Hanaa A. Abdallah

ORCID: 0000-0003-0307-1384
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Image and Signal Denoising Methods
  • Plant Physiology and Cultivation Studies
  • Brain Tumor Detection and Classification
  • Plant Disease Management Techniques
  • Flowering Plant Growth and Cultivation
  • Cellular Automata and Applications
  • Smart Agriculture and AI
  • Advanced Data Compression Techniques
  • Advanced Neural Network Applications
  • Machine Learning and ELM
  • Advanced MIMO Systems Optimization
  • Telecommunications and Broadcasting Technologies
  • Advanced Wireless Communication Technologies
  • Advanced Image Fusion Techniques
  • Sentiment Analysis and Opinion Mining
  • Smart Cities and Technologies
  • Millimeter-Wave Propagation and Modeling
  • Big Data and Business Intelligence
  • Antenna Design and Analysis
  • Spectroscopy and Chemometric Analyses
  • Postharvest Quality and Shelf Life Management
  • Emotion and Mood Recognition

Princess Nourah bint Abdulrahman University
2019-2025

Agricultural Research Center
2019-2021

Zagazig University
2009-2020

A figurative language expression known as sarcasm implies the complete contrast of what is being stated with meant, latter usually rather or extremely offensive, meant to offend humiliate someone. In routine conversations on social media websites, frequently utilized. Sentiment analysis procedures are prone errors because can change a statement’s meaning. Analytic accuracy apprehension has increased automatic networking tools have grown. According preliminary studies, computerized sentiment...

10.3390/electronics12040937 article EN Electronics 2023-02-13

This study proposes an advanced method for plant disease detection utilizing a modified depthwise convolutional neural network (CNN) integrated with squeeze-and-excitation (SE) blocks and improved residual skip connections. In light of increasing global challenges related to food security sustainable agriculture, this research focuses on developing highly efficient accurate automated system identifying diseases, thereby contributing enhanced crop protection yield optimization. The proposed...

10.3389/fpls.2024.1505857 article EN cc-by Frontiers in Plant Science 2025-01-23

This paper introduces the design and exploration of a compact, high-performance multiple-input multiple-output (MIMO) antenna for 6G applications operating in terahertz (THz) frequency range. Leveraging meta learner-based stacked generalization ensemble strategy, this study integrates classical machine learning techniques with an optimized multi-feature to predict properties greater accuracy. Specifically, neural network is applied as base learner predicting parameters, resulting increased...

10.1038/s41598-025-88174-2 article EN cc-by-nc-nd Scientific Reports 2025-02-04

Brain tumors (BTs) are deadly diseases that can strike people of every age, all over the world. Every year, thousands die brain tumors. Brain-related diagnoses require caution, and even smallest error in diagnosis have negative repercussions. Medical errors tumor common frequently result higher patient mortality rates. Magnetic resonance imaging (MRI) is widely used for evaluation detection. However, MRI generates large amounts data, making manual segmentation difficult laborious work,...

10.3390/diagnostics12102541 article EN cc-by Diagnostics 2022-10-20

Background: Examining chest radiograph images (CXR) is an intricate and time-consuming process, sometimes requiring the identification of many anomalies at same time. Lung segmentation key to overcoming this challenge through different deep learning (DL) techniques. Many researchers are working improve performance efficiency lung models. This article presents a DL-based approach accurately identify mask region in CXR assist radiologists recognizing early signs high-risk diseases. Methods:...

10.3390/diagnostics15070854 article EN cc-by Diagnostics 2025-03-27

As IoT devices proliferate in critical areas like healthcare or nuclear safety, it necessitates the provision of cryptographic solutions with security and computational efficiency. Very well-established encryption mechanisms such as AES, RC4, XOR cannot strike a balance between speed, energy consumption, robustness. Moreover, most DNA-based are not cognizant hardware limitations platforms Arduino R3. This paper proposes an improved technique incorporating stochastic DNA-inspired processing...

10.3390/s25072322 article EN cc-by Sensors 2025-04-06

In this paper, multilayer cryptosystems for encrypting audio communications are proposed. These combine signals with other active concealing signals, such as speech by continuously fusing the signal a without silent periods. The goal of these is to prevent unauthorized parties from listening encrypted communications. Preprocessing performed on both and before they combined, necessary get ready fusion. Instead encoding decoding methods, rely values samples, which allows saving time while...

10.3390/electronics12010002 article EN Electronics 2022-12-20

Brain tumors (BTs) are an uncommon but fatal kind of cancer. Therefore, the development computer-aided diagnosis (CAD) systems for classifying brain in magnetic resonance imaging (MRI) has been subject many research papers so far. However, this sector is still its early stage. The ultimate goal to develop a lightweight effective implementation U-Net deep network use performing exact real-time segmentation. Moreover, simplified convolutional neural (DCNN) architecture BT classification...

10.3390/healthcare10122340 article EN Healthcare 2022-11-22

Time series forecasting across different domains has received massive attention as it eases intelligent decision-making activities. Recurrent neural networks and various deep learning algorithms have been applied to modeling multivariate time data. Due intricate non-linear patterns significant variations in the randomness of characteristics categories real-world data, achieving effectiveness robustness simultaneously poses a considerable challenge for specific deep-learning models. We...

10.1016/j.heliyon.2024.e27860 article EN cc-by-nc Heliyon 2024-03-19

Plant diseases annually cause damage and loss of much the crop, if not its complete destruction, this constitutes a significant challenge for farm owners, governments, consumers alike. Therefore, identifying classifying at an early stage is very important in order to sustain local global food security. In research, we designed new method identify plant by combining transfer learning Gravitational Search Algorithm (GSA). Two state-of-the-art pretrained models have been adopted extracting...

10.1016/j.heliyon.2024.e28967 article EN cc-by-nc-nd Heliyon 2024-04-01

Chemotherapy is a widely used cancer treatment method globally. However, cells can develop resistance towards single-drug-based chemotherapy if it infused for extended periods, resulting in failure many cases. To address this issue, oncologists have progressed using multi-drug (MDC). This considers different drug concentrations treatment, but choosing incorrect adversely affect the patient’s body. Therefore, crucial to recognize trade-off between and their adverse effects. closed-loop...

10.3390/math11081779 article EN cc-by Mathematics 2023-04-08

Securing medical data while transmission on the network is required because it sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), cosine (DCT), singular value decomposition (SVD) digital image-watermarking algorithms. The host image decomposed using two-dimensional DWT (2D-DWT) to approximate low-frequency...

10.32604/csse.2023.035048 article EN cc-by Computer Systems Science and Engineering 2023-01-01

Anxiety is a common mental health issue that affects significant portion of the global population and can lead to severe physical psychological consequences. The proposed system aims provide an objective reliable method for early detection anxiety levels by using patients' symptoms as input variables. This paper introduces expert utilizing fuzzy inference (FIS) predict levels. designed address anxiety's complex uncertain nature comprehensive set variables logic techniques. It based on rules...

10.3390/healthcare11111594 article EN Healthcare 2023-05-30

In this paper, we propose an SVD-based watermarking scheme in complex wavelet domain for color video. Video is well known as the process of embedding copyright information video bit streams. It has been proposed recent years to solve problem illegal manipulation and distribution digital study, effective, robust imperceptible algorithm proposed. This was based on a cascade two powerful mathematical transforms; 2-level dual tree transform (DT-CWT) singular value decomposition (SVD). hybrid...

10.1109/icces.2009.5383220 article EN 2009-12-01

This paper presents an efficient SVD based image Steganography approach. approach aims at increasing the fidelity of images after data embedding. Rather than embedding in singular values images, Left vectors are used for this purpose. The objective is to reduce errors as well maintain fidelity. Several solutions problem presented paper. Experimental results show superiority proposed existing approaches.

10.1109/icces.2009.5383271 article EN 2009-12-01

The software industry plays a vital role in driving technological advancements. Software projects are complex and consist of many components, so change is unavoidable these projects. requirements must be predicted early to preserve resources, since it can lead project failures. This work focuses on small-scale systems which changed gradually. provides probabilistic prediction model, predicts the probability changes requirement specifications. first part considers analyzing due certain...

10.3390/computers12080164 article EN cc-by Computers 2023-08-14

Next-generation cellular networks are expected to provide users with innovative gigabits and terabits per second speeds achieve ultra-high reliability, availability, ultra-low latency. The requirements of such the main challenges that can be handled using a range recent technologies, including multi-access edge computing (MEC), artificial intelligence (AI), millimeter-wave communications (mmWave), software-defined networking. Many aspects design associated MEC-based 5G/6G should solved...

10.32604/csse.2023.031841 article EN cc-by Computer Systems Science and Engineering 2022-11-03

In this paper, A quantization based method for digital image watermarking is presented here. This on inserting a watermark bit into the coarsest scale wavelet coefficients. three level decomposition used in paper. technique blind requiring neither original nor any side information recovery process. It computationally efficient. Experimental results show superiority of proposed techniques to traditional techniques.

10.1109/icces.2009.5383274 article EN 2009-12-01

Efficient monitoring and achievement of the Sustainable Development Goals (SDGs) has increased need for a variety data statistics. The massive increase in gathering through social networks, traditional business systems, Internet Things (IoT)-based sensor devices raises real questions regarding capacity national statistical systems (NSS) utilizing big sources. Further, this current era, is captured sensor-based public sector organizations. To gauge institutions regard, work provides an...

10.3390/systems11080424 article EN cc-by Systems 2023-08-13

Digital Signature using Self-Image signing is introduced in this paper. This technique used to verify the integrity and originality of images transmitted over insecure channels. In order protect user's medical from changing or modifying, must be signed. The proposed approach uses Discrete Wavelet Transform subdivide a picture into four bands Cosine DCT embed mark each sub-band another DWT according determined algorithm. To increase security, marked image then encrypted Double Random Phase...

10.3390/e24040538 article EN cc-by Entropy 2022-04-12
Coming Soon ...