Ahmed Hamad

ORCID: 0000-0001-7969-601X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Video Surveillance and Tracking Methods
  • Inertial Sensor and Navigation
  • GNSS positioning and interference
  • Wireless Networks and Protocols
  • Image Enhancement Techniques
  • Indoor and Outdoor Localization Technologies
  • Nitric Oxide and Endothelin Effects
  • Data Mining Algorithms and Applications
  • Anomaly Detection Techniques and Applications
  • Wireless Communication Networks Research
  • Radio Wave Propagation Studies
  • Phosphodiesterase function and regulation
  • Human Pose and Action Recognition
  • Network Security and Intrusion Detection
  • Software Engineering Techniques and Practices
  • Spine and Intervertebral Disc Pathology
  • Receptor Mechanisms and Signaling
  • Web Applications and Data Management
  • Data Management and Algorithms
  • Software-Defined Networks and 5G
  • Multimedia Communication and Technology
  • Usability and User Interface Design
  • Neuroscience of respiration and sleep
  • Software Engineering Research
  • Infrared Target Detection Methodologies

Ain Shams University
2006-2025

Menoufia University
2017-2024

Northern Technical University
2024

British University in Egypt
2010-2020

Mansoura University
2020

Arab Academy for Science, Technology, and Maritime Transport
2017

Chiba University
2011-2012

EIA University
2012

Military Technical College
1987-2002

Mansoura University Hospital
2001

Abstract This study was conducted during the 2023 growing season on some date palm varieties, with aim of identifying their distinctive phenotypic and fruit traits. Twenty commonly varieties in Anbar governorate were selected, traits converted into numerical values to create description tables. The results analyzed using cluster analysis principal component identify variation, similarity, correlation between studied showed that divided two groups (A B). Group A branched subgroups (A1 A2). A1...

10.1088/1755-1315/1449/1/012132 article EN IOP Conference Series Earth and Environmental Science 2025-02-01

Airway smooth muscle (ASM) hypertrophy and hyperplasia are important determinants of bronchial responsiveness in asthma, agents that interfere with these processes may prevent airway remodeling. We tested the hypothesis activators soluble particulate guanylyl cyclases would inhibit human ASM cell (HASMC) proliferation. report nitric oxide (NO) donors S-nitroso- N-acetylpenicillamine (SNAP; 10 −6 to −4 M) sodium nitroprusside (10 −5 −3 atrial natriuretic peptide [ANP-(1—28); −8 M], which...

10.1152/ajplung.1999.277.5.l910 article EN AJP Lung Cellular and Molecular Physiology 1999-11-01

Abstract Kubernetes has emerged as the backbone of modern cloud-native environments, enabling efficient orchestration containerized applications. However, its dynamic nature exposes it to sophisticated cyber threats, including privilege escalation, reconnaissance, and denial-of-service attacks. This paper presents a novel framework that combines real-time multi-class threat detection with adaptive deception enhance security. The integrates KServe for scalable machine learning-based...

10.1038/s41598-025-91606-8 article EN cc-by Scientific Reports 2025-03-15

Although guanosine 3′,5′-cyclic monophosphate (cGMP) acts as a relaxant second messenger, the regulation of intracellular cGMP has not been comprehensively studied in human airway smooth muscle. We production by cultured muscle cells (HASMC) after stimulation with activators soluble guanylyl cyclase [sodium nitroprusside (SNP) and S-nitroso- N-acetylpenicillamine (SNAP)] particulate [atrial natriuretic peptide (ANP), brain (BNP), C-type (CNP), Escherichia coli heat stable enterotoxin (STa)]....

10.1152/ajplung.1997.273.4.l807 article EN AJP Lung Cellular and Molecular Physiology 1997-10-01

We have characterised the mechanisms involved in antiproliferative effect of NO human airway smooth muscle cells (HASMC). S ‐Nitroso‐ N ‐acetyl penicillamine, a nitric oxide donor, inhibited proliferation both G 1 and phases cell cycle. Additionally, experiments with 8‐bromo‐cGMP, haemoglobin, scavenger zaprinast, cGMP‐specific phosphodiesterase inhibitor, showed that effects were NO‐mediated. The phase inhibition was cGMP‐dependent whereas due to cGMP‐independent ribonucleotide reductase....

10.1016/s0014-5793(01)02883-6 article EN FEBS Letters 2001-09-13

Abstract Concurrent multipath transfer (CMT) is a transport layer protocol used for transferring data over multiple paths concurrently. In the case of asymmetric paths, dissimilarity delay, bandwidth, and loss rate among leads to challenges such as out‐of‐order packets, receiver buffer blocking, throughput reduction. A framework that uses end‐to‐end delay distribute packets in ordering policy proposed. The proposed detects network congestion assigned path reduces window. Furthermore,...

10.1049/ntw2.12116 article EN cc-by IET Networks 2024-02-20

Kubernetes, an open-source platform for automating deployment, scaling, and management of containerized applications, has become a cornerstone in modern IT infrastructure. Alongside its widespread adoption, Kubernetes faces series sophisticated security challenges, especially managing numerous containers. This research uniquely focuses on multi-class threat detection, classifying various types threats within environments. Machine learning is emerging as powerful tool cybersecurity, offering...

10.1109/icci61671.2024.10485133 article EN 2024-03-06

Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, phone localization has become an important research problem, and numerous solutions proposed. Database Correlation Method (DCM) is a positioning technology that based on premeasured database of location dependent variable such as Received Signal Strength (RSS) or Link Quality Identifier. DCM shown superior terms accuracy. Absolute RSS values received from...

10.1109/eit.2013.6632643 article EN 2013-05-01

Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, phone localization has become an important research problem. Database Correlation Method (DCM) is a positioning technology that based on database of premeasured location dependent variable such as Received Signal Strength (RSS). DCM shown superior terms accuracy. Absolute RSS values received from base station change with time, but relative (RRSS) which...

10.4018/ijhcr.2013100103 article EN International Journal of Handheld Computing Research 2013-10-01

Introduction: Inducible laryngeal obstruction (ILO) is an important cause of a variety respiratory symptoms and can mimic bronchial asthma (BA). This study was planned to measure the prevalence ILO among patients diagnosed with BA detect its effect on control severity. Material methods: Patients aged 18 years or older who were previously enrolled. Laryngeal induced using patient’s specific trigger (e.g. exercise). Visualization vocal folds accomplished 70-degree rigid laryngoscope (Karl...

10.5603/arm.2020.0087 article EN Advances in respiratory medicine 2020-04-30

This paper proposes a new single camera automatic crowd density estimation method for overcoming the linearity problem and enhancing counting prediction accuracy. For problem, combination of features including segmented regions properties, texture, edge, SIFT keypoints are extracted from foreground regions. These normalized to solve perspective distortion problem. The complete feature set partial this utilized train multiple regression models predict per region enhance Moreover,...

10.1109/icces.2017.8275346 article EN 2017-12-01

One of the primary tasks completing and developing many computer vision applications is to identify remove shadow regions. Most existing moving detection methods depend on extracting hand-crafted features object regions manually (for example chromaticity, physical, or geometric properties). Shadow using handcrafted a challenging task due different environmental conditions such as camouflage illumination irregularity problems that make these inefficient handle problems. The proposed method...

10.21608/ijci.2020.44215.1029 article EN cc-by IJCI International Journal of Computers and Information 2020-10-18

Deception techniques play a crucial role in enhancing cybersecurity by misleading attackers and safeguarding critical systems.The strategic placement of decoys constructs an elaborate defense architecture that can effectively thwart unauthorized access.This paper presents comprehensive survey deception from research perspective, highlighting their classification, modeling methodologies, deployment strategies.Additionally, it explores the major issues associated with these techniques,...

10.21608/ijicis.2023.247380.1306 article EN International journal of intelligent computing and information sciences/International Journal of Intelligent Computing and Information Sciences 2023-12-01

Adopting Web 2.0 technologies and techniques in modern e-learning systems guarantees a more interactive experience. It leverages collaboration among learners enhances accessibility to various learning resources. Providing such functionalities as web services within an integrated system achieves interoperability reduces redundancy. Our aim this paper is identify recurrent Service-oriented architecture (SOA) design architectural patterns that would provide reusable building blocks for any...

10.1109/snpd.2010.42 article EN 2010-06-01

A two-tier model is used in cellular networks to improve the Quality of Service (QoS), namely reduce blocking probability new calls and forced termination ongoing calls. One tier, microcells, for slow or stationary users, other, macrocell, high speed users. In Code-Division Multiple-Access (CDMA) systems, soft handoffs are supported, which provides ways further QoS improvement. this paper, we introduce such a way; namely, channel borrowing scheme conjunction with First-In-First-Out (FIFO)...

10.1016/j.eij.2011.06.002 article EN cc-by-nc-nd Egyptian Informatics Journal 2011-07-01

This paper proposes a simple and robust method to detect extract the silhouettes from video sequence of static camera based on background subtraction technique. The proposed analyse pixel history as time series observations. A technique motion kernel density estimation is presented. Two consecutive stages k-means clustering algorithm are utilized identify most reliable regions decrease false positives. Pixel object updating mechanism presented cope with challenges like gradual sudden...

10.1109/acpr.2011.6166672 article EN 2011-11-01
Coming Soon ...