Rasha M. Abd El Aziz

Rasha M. Abd El Aziz
Assiut University · Faculty of Computers and Information

Professor

About

32
Publications
6,987
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
402
Citations

Publications

Publications (32)
Article
Today’s world depends on the Internet to meet all its daily needs. The usage of the Internet is growing rapidly. The world is using the Internet more frequently than ever. The hazards of harmful attacks have also increased due to the growing reliance on the Internet. Hazards to cyber security are actions taken by someone with malicious intent to st...
Article
Full-text available
Indoor localization methods can help many sectors, such as healthcare centers, smart homes, museums, warehouses, and retail malls, improve their service areas. As a result, it is crucial to look for low-cost methods that can provide exact localization in indoor locations. In this context, image-based localization methods can play an important role...
Article
Full-text available
In the modern day, protecting data against tampering is a significant task. One of the most common forms of information display has been digital photographs. Images may be exploited in a variety of contexts, including the military, security applications, intelligence areas, legal evidence, social media, and journalism. Digital picture forgeries inv...
Article
Today, electricity is in high demand in a variety of places, including hospitals, industry, households, transportation, and communication, among others. Renewable energy is a revolutionary type of energy that is increasingly being used to replace electricity demand because it has been regenerated and reused several times. Renewable energy is an int...
Article
The Internet of Things (IoT) is a global network of millions of devices connected in wireless that exchange data. Multiple data are aiming to be observed through a single platform, and it becomes necessary to evaluate accuracy in order to realize the ideal IoT platform. IoT data collection is more important to meet the growing data analysis in dema...
Article
Full-text available
Blockchain technology must have sparked widespread interest, applications associated with data monitoring, banking sectors, computer security, the Internet of Things, and food chemistry to the healthcare sector and cognitive science. The use of multimedia in the healthcare architecture also allows for the storage, processing and transmission of pat...
Article
As people all over the world are vulnerable to be affected by the COVID-19 virus, the automatic detection of such a virus is an important concern. The paper aims to detect and classify corona virus using machine learning. To spot and identify corona virus in CT-Lung screening and Computer-Aided diagnosis (CAD) system is projected to distinguish and...
Article
Computer vision and natural language processing (NLP) are two active machine learning research areas. However, the integration of these two areas gives rise to a new interdisciplinary field, which is currently attracting more attention of researchers. Research has been carried out to extract the text associated with an image or a video that can ass...
Article
Full-text available
Automation in industries offers the benefits of enhancing quality and productivity while minimizing waste and errors, raising safety and adds stability to the production process. Industrial automation offers high profitability, reliability, and safety. It is beneficial to employ machine learning in the field of industrial automation as it helps in...
Article
Full-text available
In this modern era, each and everything is computerized, and everyone has their own smart gadgets to communicate with others around the globe without any range limitations. Most of the communication pathways belong to smart applications, call options in smartphones, and other multiple ways, but e-mail communication is considered the main profession...
Preprint
Full-text available
Most of the current techniques for face recognition require the presence of a full face of the person to be recognized, and this situation is difficult to achieve in practice, the required person may appear with a part of his face, which requires prediction of the part that did not appear. Most of the current forecasting processes are done by what...
Article
Full-text available
Medical costs are one of the most common recurring expenses in a person's life. Based on different research studies, BMI, ageing, smoking, and other factors are all related to greater personal medical care costs. e estimates of the expenditures of health care related to obesity are needed to help create cost-effective obesity prevention strategies....
Article
Full-text available
In this study, machine learning is used to detect coronavirus in CT-lung screening. This virus causes serious acute respiratory illness and is very contagious. The WHO has confirmed 19 cases of covid. The case rate is above 12,000,000 and the mortality rate is over 500,000. In the absence of a vaccine, early discovery of this pandemic is the most e...
Article
Full-text available
Patients are required to be observed and treated continually in some emergency situations. However, due to time constraints, visiting the hospital to execute such tasks is challenging. This can be achieved using a remote healthcare monitoring system. The proposed system introduces an effective data science technique for IoT supported healthcare mon...
Article
Full-text available
Since the Pre-Roman era, olive trees have a significant economic and cultural value. In 2019, the Al-Jouf region, in the north of the Kingdom of Saudi Arabia, gained a global presence by entering the Guinness World Records, with the largest number of olive trees in the world. Olive tree detecting and counting from a given satellite image are a sign...
Article
Full-text available
Cardiac arrhythmia is an illness in which a heartbeat is erratic, either too slow or too rapid. It happens as a result of faulty electrical impulses that coordinate the heartbeats. Sudden cardiac death can occur as a result of certain serious arrhythmia disorders. As a result, the primary goal of electrocardiogram (ECG) investigation is to reliably...
Research
Full-text available
Internet of Things (IoT) is defined as millions of interconnections between wireless devices to obtain data globally. The multiple data are targeting to observe the data through a common platform, and then it becomes essential to investigate accuracy for realizing the best IoT platform. To address the growing demand for time-sensitive data analysis...
Preprint
Full-text available
In the current era of smart cities and smart homes, the patient's data like name, personal details and disease description are highly insecure and violated most often. These details are stored digitally in a network called Electronic Health Record (EHR). The EHR can be useful for future medical researches to enhance patients' healthcare and the per...
Preprint
Full-text available
The care of new born babies are the most important and sensitive part of bio-medical domain. Some new born babies have a higher risk of mortality due to their gestational age or their birth weight. Most of the premature babies born on 32-37 weeks of gestation and are deceased due to their unmet need for warmth. The neonatal incubator is a device us...
Preprint
Full-text available
As people all over the world are vulnerable to be affected by the COVID-19 virus, the automatic detection of such a virus is an important concern. The paper aims to detect and classify coronavirus using machine learning. To spot and identify coronavirus in CT-Lung screening and Computer-Aided diagnosis (CAD) system is projected to distinguish and c...
Preprint
Full-text available
Exceptional research activities have been endorsed by the Arabic Sign Language for recognizing gestures and hand signs utilizing the deep learning model. Sign languages refer to the gestures, which are utilized by hearing impaired people for communication. These gestures are complex for understanding by normal people. Due to variation of Arabic Sig...
Article
Full-text available
A field of information security provides an efficiency to manage the records over remote server with proper privacy preserving norms. These kinds of information privacy are required today to maintain ones record into the server without any security issues. Due to the machinery world, everyone requires some smart technologies and maintain their data...
Article
In this modern world, there is a huge requirement to convert each and every record into digital format and store those records in a safe place. The concept of storing such huge records in digital format over the system is complex to maintain and needs sufficient storage. It needs to be recovered with Remote Storage Servers, in which the data can be...
Article
Full-text available
In the current era of smart cities and smart homes, the patient’s data like name, personal details and disease description are highly insecure and violated most often. These details are stored digitally in a network called Electronic Health Record (EHR). The EHR can be useful for future medical researches to enhance patients’ healthcare and the per...
Article
Full-text available
In this modern era, each and every individual requires a Smartphone and related gadget to operate all day to day activities. Digital Document Management is the present world scenario and no one want to submit the documents in hard core manner; instead all are required to submit the documents to officials, authorities and any others in a digital for...
Article
Clustering analysis plays an important role in scientific research and commercial application. K-means algorithm is a widely used partition method in clustering. However, it is known that the K-means algorithm may get stuck at suboptimal solutions, depending on the choice of the initial cluster centers. In this article, we propose a technique to ha...
Article
The Cluster analysis is a major technique for statistical analysis, machine learning, pattern recognition, data mining, image analysis and bioinformatics. K-means algorithm is one of the most important clustering algorithms. However, the k-means algorithm needs a large amount of computational time for handling large data sets. In this paper, we dev...

Network

Cited By