as a preprocessing step for machine learning and pattern classification applications. At the same time, it is usually used as a black box, but (so... Read More about Linear discriminant analysis : a detailed tutorial.

Consumer privacy protection in digital right management: A survey (2017)
Journal Article
Mostafa, A., Gaber, T., Eltaweel, G., & Abraham, A. (2017). Consumer privacy protection in digital right management: A survey. International journal of computer information systems and industrial management applications, 9, 218-231

Digital Right Management (DRM) is a technology used to manage the usage of the digital contentsthat distributed through the Internet, and helps the content owners to prevent un-authorized use of theircopyrighted content. Ho... Read More about Consumer privacy protection in digital right management: A survey.

One-dimensional vs. two-dimensional based features: Plant identification approach (2016)
Journal Article
Tharwat, A., Gaber, T., & Hassanien, A. (2017). One-dimensional vs. two-dimensional based features: Plant identification approach. Journal of Applied Logic, 24(Part B), 15-31. https://doi.org/10.1016/j.jal.2016.11.021

The number of endangered species has been increased due to shifts in the agricultural production, climate change, and poor urban planning. This has led to investigating new methods to address the problem of plant species identification/classification... Read More about One-dimensional vs. two-dimensional based features: Plant identification approach.

Biometric cattle identification approach based on Weber's local descriptor and AdaBoost classifier (2016)
Journal Article
Gaber, T., Tharwat, A., Hassanien, A., & Snasel, V. (2016). Biometric cattle identification approach based on Weber's local descriptor and AdaBoost classifier. Computers and Electronics in Agriculture, 122, https://doi.org/10.1016/j.compag.2015.12.022

In this paper, we proposed a new and robust biometric-based approach to identify head of cattle. This approach used the Weber Local Descriptor (WLD) to extract robust features from cattle muzzle print images (images from 31 head of cattle were used).... Read More about Biometric cattle identification approach based on Weber's local descriptor and AdaBoost classifier.