- Video Surveillance and Tracking Methods
- Inertial Sensor and Navigation
- GNSS positioning and interference
- Wireless Networks and Protocols
- Image Enhancement Techniques
- Indoor and Outdoor Localization Technologies
- Nitric Oxide and Endothelin Effects
- Data Mining Algorithms and Applications
- Anomaly Detection Techniques and Applications
- Wireless Communication Networks Research
- Radio Wave Propagation Studies
- Phosphodiesterase function and regulation
- Human Pose and Action Recognition
- Network Security and Intrusion Detection
- Software Engineering Techniques and Practices
- Spine and Intervertebral Disc Pathology
- Receptor Mechanisms and Signaling
- Web Applications and Data Management
- Data Management and Algorithms
- Software-Defined Networks and 5G
- Multimedia Communication and Technology
- Usability and User Interface Design
- Neuroscience of respiration and sleep
- Software Engineering Research
- Infrared Target Detection Methodologies
Ain Shams University
2006-2025
Menoufia University
2017-2024
Northern Technical University
2024
British University in Egypt
2010-2020
Mansoura University
2020
Arab Academy for Science, Technology, and Maritime Transport
2017
Chiba University
2011-2012
EIA University
2012
Military Technical College
1987-2002
Mansoura University Hospital
2001
Abstract This study was conducted during the 2023 growing season on some date palm varieties, with aim of identifying their distinctive phenotypic and fruit traits. Twenty commonly varieties in Anbar governorate were selected, traits converted into numerical values to create description tables. The results analyzed using cluster analysis principal component identify variation, similarity, correlation between studied showed that divided two groups (A B). Group A branched subgroups (A1 A2). A1...
Airway smooth muscle (ASM) hypertrophy and hyperplasia are important determinants of bronchial responsiveness in asthma, agents that interfere with these processes may prevent airway remodeling. We tested the hypothesis activators soluble particulate guanylyl cyclases would inhibit human ASM cell (HASMC) proliferation. report nitric oxide (NO) donors S-nitroso- N-acetylpenicillamine (SNAP; 10 −6 to −4 M) sodium nitroprusside (10 −5 −3 atrial natriuretic peptide [ANP-(1—28); −8 M], which...
Abstract Kubernetes has emerged as the backbone of modern cloud-native environments, enabling efficient orchestration containerized applications. However, its dynamic nature exposes it to sophisticated cyber threats, including privilege escalation, reconnaissance, and denial-of-service attacks. This paper presents a novel framework that combines real-time multi-class threat detection with adaptive deception enhance security. The integrates KServe for scalable machine learning-based...
Although guanosine 3′,5′-cyclic monophosphate (cGMP) acts as a relaxant second messenger, the regulation of intracellular cGMP has not been comprehensively studied in human airway smooth muscle. We production by cultured muscle cells (HASMC) after stimulation with activators soluble guanylyl cyclase [sodium nitroprusside (SNP) and S-nitroso- N-acetylpenicillamine (SNAP)] particulate [atrial natriuretic peptide (ANP), brain (BNP), C-type (CNP), Escherichia coli heat stable enterotoxin (STa)]....
We have characterised the mechanisms involved in antiproliferative effect of NO human airway smooth muscle cells (HASMC). S ‐Nitroso‐ N ‐acetyl penicillamine, a nitric oxide donor, inhibited proliferation both G 1 and phases cell cycle. Additionally, experiments with 8‐bromo‐cGMP, haemoglobin, scavenger zaprinast, cGMP‐specific phosphodiesterase inhibitor, showed that effects were NO‐mediated. The phase inhibition was cGMP‐dependent whereas due to cGMP‐independent ribonucleotide reductase....
Abstract Concurrent multipath transfer (CMT) is a transport layer protocol used for transferring data over multiple paths concurrently. In the case of asymmetric paths, dissimilarity delay, bandwidth, and loss rate among leads to challenges such as out‐of‐order packets, receiver buffer blocking, throughput reduction. A framework that uses end‐to‐end delay distribute packets in ordering policy proposed. The proposed detects network congestion assigned path reduces window. Furthermore,...
Kubernetes, an open-source platform for automating deployment, scaling, and management of containerized applications, has become a cornerstone in modern IT infrastructure. Alongside its widespread adoption, Kubernetes faces series sophisticated security challenges, especially managing numerous containers. This research uniquely focuses on multi-class threat detection, classifying various types threats within environments. Machine learning is emerging as powerful tool cybersecurity, offering...
Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, phone localization has become an important research problem, and numerous solutions proposed. Database Correlation Method (DCM) is a positioning technology that based on premeasured database of location dependent variable such as Received Signal Strength (RSS) or Link Quality Identifier. DCM shown superior terms accuracy. Absolute RSS values received from...
Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, phone localization has become an important research problem. Database Correlation Method (DCM) is a positioning technology that based on database of premeasured location dependent variable such as Received Signal Strength (RSS). DCM shown superior terms accuracy. Absolute RSS values received from base station change with time, but relative (RRSS) which...
Introduction: Inducible laryngeal obstruction (ILO) is an important cause of a variety respiratory symptoms and can mimic bronchial asthma (BA). This study was planned to measure the prevalence ILO among patients diagnosed with BA detect its effect on control severity. Material methods: Patients aged 18 years or older who were previously enrolled. Laryngeal induced using patient’s specific trigger (e.g. exercise). Visualization vocal folds accomplished 70-degree rigid laryngoscope (Karl...
This paper proposes a new single camera automatic crowd density estimation method for overcoming the linearity problem and enhancing counting prediction accuracy. For problem, combination of features including segmented regions properties, texture, edge, SIFT keypoints are extracted from foreground regions. These normalized to solve perspective distortion problem. The complete feature set partial this utilized train multiple regression models predict per region enhance Moreover,...
One of the primary tasks completing and developing many computer vision applications is to identify remove shadow regions. Most existing moving detection methods depend on extracting hand-crafted features object regions manually (for example chromaticity, physical, or geometric properties). Shadow using handcrafted a challenging task due different environmental conditions such as camouflage illumination irregularity problems that make these inefficient handle problems. The proposed method...
Deception techniques play a crucial role in enhancing cybersecurity by misleading attackers and safeguarding critical systems.The strategic placement of decoys constructs an elaborate defense architecture that can effectively thwart unauthorized access.This paper presents comprehensive survey deception from research perspective, highlighting their classification, modeling methodologies, deployment strategies.Additionally, it explores the major issues associated with these techniques,...
Adopting Web 2.0 technologies and techniques in modern e-learning systems guarantees a more interactive experience. It leverages collaboration among learners enhances accessibility to various learning resources. Providing such functionalities as web services within an integrated system achieves interoperability reduces redundancy. Our aim this paper is identify recurrent Service-oriented architecture (SOA) design architectural patterns that would provide reusable building blocks for any...
A two-tier model is used in cellular networks to improve the Quality of Service (QoS), namely reduce blocking probability new calls and forced termination ongoing calls. One tier, microcells, for slow or stationary users, other, macrocell, high speed users. In Code-Division Multiple-Access (CDMA) systems, soft handoffs are supported, which provides ways further QoS improvement. this paper, we introduce such a way; namely, channel borrowing scheme conjunction with First-In-First-Out (FIFO)...
This paper proposes a simple and robust method to detect extract the silhouettes from video sequence of static camera based on background subtraction technique. The proposed analyse pixel history as time series observations. A technique motion kernel density estimation is presented. Two consecutive stages k-means clustering algorithm are utilized identify most reliable regions decrease false positives. Pixel object updating mechanism presented cope with challenges like gradual sudden...