![Lamiaa Elrefaei](https://i1.rgstatic.net/ii/profile.image/543999587225600-1506711016961_Q128/Lamiaa-Elrefaei.jpg)
Lamiaa ElrefaeiBenha University · Department of Electrical Engineering
Lamiaa Elrefaei
Ph.D.
About
69
Publications
90,839
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,081
Citations
Introduction
Additional affiliations
February 2018 - August 2020
Publications
Publications (69)
Human action recognition has been identified as an important research topic in computer vision because it is an essential form of communication and interplay between computers and humans to assist computers in automatically recognizing human behaviors and accurately comprehending human intentions. Inspired by some keyframe extraction and multifeatu...
Intelligent systems are being proposed every day as advances in cloud systems are increasing. Mostly, the services offered by these cloud systems are dependent only on their providers, without the inclusion of services from other providers, specialized third parties, or individuals. This ‘vendor lock-in’ issue and the limitations related to offerin...
Lung diseases refer to a group of disorders that
affect the lungs and respiratory system. Several factors, such
as genetics, environmental pollution, infections, and smok-
ing can these. Lung diseases include coronavirus (COVID-
19), pneumonia, asthma, and chronic obstructive pulmonary
disease (COPD). Lung diseases cause significant damage to
lung...
Human action recognition has been identified as an important research topic in computer vision because it is an essential form of communication and interplay between computers and humans. To assist computers in automatically recognizing human behaviors and accurately comprehending human intentions. Inspired by some keyframe extraction and multifeat...
Visual Question Answering (VQA) is the problem of automatically answering a natural language question about a given image or video. Standard Arabic is the sixth most spoken language around the world. However, to the best of our knowledge, there are neither research attempts nor datasets for VQA in Arabic. In this paper, we generate the first Visual...
This paper explores the application of a deep neural network (DNN) framework to human gait analysis for injury classification. The paper aims to identify whether a subject is healthy or has an injury of the ankle, knee, hip, or heel solely based on ground reaction force plate measurements. We consider how three DNNs-the multi-layer perceptron (MLP)...
Thoracic diseases refer to disorders that affect the lungs, heart, and other parts of the rib cage, such as pneumonia, novel coronavirus disease (COVID-19), tuberculosis, cardiomegaly, and fracture. Millions of people die every year from thoracic diseases. Therefore, early detection of these diseases is essential and can save many lives. Earlier, o...
The automatic classification and retrieval of images is a challenging task, especially when dealing with low-quality and faded inks images, such as the historical manuscripts. Therefore, in this study we develop a reinforcement learning agent that is capable of interacting with an environment including historical Arabic manuscript images and retrie...
With the rapid growth of surveillance cameras in many public places to mon-itor human activities such as in malls, streets, schools and, prisons, there is a strong demand for such systems to detect violence events automatically. Au-tomatic analysis of video to detect violence is significant for law enforce-ment. Moreover, it helps to avoid any soci...
Lip-reading technologies are rapidly progressing following the breakthrough of deep learning. It plays a vital role in its many applications, such as: Human-machine communication practices or security applications. In this paper, we propose to develop an effective lip-reading recognitionmodel for Arabic visual speech recognition by implementing dee...
Privacy plays an important role in biometric authentication systems. Touch authentication systems have been widely used since touch devices reached their current level of development. In this work, a fuzzy commitment scheme (FCS) is proposed based on deep learning (DL) to protect the touch-gesture template in a touch authentication system. The bina...
Technology has significantly emerged in various fields, including healthcare, government, and education. In the education field, students of all ages and backgrounds turn to modern technologies for learning instead of traditional methods, especially under challenging courses such as mathematics. However, students face many problems in understanding...
Recently, deep learning (DL) has been utilized successfully in different fields, achieving remarkable results. Thus, there is a noticeable focus on DL approaches to automate software engineering (SE) tasks such as maintenance, requirement extraction, and classification. An advanced utilization of DL is the ensemble approach, which aims to reduce er...
Interactive learning tools can facilitate the learning process and increase student engagement, especially tools such as computer programs that are designed for human-computer interaction. Thus, this paper aims to help students learn five different methods for solving nonlinear equations using an interactive learning tool designed with common princ...
Recently, surveillance cameras are deployed in many public places to monitor human activities. Detecting violence in videos through automatic analysis means significant for law enforcement. But almost many monitoring systems require to manually identify violent scenes in the video which leads to slow response. However, violence detection is a chall...
Nowadays, technology has become an essential part of our daily life. It has proven its effectiveness in many areas. One of these areas is education, where interactive educational tools have appeared to facilitate many complex scientific concepts. Meanwhile, singular value decomposition (SVD) is a linear transformation method used in many applicatio...
In Requirement Engineering, software requirements are classified into two main categories: Functional Requirement (FR) and Non-Functional Requirement (NFR). FR describes user and system goals. NFR includes all constraints on services and functions. Deeper classification of those two categories facilitates the software development process. There are...
With the increasing amounts of existing unorganized images on the internet today and the necessity to use them efficiently in various types of applications. There is a critical need to discover rigid models that can classify and predict images successfully and instantaneously. Therefore, this study aims to collect Arabic manuscripts images in a dat...
Deep learning is an evolutionary advancement in the field of machine learning. The technique has been adopted in several areas where the computer after processing volumes of data are expected to make intelligent decisions. An important field of application for deep learning is the area of biometrics wherein the patterns within the uniquely human tr...
Chromosome analysis is an essential task in a cytogenetics lab, where cytogeneticists can diagnose whether there are abnormalities or not. Karyotyping is a standard technique in chromosome analysis that classifies metaphase image to 24 chromosome classes. The main two categories of chromosome abnormalities are structural abnormalities that are chan...
The instantaneous search and retrieval of the most relevant images to a specific query image is a desirable application for all digital libraries. The automatic extraction and classification according to the most distinguishable features, is a crucial step to detect the similarities among images successfully. This study introduces a novel approach...
Nowadays, the engagement of deep neural networks in computer vision increases the ability to achieve higher accuracy in many learning tasks, such as face recognition and detection. However, the automatic estimation of human age is still considered as the most challenging facial task that demands extra efforts to obtain an accepted accuracy for real...
Advancements in biometrics have attained relatively high recognition rates. However, the need for a biometric system that is reliable, robust, and convenient remains. Systems that use palmprints (PP) for verification have a number of benefits including stable line features, reduced distortion and simple self-positioning. Dorsal hand veins (DHVs) ar...
With the rapid growth of surveillance cameras in many public places to mon-itor human activities such as in malls, streets, schools and, prisons, there is a strong demand for such systems to detect violence events automatically. Au-tomatic analysis of video to detect violence is significant for law enforce-ment. Moreover, it helps to avoid any soci...
Person re-identification systems (person Re-ID) have recently gained more attention between computer vision researchers. They are playing a key role in intelligent visual surveillance systems and have widespread applications like applications for public security. The person Re-ID systems can identify if a person has been seen by a non-overlapping c...
In this paper, a fuzzy commitment scheme is applied with a machine vision gait-based biometric system to enhance system security. The proposed biometric cryptosystem has two phases: enrolment and verification. Each of them comprises three main stages: feature extraction, reliable components extraction, and fuzzy commitment scheme. Gait features are...
Face recognition (FR) is defined as the process through which people are identified using facial images. This technology is applied broadly in biometrics, security information, accessing controlled areas, keeping of the law by different enforcement bodies, smart cards, and surveillance technology. The facial recognition system is built using two st...
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize persons with a high degree of assurance. Extracting effective features is the most important stage in the iris recognition system. Different features have been used to perform iris recognition system. A lot of them are based on hand-crafted feat...
Recently, a vast attention has grown in the field of computer vision and especially in face recognition, detection and facial landmarks localization. Many significant features can be directly derived from human face such as age, gender and race. Estimating the age can be defined as the automatic process of classifying the facial image into the exac...
In this paper, we propose a dorsal hand vein recognition system using Convolutional Neural Network (CNN). This system is automatically learned how to extract features from original image without preprocessing. The proposed system has two approaches: the first one is using the pre-trained CNN models (AlexNet, VGG16 and VGG19) for extracting features...
The purpose of this paper is to investigate the applicability of applying gamification approach on the physiotherapy rehabilitation. A new developing game called JCave was designed and developed for the prove of concept. The propose game target the children from six to twelve years of age who need physical therapy in their upper limbs. JCave is a f...
The purpose of this paper is to investigate the applicability of applying gamification approach on the physiotherapy rehabilitation. A new developing game called JCave was designed and developed for the prove of concept. The propose game target the children from six to twelve years of age who need physical therapy in their upper limbs. JCave is a f...
Chromosome’s segmentation is an essential step in the automated chromosome classification system. It is important for chromosomes to be separated from noise or background before the identification and classification. Chromosomes image (Metaphase) is generated in the third phase of mitosis. During metaphase, the cell’s chromosomes arrange themselves...
Visual speech recognition (VSR) has received increasing attention in recent decades due to its potential uses in many applications. As for any recognition system, useful materials for training and testing are required. For VSR system development, the training and testing materials are videos representing the visual speech of the words. This paper p...
Bloxorz is a block sliding puzzle game that can be categorized as a pathfinding problem. Pathfinding problems are well known problems in Artificial Intelligence field. In this paper, we proposed a single agent implementation to solve level-1 of Bloxorz game using Informed and Uninformed searching algorithms: Breadth-First Search (BFS), Depth-First...
Arabic manuscripts are worthy sources of knowledge that have been highly underutilized. Because, the vast content of the
Arabic manuscript and the need of getting information from them, in a fast, efficient, and accurate way, it is essential to develop a
system that supports the retrieval procedure from them. In this paper, a Content-Based Image Re...
p class="0abstract">Color blind is a type of Color Vision Deficiency, which is the inability that a person could not realize the differences between some colors. There are three types of color blindness: Monochromacy, Dichromacy, and Anomalous Trichromacy. Color blind cannot be cured. Today, technology gets up with solutions to help people with col...
Smartphones have become an important way to store sensitive information; therefore, users’ privacy needs to be highly protected. This can be done by using the most reliable and accurate biometric identification system available today: iris recognition. This paper develops and tests an iris recognition system for smartphones. The system uses eye ima...
Text-images still have a great importance, despite the spread of electronic texts. Text-images are protected using digital watermarking. This paper proposes a watermarking method applied to text-images. This method integrates two transforms: integer wavelet transform (IWT) and discrete cosine transform (DCT). For the watermark embedding, IWT is per...
Iris is a powerful tool for reliable human identification. It has the potential to identify individuals with a high degree of assurance. Iris recognition is considered to be the most trustable and accurate biometric identification system among all physical biometrics. Extracting good features is the most significant step in iris recognition system....
This paper proposes a dynamic authentication of smartphone users based on their gestures on touchscreen. The user authentication consists of three stages: collecting touch gestures’ data, extracting features, and classification. Tapping, scrolling, dragging and zooming gestures’ data are acquired using a developed android application. Then, feature...
This paper presents a multimodal biometric system implemented using MATLAB language. The system was fused between fingerprint and hand geometry at matching score level by applying a proposed modified weighted sum rule. The fingerprint system was tested using five FVC databases and the hand geometry system was tested using COEP database. Hence, the...
In this paper a criminal detection framework that could help policemen to recognize the face of a criminal or a suspect is proposed. The framework is a client-server video based face recognition surveillance in the real-time. The framework applies face detection and tracking using Android mobile devices at the client side and video based face recog...
Object detection and recognition is an important task in many computer vision applications. In this paper an Android application was developed using Eclipse IDE and OpenCV3 Library. This application is able to detect objects in an image that is loaded from the mobile gallery, based on its color, shape, or local features. The image is processed in t...
Digital watermarking is used to protect text copyright and to detect unauthorized use. In this paper, two invisible blind watermarking methods for Arabic text are proposed. Since the pseudo-space is very small space used to force the connected characters to be isolated, it is added to the word space to hide binary bit “0” or “1”. In the first propo...
Abstract—Nanotechnology is enabling the development of miniature devices able to perform simple tasks at the nanoscale. The interconnection of such nano-devices with traditional wire- less networks and ultimately the Internet enables a new network- ing paradigm known as the Internet of Nano-Things (IoNT). De- spite their promising applications, nan...
The issue of protecting scientific and intellectual
products and publications ownership constitutes an important
deal within the domain of securing and protecting information.
Digital watermarking is used to identify the ownership of the
copyright and in authentication process. In this paper, an
invisible blind watermarking method utilizing the wor...
This paper presents a user verification system on mobile phones that is based on keystroke dynamics derived from a touchable keyboard. The touch keystroke dynamics dataset are collected using a developed mobile application in which, unlike other systems, no specific text is required. Two scenarios were considered: few-training and more-training dat...
This paper introduces a system based on image processing to obtain efficiently and accurately reading of the electricity digital meter. In this system the back camera of the mobile phones is used to acquire the image of the electricity meter. The system then applies a sequence of image processing functions to automatically extract and recognize the...
The using of the internet with its technologies and applications have been
increased rapidly. So, protecting the text from illegal use is too needed .
Text watermarking is used for this purpose. Arabic text has many
characteristics such existing of diacritics , kashida (extension character) and
points above or under its letters .Each of Arabic lett...
Nanonetworks consist of nano-sized communicating devices which are able to perform simple tasks at the nanoscale. The limited capabilities of individual nanomachines and the Terahertz (THz) band channel behavior lead to error-prone wireless links. In this paper, a cross-layer analysis of error-control strategies for nanonetworks in the THz band is...
In this paper a user verification system on mobile
phones is proposed. This system is based on behavioral
biometric traits which is a keystroke dynamics derived from a
touchable keyboard. A mobile application is developed for
collecting those touch keystroke dynamics. In contrast to other
systems, no specific text or numbers are used to build our
d...
Most of fingerprint identification systems perform
matching algorithms based on different minutiae details present
in the fingerprint. Usually, minutiae are extracted from the
thinned fingerprint image. Due to the image noise and different
preprocessing methods, the thinned image could results in a large
number of false minutiae which may decrease...
Coin detection and recognition applications play an important role in computer vision and in industry. Many applications have been developed to detect coins and estimate its corresponding values either by camera picture or mobile devices. This paper proposes a system that uses number of computer vision techniques to detect and recognize coins appli...
This paper proposes a new blind, robust image watermarking for copyright protection and ownership verification in the DCT domain. The owner information is in the form of a logo image. Two different watermarking systems are considered. The first one is based on the principle of spread spectrum communication, in which we propose an adaptive direct se...