Lamiaa Elrefaei

Lamiaa Elrefaei
Benha University · Department of Electrical Engineering

Ph.D.

About

69
Publications
90,839
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,081
Citations
Additional affiliations
February 2018 - August 2020
King Abdulaziz University
Position
  • Professor (Associate)

Publications

Publications (69)
Article
Full-text available
Human action recognition has been identified as an important research topic in computer vision because it is an essential form of communication and interplay between computers and humans to assist computers in automatically recognizing human behaviors and accurately comprehending human intentions. Inspired by some keyframe extraction and multifeatu...
Article
Full-text available
Intelligent systems are being proposed every day as advances in cloud systems are increasing. Mostly, the services offered by these cloud systems are dependent only on their providers, without the inclusion of services from other providers, specialized third parties, or individuals. This ‘vendor lock-in’ issue and the limitations related to offerin...
Conference Paper
Full-text available
Lung diseases refer to a group of disorders that affect the lungs and respiratory system. Several factors, such as genetics, environmental pollution, infections, and smok- ing can these. Lung diseases include coronavirus (COVID- 19), pneumonia, asthma, and chronic obstructive pulmonary disease (COPD). Lung diseases cause significant damage to lung...
Preprint
Full-text available
Human action recognition has been identified as an important research topic in computer vision because it is an essential form of communication and interplay between computers and humans. To assist computers in automatically recognizing human behaviors and accurately comprehending human intentions. Inspired by some keyframe extraction and multifeat...
Article
Full-text available
Visual Question Answering (VQA) is the problem of automatically answering a natural language question about a given image or video. Standard Arabic is the sixth most spoken language around the world. However, to the best of our knowledge, there are neither research attempts nor datasets for VQA in Arabic. In this paper, we generate the first Visual...
Article
Full-text available
This paper explores the application of a deep neural network (DNN) framework to human gait analysis for injury classification. The paper aims to identify whether a subject is healthy or has an injury of the ankle, knee, hip, or heel solely based on ground reaction force plate measurements. We consider how three DNNs-the multi-layer perceptron (MLP)...
Article
Full-text available
Thoracic diseases refer to disorders that affect the lungs, heart, and other parts of the rib cage, such as pneumonia, novel coronavirus disease (COVID-19), tuberculosis, cardiomegaly, and fracture. Millions of people die every year from thoracic diseases. Therefore, early detection of these diseases is essential and can save many lives. Earlier, o...
Article
Full-text available
The automatic classification and retrieval of images is a challenging task, especially when dealing with low-quality and faded inks images, such as the historical manuscripts. Therefore, in this study we develop a reinforcement learning agent that is capable of interacting with an environment including historical Arabic manuscript images and retrie...
Preprint
Full-text available
With the rapid growth of surveillance cameras in many public places to mon-itor human activities such as in malls, streets, schools and, prisons, there is a strong demand for such systems to detect violence events automatically. Au-tomatic analysis of video to detect violence is significant for law enforce-ment. Moreover, it helps to avoid any soci...
Article
Full-text available
Lip-reading technologies are rapidly progressing following the breakthrough of deep learning. It plays a vital role in its many applications, such as: Human-machine communication practices or security applications. In this paper, we propose to develop an effective lip-reading recognitionmodel for Arabic visual speech recognition by implementing dee...
Article
Full-text available
Privacy plays an important role in biometric authentication systems. Touch authentication systems have been widely used since touch devices reached their current level of development. In this work, a fuzzy commitment scheme (FCS) is proposed based on deep learning (DL) to protect the touch-gesture template in a touch authentication system. The bina...
Article
Full-text available
Technology has significantly emerged in various fields, including healthcare, government, and education. In the education field, students of all ages and backgrounds turn to modern technologies for learning instead of traditional methods, especially under challenging courses such as mathematics. However, students face many problems in understanding...
Article
Full-text available
Recently, deep learning (DL) has been utilized successfully in different fields, achieving remarkable results. Thus, there is a noticeable focus on DL approaches to automate software engineering (SE) tasks such as maintenance, requirement extraction, and classification. An advanced utilization of DL is the ensemble approach, which aims to reduce er...
Article
Full-text available
Interactive learning tools can facilitate the learning process and increase student engagement, especially tools such as computer programs that are designed for human-computer interaction. Thus, this paper aims to help students learn five different methods for solving nonlinear equations using an interactive learning tool designed with common princ...
Article
Recently, surveillance cameras are deployed in many public places to monitor human activities. Detecting violence in videos through automatic analysis means significant for law enforcement. But almost many monitoring systems require to manually identify violent scenes in the video which leads to slow response. However, violence detection is a chall...
Chapter
Nowadays, technology has become an essential part of our daily life. It has proven its effectiveness in many areas. One of these areas is education, where interactive educational tools have appeared to facilitate many complex scientific concepts. Meanwhile, singular value decomposition (SVD) is a linear transformation method used in many applicatio...
Article
Full-text available
In Requirement Engineering, software requirements are classified into two main categories: Functional Requirement (FR) and Non-Functional Requirement (NFR). FR describes user and system goals. NFR includes all constraints on services and functions. Deeper classification of those two categories facilitates the software development process. There are...
Article
Full-text available
With the increasing amounts of existing unorganized images on the internet today and the necessity to use them efficiently in various types of applications. There is a critical need to discover rigid models that can classify and predict images successfully and instantaneously. Therefore, this study aims to collect Arabic manuscripts images in a dat...
Chapter
Deep learning is an evolutionary advancement in the field of machine learning. The technique has been adopted in several areas where the computer after processing volumes of data are expected to make intelligent decisions. An important field of application for deep learning is the area of biometrics wherein the patterns within the uniquely human tr...
Article
Full-text available
Chromosome analysis is an essential task in a cytogenetics lab, where cytogeneticists can diagnose whether there are abnormalities or not. Karyotyping is a standard technique in chromosome analysis that classifies metaphase image to 24 chromosome classes. The main two categories of chromosome abnormalities are structural abnormalities that are chan...
Article
Full-text available
The instantaneous search and retrieval of the most relevant images to a specific query image is a desirable application for all digital libraries. The automatic extraction and classification according to the most distinguishable features, is a crucial step to detect the similarities among images successfully. This study introduces a novel approach...
Article
Full-text available
Nowadays, the engagement of deep neural networks in computer vision increases the ability to achieve higher accuracy in many learning tasks, such as face recognition and detection. However, the automatic estimation of human age is still considered as the most challenging facial task that demands extra efforts to obtain an accepted accuracy for real...
Article
Full-text available
Advancements in biometrics have attained relatively high recognition rates. However, the need for a biometric system that is reliable, robust, and convenient remains. Systems that use palmprints (PP) for verification have a number of benefits including stable line features, reduced distortion and simple self-positioning. Dorsal hand veins (DHVs) ar...
Conference Paper
With the rapid growth of surveillance cameras in many public places to mon-itor human activities such as in malls, streets, schools and, prisons, there is a strong demand for such systems to detect violence events automatically. Au-tomatic analysis of video to detect violence is significant for law enforce-ment. Moreover, it helps to avoid any soci...
Article
Full-text available
Person re-identification systems (person Re-ID) have recently gained more attention between computer vision researchers. They are playing a key role in intelligent visual surveillance systems and have widespread applications like applications for public security. The person Re-ID systems can identify if a person has been seen by a non-overlapping c...
Article
Full-text available
In this paper, a fuzzy commitment scheme is applied with a machine vision gait-based biometric system to enhance system security. The proposed biometric cryptosystem has two phases: enrolment and verification. Each of them comprises three main stages: feature extraction, reliable components extraction, and fuzzy commitment scheme. Gait features are...
Article
Full-text available
Face recognition (FR) is defined as the process through which people are identified using facial images. This technology is applied broadly in biometrics, security information, accessing controlled areas, keeping of the law by different enforcement bodies, smart cards, and surveillance technology. The facial recognition system is built using two st...
Article
Full-text available
Iris is one of the common biometrics used for identity authentication. It has the potential to recognize persons with a high degree of assurance. Extracting effective features is the most important stage in the iris recognition system. Different features have been used to perform iris recognition system. A lot of them are based on hand-crafted feat...
Article
Full-text available
Recently, a vast attention has grown in the field of computer vision and especially in face recognition, detection and facial landmarks localization. Many significant features can be directly derived from human face such as age, gender and race. Estimating the age can be defined as the automatic process of classifying the facial image into the exac...
Article
Full-text available
In this paper, we propose a dorsal hand vein recognition system using Convolutional Neural Network (CNN). This system is automatically learned how to extract features from original image without preprocessing. The proposed system has two approaches: the first one is using the pre-trained CNN models (AlexNet, VGG16 and VGG19) for extracting features...
Preprint
Full-text available
The purpose of this paper is to investigate the applicability of applying gamification approach on the physiotherapy rehabilitation. A new developing game called JCave was designed and developed for the prove of concept. The propose game target the children from six to twelve years of age who need physical therapy in their upper limbs. JCave is a f...
Article
Full-text available
The purpose of this paper is to investigate the applicability of applying gamification approach on the physiotherapy rehabilitation. A new developing game called JCave was designed and developed for the prove of concept. The propose game target the children from six to twelve years of age who need physical therapy in their upper limbs. JCave is a f...
Chapter
Chromosome’s segmentation is an essential step in the automated chromosome classification system. It is important for chromosomes to be separated from noise or background before the identification and classification. Chromosomes image (Metaphase) is generated in the third phase of mitosis. During metaphase, the cell’s chromosomes arrange themselves...
Article
Full-text available
Visual speech recognition (VSR) has received increasing attention in recent decades due to its potential uses in many applications. As for any recognition system, useful materials for training and testing are required. For VSR system development, the training and testing materials are videos representing the visual speech of the words. This paper p...
Article
Full-text available
Bloxorz is a block sliding puzzle game that can be categorized as a pathfinding problem. Pathfinding problems are well known problems in Artificial Intelligence field. In this paper, we proposed a single agent implementation to solve level-1 of Bloxorz game using Informed and Uninformed searching algorithms: Breadth-First Search (BFS), Depth-First...
Article
Full-text available
Arabic manuscripts are worthy sources of knowledge that have been highly underutilized. Because, the vast content of the Arabic manuscript and the need of getting information from them, in a fast, efficient, and accurate way, it is essential to develop a system that supports the retrieval procedure from them. In this paper, a Content-Based Image Re...
Article
Full-text available
p class="0abstract">Color blind is a type of Color Vision Deficiency, which is the inability that a person could not realize the differences between some colors. There are three types of color blindness: Monochromacy, Dichromacy, and Anomalous Trichromacy. Color blind cannot be cured. Today, technology gets up with solutions to help people with col...
Article
Full-text available
Smartphones have become an important way to store sensitive information; therefore, users’ privacy needs to be highly protected. This can be done by using the most reliable and accurate biometric identification system available today: iris recognition. This paper develops and tests an iris recognition system for smartphones. The system uses eye ima...
Article
Full-text available
Text-images still have a great importance, despite the spread of electronic texts. Text-images are protected using digital watermarking. This paper proposes a watermarking method applied to text-images. This method integrates two transforms: integer wavelet transform (IWT) and discrete cosine transform (DCT). For the watermark embedding, IWT is per...
Article
Full-text available
Iris is a powerful tool for reliable human identification. It has the potential to identify individuals with a high degree of assurance. Iris recognition is considered to be the most trustable and accurate biometric identification system among all physical biometrics. Extracting good features is the most significant step in iris recognition system....
Article
Full-text available
This paper proposes a dynamic authentication of smartphone users based on their gestures on touchscreen. The user authentication consists of three stages: collecting touch gestures’ data, extracting features, and classification. Tapping, scrolling, dragging and zooming gestures’ data are acquired using a developed android application. Then, feature...
Article
Full-text available
This paper presents a multimodal biometric system implemented using MATLAB language. The system was fused between fingerprint and hand geometry at matching score level by applying a proposed modified weighted sum rule. The fingerprint system was tested using five FVC databases and the hand geometry system was tested using COEP database. Hence, the...
Conference Paper
Full-text available
In this paper a criminal detection framework that could help policemen to recognize the face of a criminal or a suspect is proposed. The framework is a client-server video based face recognition surveillance in the real-time. The framework applies face detection and tracking using Android mobile devices at the client side and video based face recog...
Article
Full-text available
Object detection and recognition is an important task in many computer vision applications. In this paper an Android application was developed using Eclipse IDE and OpenCV3 Library. This application is able to detect objects in an image that is loaded from the mobile gallery, based on its color, shape, or local features. The image is processed in t...
Article
Full-text available
Digital watermarking is used to protect text copyright and to detect unauthorized use. In this paper, two invisible blind watermarking methods for Arabic text are proposed. Since the pseudo-space is very small space used to force the connected characters to be isolated, it is added to the word space to hide binary bit “0” or “1”. In the first propo...
Article
Abstract—Nanotechnology is enabling the development of miniature devices able to perform simple tasks at the nanoscale. The interconnection of such nano-devices with traditional wire- less networks and ultimately the Internet enables a new network- ing paradigm known as the Internet of Nano-Things (IoNT). De- spite their promising applications, nan...
Conference Paper
Full-text available
The issue of protecting scientific and intellectual products and publications ownership constitutes an important deal within the domain of securing and protecting information. Digital watermarking is used to identify the ownership of the copyright and in authentication process. In this paper, an invisible blind watermarking method utilizing the wor...
Article
Full-text available
This paper presents a user verification system on mobile phones that is based on keystroke dynamics derived from a touchable keyboard. The touch keystroke dynamics dataset are collected using a developed mobile application in which, unlike other systems, no specific text is required. Two scenarios were considered: few-training and more-training dat...
Conference Paper
Full-text available
This paper introduces a system based on image processing to obtain efficiently and accurately reading of the electricity digital meter. In this system the back camera of the mobile phones is used to acquire the image of the electricity meter. The system then applies a sequence of image processing functions to automatically extract and recognize the...
Article
Full-text available
The using of the internet with its technologies and applications have been increased rapidly. So, protecting the text from illegal use is too needed . Text watermarking is used for this purpose. Arabic text has many characteristics such existing of diacritics , kashida (extension character) and points above or under its letters .Each of Arabic lett...
Article
Full-text available
Nanonetworks consist of nano-sized communicating devices which are able to perform simple tasks at the nanoscale. The limited capabilities of individual nanomachines and the Terahertz (THz) band channel behavior lead to error-prone wireless links. In this paper, a cross-layer analysis of error-control strategies for nanonetworks in the THz band is...
Conference Paper
Full-text available
In this paper a user verification system on mobile phones is proposed. This system is based on behavioral biometric traits which is a keystroke dynamics derived from a touchable keyboard. A mobile application is developed for collecting those touch keystroke dynamics. In contrast to other systems, no specific text or numbers are used to build our d...
Conference Paper
Full-text available
Most of fingerprint identification systems perform matching algorithms based on different minutiae details present in the fingerprint. Usually, minutiae are extracted from the thinned fingerprint image. Due to the image noise and different preprocessing methods, the thinned image could results in a large number of false minutiae which may decrease...
Conference Paper
Full-text available
Coin detection and recognition applications play an important role in computer vision and in industry. Many applications have been developed to detect coins and estimate its corresponding values either by camera picture or mobile devices. This paper proposes a system that uses number of computer vision techniques to detect and recognize coins appli...
Conference Paper
Full-text available
This paper proposes a new blind, robust image watermarking for copyright protection and ownership verification in the DCT domain. The owner information is in the form of a logo image. Two different watermarking systems are considered. The first one is based on the principle of spread spectrum communication, in which we propose an adaptive direct se...

Network

Cited By